%PDF- %PDF-
Direktori : /proc/self/root/var/log/ |
Current File : //proc/self/root/var/log/secure-20230101 |
Dec 25 03:33:46 host sshd[2679]: Invalid user user from 106.10.122.53 port 42938 Dec 25 03:33:46 host sshd[2679]: input_userauth_request: invalid user user [preauth] Dec 25 03:33:46 host sshd[2679]: pam_unix(sshd:auth): check pass; user unknown Dec 25 03:33:46 host sshd[2679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 25 03:33:47 host sshd[2679]: Failed password for invalid user user from 106.10.122.53 port 42938 ssh2 Dec 25 03:33:48 host sshd[2679]: Connection closed by 106.10.122.53 port 42938 [preauth] Dec 25 03:34:11 host sshd[2722]: Invalid user student01 from 103.13.40.2 port 46928 Dec 25 03:34:11 host sshd[2722]: input_userauth_request: invalid user student01 [preauth] Dec 25 03:34:11 host sshd[2722]: pam_unix(sshd:auth): check pass; user unknown Dec 25 03:34:11 host sshd[2722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 25 03:34:13 host sshd[2722]: Failed password for invalid user student01 from 103.13.40.2 port 46928 ssh2 Dec 25 03:34:13 host sshd[2722]: Connection closed by 103.13.40.2 port 46928 [preauth] Dec 25 03:41:18 host sshd[3674]: User root from 41.197.31.178 not allowed because not listed in AllowUsers Dec 25 03:41:18 host sshd[3674]: input_userauth_request: invalid user root [preauth] Dec 25 03:41:18 host unix_chkpwd[3677]: password check failed for user (root) Dec 25 03:41:18 host sshd[3674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 user=root Dec 25 03:41:18 host sshd[3674]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 03:41:20 host sshd[3648]: Connection closed by 167.94.146.60 port 53734 [preauth] Dec 25 03:41:21 host sshd[3674]: Failed password for invalid user root from 41.197.31.178 port 51060 ssh2 Dec 25 03:41:21 host sshd[3674]: Connection closed by 41.197.31.178 port 51060 [preauth] Dec 25 03:55:38 host sshd[5725]: Invalid user ch from 45.93.201.90 port 41932 Dec 25 03:55:38 host sshd[5725]: input_userauth_request: invalid user ch [preauth] Dec 25 03:55:38 host sshd[5725]: pam_unix(sshd:auth): check pass; user unknown Dec 25 03:55:38 host sshd[5725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 25 03:55:40 host sshd[5725]: Failed password for invalid user ch from 45.93.201.90 port 41932 ssh2 Dec 25 03:55:44 host sshd[5725]: pam_unix(sshd:auth): check pass; user unknown Dec 25 03:55:46 host sshd[5725]: Failed password for invalid user ch from 45.93.201.90 port 41932 ssh2 Dec 25 03:55:49 host sshd[5725]: pam_unix(sshd:auth): check pass; user unknown Dec 25 03:55:51 host sshd[5725]: Failed password for invalid user ch from 45.93.201.90 port 41932 ssh2 Dec 25 03:55:54 host sshd[5725]: Connection closed by 45.93.201.90 port 41932 [preauth] Dec 25 03:55:54 host sshd[5725]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 25 03:58:06 host sshd[6022]: Invalid user gpuadmin from 92.46.108.20 port 49270 Dec 25 03:58:06 host sshd[6022]: input_userauth_request: invalid user gpuadmin [preauth] Dec 25 03:58:06 host sshd[6022]: pam_unix(sshd:auth): check pass; user unknown Dec 25 03:58:06 host sshd[6022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 25 03:58:08 host sshd[6022]: Failed password for invalid user gpuadmin from 92.46.108.20 port 49270 ssh2 Dec 25 03:58:09 host sshd[6022]: Connection closed by 92.46.108.20 port 49270 [preauth] Dec 25 04:00:35 host sshd[6486]: Did not receive identification string from 149.129.220.222 port 61000 Dec 25 04:01:39 host sshd[6635]: Invalid user user from 162.218.126.136 port 54344 Dec 25 04:01:39 host sshd[6635]: input_userauth_request: invalid user user [preauth] Dec 25 04:01:39 host sshd[6635]: pam_unix(sshd:auth): check pass; user unknown Dec 25 04:01:39 host sshd[6635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 25 04:01:41 host sshd[6635]: Failed password for invalid user user from 162.218.126.136 port 54344 ssh2 Dec 25 04:01:41 host sshd[6635]: Connection closed by 162.218.126.136 port 54344 [preauth] Dec 25 04:10:35 host sshd[7949]: Invalid user samba from 84.110.99.202 port 58716 Dec 25 04:10:35 host sshd[7949]: input_userauth_request: invalid user samba [preauth] Dec 25 04:10:35 host sshd[7949]: pam_unix(sshd:auth): check pass; user unknown Dec 25 04:10:35 host sshd[7949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.110.99.202 Dec 25 04:10:38 host sshd[7949]: Failed password for invalid user samba from 84.110.99.202 port 58716 ssh2 Dec 25 04:10:38 host sshd[7949]: Connection closed by 84.110.99.202 port 58716 [preauth] Dec 25 04:18:20 host sshd[8961]: Invalid user user from 131.0.0.11 port 37166 Dec 25 04:18:20 host sshd[8961]: input_userauth_request: invalid user user [preauth] Dec 25 04:18:20 host sshd[8961]: pam_unix(sshd:auth): check pass; user unknown Dec 25 04:18:20 host sshd[8961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.0.0.11 Dec 25 04:18:23 host sshd[8961]: Failed password for invalid user user from 131.0.0.11 port 37166 ssh2 Dec 25 04:18:23 host sshd[8961]: Connection closed by 131.0.0.11 port 37166 [preauth] Dec 25 04:21:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 04:21:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 04:21:43 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 04:21:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 04:21:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 04:21:43 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 04:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 04:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 04:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 04:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 25 04:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 04:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 04:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 25 04:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 04:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 04:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 25 04:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 04:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 04:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 25 04:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 04:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 04:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 25 04:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 04:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 04:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 25 04:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 04:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 04:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 25 04:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 04:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 04:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 25 04:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 04:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 25 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwevmhonda user-2=bonifacegroup user-3=wwwletsstalkfood user-4=straightcurve user-5=phmetals user-6=kottayamcalldriv user-7=gifterman user-8=palco123 user-9=wwwnexidigital user-10=mrsclean user-11=disposeat user-12=wwwkmaorg user-13=remysagr user-14=wwwkapin user-15=woodpeck user-16=wwwtestugo user-17=shalinijames user-18=vfmassets user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=ugotscom user-23=wwwrmswll user-24=wwwresourcehunte user-25=keralaholi user-26=wwwkaretakers user-27=cochintaxi user-28=dartsimp user-29=a2zgroup user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 25 04:21:46 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 25 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-EYAWr4YTVDDyla20.~ Dec 25 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-EYAWr4YTVDDyla20.~' Dec 25 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-EYAWr4YTVDDyla20.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 25 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 25 04:21:46 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 04:21:46 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 04:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 04:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 04:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 25 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 04:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 25 04:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 25 04:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 25 04:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 25 04:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 25 04:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 25 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 25 04:21:51 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 25 04:21:53 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 25 04:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 25 04:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 04:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 25 04:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 04:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 25 04:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 04:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 04:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 25 04:21:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 04:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 04:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 25 04:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 04:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 04:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 25 04:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 25 04:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 25 04:22:50 host sshd[9910]: Did not receive identification string from 106.75.15.144 port 36412 Dec 25 04:31:13 host sshd[11248]: Invalid user admin from 143.244.178.233 port 53144 Dec 25 04:31:13 host sshd[11248]: input_userauth_request: invalid user admin [preauth] Dec 25 04:31:13 host sshd[11248]: pam_unix(sshd:auth): check pass; user unknown Dec 25 04:31:13 host sshd[11248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.244.178.233 Dec 25 04:31:16 host sshd[11248]: Failed password for invalid user admin from 143.244.178.233 port 53144 ssh2 Dec 25 04:31:16 host sshd[11248]: Connection closed by 143.244.178.233 port 53144 [preauth] Dec 25 04:40:48 host sshd[12398]: User root from 143.244.178.233 not allowed because not listed in AllowUsers Dec 25 04:40:48 host sshd[12398]: input_userauth_request: invalid user root [preauth] Dec 25 04:40:48 host unix_chkpwd[12402]: password check failed for user (root) Dec 25 04:40:48 host sshd[12398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.244.178.233 user=root Dec 25 04:40:48 host sshd[12398]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 04:40:50 host sshd[12398]: Failed password for invalid user root from 143.244.178.233 port 51110 ssh2 Dec 25 04:40:50 host sshd[12398]: Connection closed by 143.244.178.233 port 51110 [preauth] Dec 25 04:40:51 host sshd[12405]: User root from 143.244.178.233 not allowed because not listed in AllowUsers Dec 25 04:40:51 host sshd[12405]: input_userauth_request: invalid user root [preauth] Dec 25 04:40:52 host unix_chkpwd[12408]: password check failed for user (root) Dec 25 04:40:52 host sshd[12405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.244.178.233 user=root Dec 25 04:40:52 host sshd[12405]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 04:40:54 host sshd[12405]: Failed password for invalid user root from 143.244.178.233 port 51126 ssh2 Dec 25 04:51:30 host sshd[13953]: Did not receive identification string from 120.132.122.54 port 61598 Dec 25 05:06:53 host sshd[15985]: User root from 103.13.40.2 not allowed because not listed in AllowUsers Dec 25 05:06:53 host sshd[15985]: input_userauth_request: invalid user root [preauth] Dec 25 05:06:53 host unix_chkpwd[15987]: password check failed for user (root) Dec 25 05:06:53 host sshd[15985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 user=root Dec 25 05:06:53 host sshd[15985]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 05:06:55 host sshd[15985]: Failed password for invalid user root from 103.13.40.2 port 53668 ssh2 Dec 25 05:06:55 host sshd[15985]: Connection closed by 103.13.40.2 port 53668 [preauth] Dec 25 05:09:12 host sshd[16323]: User root from 106.10.122.53 not allowed because not listed in AllowUsers Dec 25 05:09:12 host sshd[16323]: input_userauth_request: invalid user root [preauth] Dec 25 05:09:13 host unix_chkpwd[16326]: password check failed for user (root) Dec 25 05:09:13 host sshd[16323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 user=root Dec 25 05:09:13 host sshd[16323]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 05:09:14 host sshd[16323]: Failed password for invalid user root from 106.10.122.53 port 43066 ssh2 Dec 25 05:09:15 host sshd[16323]: Connection closed by 106.10.122.53 port 43066 [preauth] Dec 25 05:15:35 host sshd[17189]: Invalid user user from 162.218.126.136 port 58940 Dec 25 05:15:35 host sshd[17189]: input_userauth_request: invalid user user [preauth] Dec 25 05:15:35 host sshd[17189]: pam_unix(sshd:auth): check pass; user unknown Dec 25 05:15:35 host sshd[17189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 25 05:15:36 host sshd[17189]: Failed password for invalid user user from 162.218.126.136 port 58940 ssh2 Dec 25 05:15:37 host sshd[17189]: Connection closed by 162.218.126.136 port 58940 [preauth] Dec 25 05:21:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 05:21:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:43 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 05:21:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 05:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 25 05:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 25 05:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 25 05:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 25 05:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 25 05:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 25 05:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 25 05:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 25 05:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 25 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=travelboniface user-2=wwwresourcehunte user-3=keralaholi user-4=wwwrmswll user-5=ugotscom user-6=wwwpmcresource user-7=a2zgroup user-8=dartsimp user-9=laundryboniface user-10=wwwkaretakers user-11=cochintaxi user-12=palco123 user-13=gifterman user-14=kottayamcalldriv user-15=phmetals user-16=wwwnexidigital user-17=mrsclean user-18=bonifacegroup user-19=wwwevmhonda user-20=straightcurve user-21=wwwletsstalkfood user-22=vfmassets user-23=shalinijames user-24=wwwtestugo user-25=pmcresources user-26=wwwkmaorg user-27=disposeat user-28=remysagr user-29=wwwkapin user-30=woodpeck feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 25 05:21:46 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 25 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 25 05:21:46 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 05:21:46 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=evmhonda.com --output=json Dec 25 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/test -e /home/wwwevmhonda/wordpress-backups Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 25 05:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && find -H /home/wwwevmhonda/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 25 05:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=letsstalkfood.com --output=json Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/wordpress-backups Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 25 05:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && find -H /home/wwwletsstalkfood/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 25 05:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=mrsclean.co.in --output=json Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 25 05:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 25 05:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 25 05:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 25 05:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=shalinijames.com --output=json Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/wordpress-backups Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 25 05:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && find -H /home/shalinijames/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 25 05:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=testugo.in --output=json Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 05:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 05:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 05:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 05:21:47 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=ugotechnologies.com --output=json Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=woodpeckerindia.com --output=json Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/wordpress-backups Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 25 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && find -H /home/woodpeck/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 25 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=panlys.com --output=json Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/wordpress-backups Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 25 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && find -H /home/palco123/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 25 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=resourcehunters.com --output=json Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/wordpress-backups Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 25 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && find -H /home/wwwresourcehunte/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 25 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /var/cpanel/licenseid_credentials.json Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=travelboniface ; COMMAND=/bin/cat /home/travelboniface/.wp-toolkit-identifier Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session opened for user travelboniface by (uid=0) Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session closed for user travelboniface Dec 25 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/cat /home/wwwresourcehunte/.wp-toolkit-identifier Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 25 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 25 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 25 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-v6PPgWM5Rrbe27U4.wp-toolkit-identifier Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 25 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-v6PPgWM5Rrbe27U4.wp-toolkit-identifier Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 25 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwrmswll ; COMMAND=/bin/cat /home/wwwrmswll/.wp-toolkit-identifier Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwrmswll by (uid=0) Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session closed for user wwwrmswll Dec 25 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwpmcresource ; COMMAND=/bin/cat /home/wwwpmcresource/.wp-toolkit-identifier Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwpmcresource by (uid=0) Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session closed for user wwwpmcresource Dec 25 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=a2zgroup ; COMMAND=/bin/cat /home/a2zgroup/.wp-toolkit-identifier Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session opened for user a2zgroup by (uid=0) Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session closed for user a2zgroup Dec 25 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=dartsimp ; COMMAND=/bin/cat /home/dartsimp/.wp-toolkit-identifier Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session opened for user dartsimp by (uid=0) Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session closed for user dartsimp Dec 25 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=laundryboniface ; COMMAND=/bin/cat /home/laundryboniface/.wp-toolkit-identifier Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session opened for user laundryboniface by (uid=0) Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session closed for user laundryboniface Dec 25 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkaretakers ; COMMAND=/bin/cat /home/wwwkaretakers/.wp-toolkit-identifier Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwkaretakers by (uid=0) Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session closed for user wwwkaretakers Dec 25 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=cochintaxi ; COMMAND=/bin/cat /home/cochintaxi/.wp-toolkit-identifier Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session opened for user cochintaxi by (uid=0) Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session closed for user cochintaxi Dec 25 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/cat /home/palco123/.wp-toolkit-identifier Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 25 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=gifterman ; COMMAND=/bin/cat /home/gifterman/.wp-toolkit-identifier Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session opened for user gifterman by (uid=0) Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session closed for user gifterman Dec 25 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=kottayamcalldriv ; COMMAND=/bin/cat /home/kottayamcalldriv/.wp-toolkit-identifier Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session opened for user kottayamcalldriv by (uid=0) Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session closed for user kottayamcalldriv Dec 25 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=phmetals ; COMMAND=/bin/cat /home/phmetals/.wp-toolkit-identifier Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session opened for user phmetals by (uid=0) Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session closed for user phmetals Dec 25 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwnexidigital ; COMMAND=/bin/cat /home/wwwnexidigital/.wp-toolkit-identifier Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwnexidigital by (uid=0) Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session closed for user wwwnexidigital Dec 25 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/.wp-toolkit-identifier Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 25 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=bonifacegroup ; COMMAND=/bin/cat /home/bonifacegroup/.wp-toolkit-identifier Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session opened for user bonifacegroup by (uid=0) Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session closed for user bonifacegroup Dec 25 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/cat /home/wwwevmhonda/.wp-toolkit-identifier Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 25 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=straightcurve ; COMMAND=/bin/cat /home/straightcurve/.wp-toolkit-identifier Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session opened for user straightcurve by (uid=0) Dec 25 05:21:49 host sudo: pam_unix(sudo:session): session closed for user straightcurve Dec 25 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/cat /home/wwwletsstalkfood/.wp-toolkit-identifier Dec 25 05:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 25 05:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 25 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=vfmassets ; COMMAND=/bin/cat /home/vfmassets/.wp-toolkit-identifier Dec 25 05:21:50 host sudo: pam_unix(sudo:session): session opened for user vfmassets by (uid=0) Dec 25 05:21:50 host sudo: pam_unix(sudo:session): session closed for user vfmassets Dec 25 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/cat /home/shalinijames/.wp-toolkit-identifier Dec 25 05:21:50 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 25 05:21:50 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 25 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/cat /home/wwwtestugo/.wp-toolkit-identifier Dec 25 05:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 05:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=pmcresources ; COMMAND=/bin/cat /home/pmcresources/.wp-toolkit-identifier Dec 25 05:21:50 host sudo: pam_unix(sudo:session): session opened for user pmcresources by (uid=0) Dec 25 05:21:50 host sudo: pam_unix(sudo:session): session closed for user pmcresources Dec 25 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkmaorg ; COMMAND=/bin/cat /home/wwwkmaorg/.wp-toolkit-identifier Dec 25 05:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwkmaorg by (uid=0) Dec 25 05:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwkmaorg Dec 25 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=disposeat ; COMMAND=/bin/cat /home/disposeat/.wp-toolkit-identifier Dec 25 05:21:50 host sudo: pam_unix(sudo:session): session opened for user disposeat by (uid=0) Dec 25 05:21:50 host sudo: pam_unix(sudo:session): session closed for user disposeat Dec 25 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=remysagr ; COMMAND=/bin/cat /home/remysagr/.wp-toolkit-identifier Dec 25 05:21:50 host sudo: pam_unix(sudo:session): session opened for user remysagr by (uid=0) Dec 25 05:21:50 host sudo: pam_unix(sudo:session): session closed for user remysagr Dec 25 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkapin ; COMMAND=/bin/cat /home/wwwkapin/.wp-toolkit-identifier Dec 25 05:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwkapin by (uid=0) Dec 25 05:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwkapin Dec 25 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/cat /home/woodpeck/.wp-toolkit-identifier Dec 25 05:21:50 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 25 05:21:50 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 25 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Dec 25 05:21:50 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 25 05:21:50 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 25 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Dec 25 05:21:50 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 25 05:21:50 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 25 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-MhYdcVh55lOrPKhI.wp-toolkit-identifier Dec 25 05:21:50 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 25 05:21:50 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 25 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-MhYdcVh55lOrPKhI.wp-toolkit-identifier Dec 25 05:21:50 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 25 05:21:50 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 25 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_shared_ip --output=json Dec 25 05:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_public_ip ip=167.71.234.10 --output=json Dec 25 05:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-m0T1TYaWHii2nCVU.~ Dec 25 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-m0T1TYaWHii2nCVU.~' Dec 25 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-m0T1TYaWHii2nCVU.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 25 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 25 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 25 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 25 05:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 25 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 25 05:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 25 05:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 25 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 25 05:21:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 25 05:21:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 25 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 25 05:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 05:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 25 05:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 05:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 25 05:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 05:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 25 05:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 05:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 25 05:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 05:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 05:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 25 05:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 25 05:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 25 05:33:19 host sshd[20412]: Invalid user user from 41.197.31.178 port 51132 Dec 25 05:33:19 host sshd[20412]: input_userauth_request: invalid user user [preauth] Dec 25 05:33:19 host sshd[20412]: pam_unix(sshd:auth): check pass; user unknown Dec 25 05:33:19 host sshd[20412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 25 05:33:22 host sshd[20412]: Failed password for invalid user user from 41.197.31.178 port 51132 ssh2 Dec 25 05:33:22 host sshd[20412]: Connection closed by 41.197.31.178 port 51132 [preauth] Dec 25 05:34:50 host sshd[20623]: Invalid user ns from 84.110.99.202 port 36262 Dec 25 05:34:50 host sshd[20623]: input_userauth_request: invalid user ns [preauth] Dec 25 05:34:50 host sshd[20623]: pam_unix(sshd:auth): check pass; user unknown Dec 25 05:34:50 host sshd[20623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.110.99.202 Dec 25 05:34:51 host sshd[20623]: Failed password for invalid user ns from 84.110.99.202 port 36262 ssh2 Dec 25 05:34:52 host sshd[20623]: Connection closed by 84.110.99.202 port 36262 [preauth] Dec 25 05:37:13 host sshd[21001]: Invalid user james from 107.189.30.59 port 37758 Dec 25 05:37:13 host sshd[21001]: input_userauth_request: invalid user james [preauth] Dec 25 05:37:13 host sshd[21001]: pam_unix(sshd:auth): check pass; user unknown Dec 25 05:37:13 host sshd[21001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Dec 25 05:37:15 host sshd[21001]: Failed password for invalid user james from 107.189.30.59 port 37758 ssh2 Dec 25 05:37:15 host sshd[21001]: Connection closed by 107.189.30.59 port 37758 [preauth] Dec 25 05:41:21 host sshd[21698]: User root from 183.62.183.14 not allowed because not listed in AllowUsers Dec 25 05:41:21 host sshd[21698]: input_userauth_request: invalid user root [preauth] Dec 25 05:41:22 host unix_chkpwd[21707]: password check failed for user (root) Dec 25 05:41:22 host sshd[21698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.62.183.14 user=root Dec 25 05:41:22 host sshd[21698]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 05:41:23 host sshd[21698]: Failed password for invalid user root from 183.62.183.14 port 50232 ssh2 Dec 25 05:41:24 host unix_chkpwd[21731]: password check failed for user (root) Dec 25 05:41:24 host sshd[21698]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 05:41:27 host sshd[21698]: Failed password for invalid user root from 183.62.183.14 port 50232 ssh2 Dec 25 05:41:27 host unix_chkpwd[21734]: password check failed for user (root) Dec 25 05:41:27 host sshd[21698]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 05:41:29 host sshd[21698]: Failed password for invalid user root from 183.62.183.14 port 50232 ssh2 Dec 25 05:41:29 host unix_chkpwd[21742]: password check failed for user (root) Dec 25 05:41:29 host sshd[21698]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 05:41:31 host sshd[21698]: Failed password for invalid user root from 183.62.183.14 port 50232 ssh2 Dec 25 05:41:36 host sshd[21773]: Invalid user ci from 45.93.201.90 port 41272 Dec 25 05:41:36 host sshd[21773]: input_userauth_request: invalid user ci [preauth] Dec 25 05:41:36 host sshd[21773]: pam_unix(sshd:auth): check pass; user unknown Dec 25 05:41:36 host sshd[21773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 25 05:41:39 host sshd[21773]: Failed password for invalid user ci from 45.93.201.90 port 41272 ssh2 Dec 25 05:41:42 host sshd[21773]: pam_unix(sshd:auth): check pass; user unknown Dec 25 05:41:44 host sshd[21773]: Failed password for invalid user ci from 45.93.201.90 port 41272 ssh2 Dec 25 05:41:47 host sshd[21773]: pam_unix(sshd:auth): check pass; user unknown Dec 25 05:41:48 host sshd[21773]: Failed password for invalid user ci from 45.93.201.90 port 41272 ssh2 Dec 25 05:41:52 host sshd[21773]: Connection closed by 45.93.201.90 port 41272 [preauth] Dec 25 05:41:52 host sshd[21773]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 25 05:46:39 host sshd[22492]: Invalid user testuser from 92.46.108.20 port 42286 Dec 25 05:46:39 host sshd[22492]: input_userauth_request: invalid user testuser [preauth] Dec 25 05:46:39 host sshd[22492]: pam_unix(sshd:auth): check pass; user unknown Dec 25 05:46:39 host sshd[22492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 25 05:46:40 host sshd[22492]: Failed password for invalid user testuser from 92.46.108.20 port 42286 ssh2 Dec 25 05:46:41 host sshd[22492]: Connection closed by 92.46.108.20 port 42286 [preauth] Dec 25 05:58:17 host sshd[24389]: User root from 217.115.92.230 not allowed because not listed in AllowUsers Dec 25 05:58:17 host sshd[24389]: input_userauth_request: invalid user root [preauth] Dec 25 05:58:17 host unix_chkpwd[24392]: password check failed for user (root) Dec 25 05:58:17 host sshd[24389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.115.92.230 user=root Dec 25 05:58:17 host sshd[24389]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 05:58:19 host sshd[24389]: Failed password for invalid user root from 217.115.92.230 port 59818 ssh2 Dec 25 05:58:20 host sshd[24389]: Received disconnect from 217.115.92.230 port 59818:11: Bye Bye [preauth] Dec 25 05:58:20 host sshd[24389]: Disconnected from 217.115.92.230 port 59818 [preauth] Dec 25 05:58:53 host sshd[24461]: User root from 88.150.137.118 not allowed because not listed in AllowUsers Dec 25 05:58:53 host sshd[24461]: input_userauth_request: invalid user root [preauth] Dec 25 05:58:53 host unix_chkpwd[24464]: password check failed for user (root) Dec 25 05:58:53 host sshd[24461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.150.137.118 user=root Dec 25 05:58:53 host sshd[24461]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 05:58:55 host sshd[24461]: Failed password for invalid user root from 88.150.137.118 port 39786 ssh2 Dec 25 05:58:55 host sshd[24461]: Received disconnect from 88.150.137.118 port 39786:11: Bye Bye [preauth] Dec 25 05:58:55 host sshd[24461]: Disconnected from 88.150.137.118 port 39786 [preauth] Dec 25 05:59:08 host sshd[24491]: User root from 203.205.37.233 not allowed because not listed in AllowUsers Dec 25 05:59:08 host sshd[24491]: input_userauth_request: invalid user root [preauth] Dec 25 05:59:08 host unix_chkpwd[24494]: password check failed for user (root) Dec 25 05:59:08 host sshd[24491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.205.37.233 user=root Dec 25 05:59:08 host sshd[24491]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 05:59:10 host sshd[24491]: Failed password for invalid user root from 203.205.37.233 port 58294 ssh2 Dec 25 05:59:10 host sshd[24491]: Received disconnect from 203.205.37.233 port 58294:11: Bye Bye [preauth] Dec 25 05:59:10 host sshd[24491]: Disconnected from 203.205.37.233 port 58294 [preauth] Dec 25 06:00:49 host sshd[24823]: User root from 103.78.88.51 not allowed because not listed in AllowUsers Dec 25 06:00:49 host sshd[24823]: input_userauth_request: invalid user root [preauth] Dec 25 06:00:49 host unix_chkpwd[24827]: password check failed for user (root) Dec 25 06:00:49 host sshd[24823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.78.88.51 user=root Dec 25 06:00:49 host sshd[24823]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 06:00:51 host sshd[24823]: Failed password for invalid user root from 103.78.88.51 port 60378 ssh2 Dec 25 06:00:51 host sshd[24823]: Received disconnect from 103.78.88.51 port 60378:11: Bye Bye [preauth] Dec 25 06:00:51 host sshd[24823]: Disconnected from 103.78.88.51 port 60378 [preauth] Dec 25 06:01:41 host sshd[24941]: User root from 164.92.117.178 not allowed because not listed in AllowUsers Dec 25 06:01:41 host sshd[24941]: input_userauth_request: invalid user root [preauth] Dec 25 06:01:41 host unix_chkpwd[24945]: password check failed for user (root) Dec 25 06:01:41 host sshd[24941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.117.178 user=root Dec 25 06:01:41 host sshd[24941]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 06:01:43 host sshd[24941]: Failed password for invalid user root from 164.92.117.178 port 41702 ssh2 Dec 25 06:01:43 host sshd[24941]: Received disconnect from 164.92.117.178 port 41702:11: Bye Bye [preauth] Dec 25 06:01:43 host sshd[24941]: Disconnected from 164.92.117.178 port 41702 [preauth] Dec 25 06:03:13 host sshd[25132]: User root from 217.115.92.230 not allowed because not listed in AllowUsers Dec 25 06:03:13 host sshd[25132]: input_userauth_request: invalid user root [preauth] Dec 25 06:03:13 host unix_chkpwd[25137]: password check failed for user (root) Dec 25 06:03:13 host sshd[25132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.115.92.230 user=root Dec 25 06:03:13 host sshd[25132]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 06:03:15 host sshd[25132]: Failed password for invalid user root from 217.115.92.230 port 56690 ssh2 Dec 25 06:03:15 host sshd[25132]: Received disconnect from 217.115.92.230 port 56690:11: Bye Bye [preauth] Dec 25 06:03:15 host sshd[25132]: Disconnected from 217.115.92.230 port 56690 [preauth] Dec 25 06:03:51 host sshd[25242]: User root from 88.150.137.118 not allowed because not listed in AllowUsers Dec 25 06:03:51 host sshd[25242]: input_userauth_request: invalid user root [preauth] Dec 25 06:03:51 host unix_chkpwd[25245]: password check failed for user (root) Dec 25 06:03:51 host sshd[25242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.150.137.118 user=root Dec 25 06:03:51 host sshd[25242]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 06:03:54 host sshd[25242]: Failed password for invalid user root from 88.150.137.118 port 35546 ssh2 Dec 25 06:03:54 host sshd[25242]: Received disconnect from 88.150.137.118 port 35546:11: Bye Bye [preauth] Dec 25 06:03:54 host sshd[25242]: Disconnected from 88.150.137.118 port 35546 [preauth] Dec 25 06:04:30 host sshd[25350]: User root from 164.92.117.178 not allowed because not listed in AllowUsers Dec 25 06:04:30 host sshd[25350]: input_userauth_request: invalid user root [preauth] Dec 25 06:04:30 host unix_chkpwd[25354]: password check failed for user (root) Dec 25 06:04:30 host sshd[25350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.117.178 user=root Dec 25 06:04:30 host sshd[25350]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 06:04:32 host sshd[25350]: Failed password for invalid user root from 164.92.117.178 port 48234 ssh2 Dec 25 06:04:32 host sshd[25350]: Received disconnect from 164.92.117.178 port 48234:11: Bye Bye [preauth] Dec 25 06:04:32 host sshd[25350]: Disconnected from 164.92.117.178 port 48234 [preauth] Dec 25 06:05:13 host sshd[25577]: User root from 103.78.88.51 not allowed because not listed in AllowUsers Dec 25 06:05:13 host sshd[25577]: input_userauth_request: invalid user root [preauth] Dec 25 06:05:13 host unix_chkpwd[25584]: password check failed for user (root) Dec 25 06:05:13 host sshd[25577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.78.88.51 user=root Dec 25 06:05:13 host sshd[25577]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 06:05:16 host sshd[25577]: Failed password for invalid user root from 103.78.88.51 port 48414 ssh2 Dec 25 06:05:16 host sshd[25577]: Received disconnect from 103.78.88.51 port 48414:11: Bye Bye [preauth] Dec 25 06:05:16 host sshd[25577]: Disconnected from 103.78.88.51 port 48414 [preauth] Dec 25 06:10:03 host sshd[26222]: Connection closed by 203.205.37.233 port 47278 [preauth] Dec 25 06:11:14 host sshd[26523]: User root from 203.205.37.233 not allowed because not listed in AllowUsers Dec 25 06:11:14 host sshd[26523]: input_userauth_request: invalid user root [preauth] Dec 25 06:11:14 host unix_chkpwd[26525]: password check failed for user (root) Dec 25 06:11:14 host sshd[26523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.205.37.233 user=root Dec 25 06:11:14 host sshd[26523]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 06:11:15 host sshd[26523]: Failed password for invalid user root from 203.205.37.233 port 39828 ssh2 Dec 25 06:11:16 host sshd[26523]: Received disconnect from 203.205.37.233 port 39828:11: Bye Bye [preauth] Dec 25 06:11:16 host sshd[26523]: Disconnected from 203.205.37.233 port 39828 [preauth] Dec 25 06:14:06 host sshd[26863]: Connection closed by 45.79.181.179 port 30672 [preauth] Dec 25 06:14:07 host sshd[26866]: Connection closed by 45.79.181.179 port 30688 [preauth] Dec 25 06:14:09 host sshd[26869]: Connection closed by 45.79.181.179 port 34024 [preauth] Dec 25 06:21:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 06:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 06:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 06:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 06:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 06:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 06:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 06:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 06:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 06:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 25 06:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 06:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 06:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 25 06:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 06:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 06:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 25 06:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 06:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 06:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 25 06:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 06:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 06:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 25 06:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 06:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 06:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 25 06:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 06:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 06:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 25 06:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 06:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 06:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 25 06:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 06:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 25 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkapin user-2=woodpeck user-3=remysagr user-4=disposeat user-5=wwwkmaorg user-6=pmcresources user-7=vfmassets user-8=wwwtestugo user-9=shalinijames user-10=straightcurve user-11=wwwletsstalkfood user-12=bonifacegroup user-13=wwwevmhonda user-14=wwwnexidigital user-15=mrsclean user-16=gifterman user-17=palco123 user-18=phmetals user-19=kottayamcalldriv user-20=cochintaxi user-21=wwwkaretakers user-22=laundryboniface user-23=dartsimp user-24=a2zgroup user-25=wwwpmcresource user-26=wwwrmswll user-27=keralaholi user-28=wwwresourcehunte user-29=ugotscom user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 25 06:21:46 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 25 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 06:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 06:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 06:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 06:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 06:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-LKv3tQcrDtAXKA4S.~ Dec 25 06:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 06:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 06:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-LKv3tQcrDtAXKA4S.~' Dec 25 06:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 06:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 06:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-LKv3tQcrDtAXKA4S.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 06:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 06:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 06:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 25 06:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 06:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 06:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 25 06:21:47 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 06:21:47 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 25 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 25 06:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 25 06:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 25 06:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 25 06:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 25 06:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 25 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 25 06:21:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 25 06:21:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 25 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 25 06:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 06:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 25 06:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 06:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 06:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 25 06:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 06:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 25 06:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 06:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 06:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 25 06:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 06:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 06:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 25 06:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 25 06:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 25 06:29:49 host sshd[29129]: Invalid user vyatta from 162.218.126.136 port 58950 Dec 25 06:29:49 host sshd[29129]: input_userauth_request: invalid user vyatta [preauth] Dec 25 06:29:50 host sshd[29129]: pam_unix(sshd:auth): check pass; user unknown Dec 25 06:29:50 host sshd[29129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 25 06:29:52 host sshd[29129]: Failed password for invalid user vyatta from 162.218.126.136 port 58950 ssh2 Dec 25 06:29:52 host sshd[29129]: Connection closed by 162.218.126.136 port 58950 [preauth] Dec 25 06:40:37 host sshd[30592]: User root from 103.13.40.2 not allowed because not listed in AllowUsers Dec 25 06:40:37 host sshd[30592]: input_userauth_request: invalid user root [preauth] Dec 25 06:40:37 host unix_chkpwd[30594]: password check failed for user (root) Dec 25 06:40:37 host sshd[30592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 user=root Dec 25 06:40:37 host sshd[30592]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 06:40:39 host sshd[30592]: Failed password for invalid user root from 103.13.40.2 port 58810 ssh2 Dec 25 06:40:39 host sshd[30592]: Connection closed by 103.13.40.2 port 58810 [preauth] Dec 25 06:44:33 host sshd[31137]: Invalid user nodeproxy from 106.10.122.53 port 55838 Dec 25 06:44:33 host sshd[31137]: input_userauth_request: invalid user nodeproxy [preauth] Dec 25 06:44:33 host sshd[31137]: pam_unix(sshd:auth): check pass; user unknown Dec 25 06:44:33 host sshd[31137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 25 06:44:35 host sshd[31137]: Failed password for invalid user nodeproxy from 106.10.122.53 port 55838 ssh2 Dec 25 06:44:35 host sshd[31137]: Connection closed by 106.10.122.53 port 55838 [preauth] Dec 25 06:50:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 06:50:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 06:50:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 06:50:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 06:50:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 06:50:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 06:50:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 06:50:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 06:50:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 06:50:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 25 06:50:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 06:50:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 06:50:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 25 06:50:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 06:50:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 06:50:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 25 06:50:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 06:50:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 06:50:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 25 06:50:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 06:50:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 07:01:20 host sshd[1026]: Invalid user zhang from 84.110.99.202 port 43466 Dec 25 07:01:20 host sshd[1026]: input_userauth_request: invalid user zhang [preauth] Dec 25 07:01:20 host sshd[1026]: pam_unix(sshd:auth): check pass; user unknown Dec 25 07:01:20 host sshd[1026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.110.99.202 Dec 25 07:01:21 host sshd[1026]: Failed password for invalid user zhang from 84.110.99.202 port 43466 ssh2 Dec 25 07:01:21 host sshd[1026]: Connection closed by 84.110.99.202 port 43466 [preauth] Dec 25 07:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 07:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 07:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 07:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 07:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 07:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 07:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 07:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 07:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 07:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 25 07:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 07:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 07:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 25 07:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 07:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 07:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 25 07:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 07:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 07:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 25 07:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 07:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 07:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 25 07:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 07:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 07:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 25 07:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 07:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 07:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 25 07:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 07:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 07:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 25 07:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 07:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 25 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=dartsimp user-2=a2zgroup user-3=laundryboniface user-4=cochintaxi user-5=wwwkaretakers user-6=travelboniface user-7=wwwrmswll user-8=wwwresourcehunte user-9=keralaholi user-10=ugotscom user-11=wwwpmcresource user-12=vfmassets user-13=wwwtestugo user-14=shalinijames user-15=pmcresources user-16=disposeat user-17=wwwkmaorg user-18=remysagr user-19=wwwkapin user-20=woodpeck user-21=gifterman user-22=palco123 user-23=phmetals user-24=kottayamcalldriv user-25=wwwnexidigital user-26=mrsclean user-27=bonifacegroup user-28=wwwevmhonda user-29=straightcurve user-30=wwwletsstalkfood feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 25 07:21:50 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 25 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ZEDxvQyDG0Id7JWN.~ Dec 25 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ZEDxvQyDG0Id7JWN.~' Dec 25 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ZEDxvQyDG0Id7JWN.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 25 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 25 07:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 07:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 07:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 07:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 07:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 07:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 07:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 07:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 25 07:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 07:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 25 07:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 25 07:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 25 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 25 07:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 25 07:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 25 07:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 25 07:21:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 25 07:21:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 25 07:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 25 07:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 07:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 07:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 25 07:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 07:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 07:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 25 07:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 07:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 07:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 25 07:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 07:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 07:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 25 07:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 07:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 07:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 25 07:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 25 07:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 25 07:25:31 host sshd[5242]: Invalid user user from 41.197.31.178 port 54664 Dec 25 07:25:31 host sshd[5242]: input_userauth_request: invalid user user [preauth] Dec 25 07:25:32 host sshd[5242]: pam_unix(sshd:auth): check pass; user unknown Dec 25 07:25:32 host sshd[5242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 25 07:25:34 host sshd[5242]: Failed password for invalid user user from 41.197.31.178 port 54664 ssh2 Dec 25 07:25:34 host sshd[5242]: Connection closed by 41.197.31.178 port 54664 [preauth] Dec 25 07:27:43 host sshd[5479]: Invalid user cj from 45.93.201.90 port 35066 Dec 25 07:27:43 host sshd[5479]: input_userauth_request: invalid user cj [preauth] Dec 25 07:27:43 host sshd[5479]: pam_unix(sshd:auth): check pass; user unknown Dec 25 07:27:43 host sshd[5479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 25 07:27:46 host sshd[5479]: Failed password for invalid user cj from 45.93.201.90 port 35066 ssh2 Dec 25 07:27:49 host sshd[5479]: pam_unix(sshd:auth): check pass; user unknown Dec 25 07:27:51 host sshd[5479]: Failed password for invalid user cj from 45.93.201.90 port 35066 ssh2 Dec 25 07:27:55 host sshd[5479]: pam_unix(sshd:auth): check pass; user unknown Dec 25 07:27:57 host sshd[5479]: Failed password for invalid user cj from 45.93.201.90 port 35066 ssh2 Dec 25 07:28:00 host sshd[5479]: Connection closed by 45.93.201.90 port 35066 [preauth] Dec 25 07:28:00 host sshd[5479]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 25 07:35:06 host sshd[6588]: Did not receive identification string from 120.48.15.186 port 54202 Dec 25 07:35:08 host sshd[6591]: User mail from 120.48.15.186 not allowed because not listed in AllowUsers Dec 25 07:35:08 host sshd[6591]: input_userauth_request: invalid user mail [preauth] Dec 25 07:35:08 host sshd[6590]: Invalid user linaro from 120.48.15.186 port 56038 Dec 25 07:35:08 host sshd[6590]: input_userauth_request: invalid user linaro [preauth] Dec 25 07:35:08 host sshd[6595]: Invalid user guest from 120.48.15.186 port 56026 Dec 25 07:35:08 host sshd[6595]: input_userauth_request: invalid user guest [preauth] Dec 25 07:35:08 host sshd[6594]: Invalid user admin from 120.48.15.186 port 56030 Dec 25 07:35:08 host sshd[6594]: input_userauth_request: invalid user admin [preauth] Dec 25 07:35:08 host sshd[6597]: Invalid user ftpuser from 120.48.15.186 port 56024 Dec 25 07:35:08 host sshd[6597]: input_userauth_request: invalid user ftpuser [preauth] Dec 25 07:35:08 host sshd[6604]: Invalid user emqx from 120.48.15.186 port 56032 Dec 25 07:35:08 host sshd[6604]: input_userauth_request: invalid user emqx [preauth] Dec 25 07:35:08 host sshd[6590]: pam_unix(sshd:auth): check pass; user unknown Dec 25 07:35:08 host sshd[6590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.15.186 Dec 25 07:35:08 host sshd[6595]: pam_unix(sshd:auth): check pass; user unknown Dec 25 07:35:08 host sshd[6595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.15.186 Dec 25 07:35:08 host sshd[6594]: pam_unix(sshd:auth): check pass; user unknown Dec 25 07:35:08 host sshd[6594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.15.186 Dec 25 07:35:08 host sshd[6597]: pam_unix(sshd:auth): check pass; user unknown Dec 25 07:35:08 host sshd[6597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.15.186 Dec 25 07:35:08 host sshd[6604]: pam_unix(sshd:auth): check pass; user unknown Dec 25 07:35:08 host sshd[6604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.15.186 Dec 25 07:35:08 host unix_chkpwd[6607]: password check failed for user (mail) Dec 25 07:35:08 host sshd[6591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.15.186 user=mail Dec 25 07:35:08 host sshd[6591]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mail" Dec 25 07:35:09 host sshd[6592]: Invalid user user from 120.48.15.186 port 56040 Dec 25 07:35:09 host sshd[6592]: input_userauth_request: invalid user user [preauth] Dec 25 07:35:09 host sshd[6589]: User centos from 120.48.15.186 not allowed because not listed in AllowUsers Dec 25 07:35:09 host sshd[6589]: input_userauth_request: invalid user centos [preauth] Dec 25 07:35:09 host sshd[6592]: pam_unix(sshd:auth): check pass; user unknown Dec 25 07:35:09 host sshd[6592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.15.186 Dec 25 07:35:09 host unix_chkpwd[6611]: password check failed for user (centos) Dec 25 07:35:09 host sshd[6589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.15.186 user=centos Dec 25 07:35:11 host sshd[6614]: Invalid user test from 120.48.15.186 port 56042 Dec 25 07:35:11 host sshd[6614]: input_userauth_request: invalid user test [preauth] Dec 25 07:35:11 host sshd[6590]: Failed password for invalid user linaro from 120.48.15.186 port 56038 ssh2 Dec 25 07:35:11 host sshd[6595]: Failed password for invalid user guest from 120.48.15.186 port 56026 ssh2 Dec 25 07:35:11 host sshd[6594]: Failed password for invalid user admin from 120.48.15.186 port 56030 ssh2 Dec 25 07:35:11 host sshd[6597]: Failed password for invalid user ftpuser from 120.48.15.186 port 56024 ssh2 Dec 25 07:35:11 host sshd[6604]: Failed password for invalid user emqx from 120.48.15.186 port 56032 ssh2 Dec 25 07:35:11 host sshd[6591]: Failed password for invalid user mail from 120.48.15.186 port 56028 ssh2 Dec 25 07:35:11 host sshd[6614]: pam_unix(sshd:auth): check pass; user unknown Dec 25 07:35:11 host sshd[6614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.15.186 Dec 25 07:35:11 host sshd[6592]: Failed password for invalid user user from 120.48.15.186 port 56040 ssh2 Dec 25 07:35:11 host sshd[6590]: Connection closed by 120.48.15.186 port 56038 [preauth] Dec 25 07:35:11 host sshd[6594]: Connection closed by 120.48.15.186 port 56030 [preauth] Dec 25 07:35:11 host sshd[6595]: Connection closed by 120.48.15.186 port 56026 [preauth] Dec 25 07:35:11 host sshd[6597]: Connection closed by 120.48.15.186 port 56024 [preauth] Dec 25 07:35:11 host sshd[6604]: Connection closed by 120.48.15.186 port 56032 [preauth] Dec 25 07:35:11 host sshd[6589]: Failed password for invalid user centos from 120.48.15.186 port 56036 ssh2 Dec 25 07:35:12 host sshd[6589]: Connection closed by 120.48.15.186 port 56036 [preauth] Dec 25 07:35:12 host sshd[6608]: Invalid user deploy from 120.48.15.186 port 56034 Dec 25 07:35:12 host sshd[6608]: input_userauth_request: invalid user deploy [preauth] Dec 25 07:35:12 host sshd[6591]: Connection closed by 120.48.15.186 port 56028 [preauth] Dec 25 07:35:12 host sshd[6608]: pam_unix(sshd:auth): check pass; user unknown Dec 25 07:35:12 host sshd[6608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.15.186 Dec 25 07:35:12 host sshd[6592]: Connection closed by 120.48.15.186 port 56040 [preauth] Dec 25 07:35:13 host sshd[6614]: Failed password for invalid user test from 120.48.15.186 port 56042 ssh2 Dec 25 07:35:13 host sshd[6614]: Connection closed by 120.48.15.186 port 56042 [preauth] Dec 25 07:35:14 host sshd[6608]: Failed password for invalid user deploy from 120.48.15.186 port 56034 ssh2 Dec 25 07:37:35 host sshd[6920]: User root from 92.46.108.20 not allowed because not listed in AllowUsers Dec 25 07:37:35 host sshd[6920]: input_userauth_request: invalid user root [preauth] Dec 25 07:37:35 host unix_chkpwd[6925]: password check failed for user (root) Dec 25 07:37:35 host sshd[6920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 user=root Dec 25 07:37:35 host sshd[6920]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 07:37:38 host sshd[6920]: Failed password for invalid user root from 92.46.108.20 port 33568 ssh2 Dec 25 07:37:38 host sshd[6920]: Connection closed by 92.46.108.20 port 33568 [preauth] Dec 25 07:44:07 host sshd[7741]: Invalid user user1 from 162.218.126.136 port 55588 Dec 25 07:44:07 host sshd[7741]: input_userauth_request: invalid user user1 [preauth] Dec 25 07:44:08 host sshd[7741]: pam_unix(sshd:auth): check pass; user unknown Dec 25 07:44:08 host sshd[7741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 25 07:44:10 host sshd[7741]: Failed password for invalid user user1 from 162.218.126.136 port 55588 ssh2 Dec 25 07:44:10 host sshd[7741]: Connection closed by 162.218.126.136 port 55588 [preauth] Dec 25 07:52:13 host sshd[9206]: User root from 219.91.170.99 not allowed because not listed in AllowUsers Dec 25 07:52:13 host sshd[9206]: input_userauth_request: invalid user root [preauth] Dec 25 07:52:13 host unix_chkpwd[9209]: password check failed for user (root) Dec 25 07:52:13 host sshd[9206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.91.170.99 user=root Dec 25 07:52:13 host sshd[9206]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 07:52:15 host sshd[9206]: Failed password for invalid user root from 219.91.170.99 port 33679 ssh2 Dec 25 07:52:15 host sshd[9206]: Received disconnect from 219.91.170.99 port 33679:11: Bye Bye [preauth] Dec 25 07:52:15 host sshd[9206]: Disconnected from 219.91.170.99 port 33679 [preauth] Dec 25 07:52:46 host sshd[9275]: User root from 221.161.235.166 not allowed because not listed in AllowUsers Dec 25 07:52:46 host sshd[9275]: input_userauth_request: invalid user root [preauth] Dec 25 07:52:46 host unix_chkpwd[9279]: password check failed for user (root) Dec 25 07:52:46 host sshd[9275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.161.235.166 user=root Dec 25 07:52:46 host sshd[9275]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 07:52:48 host sshd[9275]: Failed password for invalid user root from 221.161.235.166 port 26024 ssh2 Dec 25 07:52:48 host sshd[9275]: Received disconnect from 221.161.235.166 port 26024:11: Bye Bye [preauth] Dec 25 07:52:48 host sshd[9275]: Disconnected from 221.161.235.166 port 26024 [preauth] Dec 25 07:53:01 host sshd[9299]: User root from 210.104.76.192 not allowed because not listed in AllowUsers Dec 25 07:53:01 host sshd[9299]: input_userauth_request: invalid user root [preauth] Dec 25 07:53:01 host unix_chkpwd[9310]: password check failed for user (root) Dec 25 07:53:01 host sshd[9299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.104.76.192 user=root Dec 25 07:53:01 host sshd[9299]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 07:53:03 host sshd[9299]: Failed password for invalid user root from 210.104.76.192 port 51142 ssh2 Dec 25 07:53:03 host sshd[9299]: Received disconnect from 210.104.76.192 port 51142:11: Bye Bye [preauth] Dec 25 07:53:03 host sshd[9299]: Disconnected from 210.104.76.192 port 51142 [preauth] Dec 25 07:53:28 host sshd[9375]: User root from 202.169.46.155 not allowed because not listed in AllowUsers Dec 25 07:53:28 host sshd[9375]: input_userauth_request: invalid user root [preauth] Dec 25 07:53:28 host unix_chkpwd[9378]: password check failed for user (root) Dec 25 07:53:28 host sshd[9375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.169.46.155 user=root Dec 25 07:53:28 host sshd[9375]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 07:53:30 host sshd[9375]: Failed password for invalid user root from 202.169.46.155 port 51951 ssh2 Dec 25 07:53:30 host sshd[9375]: Received disconnect from 202.169.46.155 port 51951:11: Bye Bye [preauth] Dec 25 07:53:30 host sshd[9375]: Disconnected from 202.169.46.155 port 51951 [preauth] Dec 25 07:54:19 host sshd[9450]: User root from 34.101.150.10 not allowed because not listed in AllowUsers Dec 25 07:54:19 host sshd[9450]: input_userauth_request: invalid user root [preauth] Dec 25 07:54:19 host unix_chkpwd[9453]: password check failed for user (root) Dec 25 07:54:19 host sshd[9450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.101.150.10 user=root Dec 25 07:54:19 host sshd[9450]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 07:54:21 host sshd[9450]: Failed password for invalid user root from 34.101.150.10 port 40470 ssh2 Dec 25 07:54:21 host sshd[9450]: Received disconnect from 34.101.150.10 port 40470:11: Bye Bye [preauth] Dec 25 07:54:21 host sshd[9450]: Disconnected from 34.101.150.10 port 40470 [preauth] Dec 25 07:54:51 host sshd[9635]: User root from 129.150.180.148 not allowed because not listed in AllowUsers Dec 25 07:54:51 host sshd[9635]: input_userauth_request: invalid user root [preauth] Dec 25 07:54:51 host unix_chkpwd[9638]: password check failed for user (root) Dec 25 07:54:51 host sshd[9635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.150.180.148 user=root Dec 25 07:54:51 host sshd[9635]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 07:54:52 host sshd[9635]: Failed password for invalid user root from 129.150.180.148 port 42374 ssh2 Dec 25 07:54:52 host sshd[9635]: Received disconnect from 129.150.180.148 port 42374:11: Bye Bye [preauth] Dec 25 07:54:52 host sshd[9635]: Disconnected from 129.150.180.148 port 42374 [preauth] Dec 25 07:57:13 host sshd[9908]: User root from 24.19.195.182 not allowed because not listed in AllowUsers Dec 25 07:57:13 host sshd[9908]: input_userauth_request: invalid user root [preauth] Dec 25 07:57:13 host unix_chkpwd[9913]: password check failed for user (root) Dec 25 07:57:13 host sshd[9908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.19.195.182 user=root Dec 25 07:57:13 host sshd[9908]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 07:57:15 host sshd[9908]: Failed password for invalid user root from 24.19.195.182 port 54776 ssh2 Dec 25 07:57:16 host sshd[9908]: Received disconnect from 24.19.195.182 port 54776:11: Bye Bye [preauth] Dec 25 07:57:16 host sshd[9908]: Disconnected from 24.19.195.182 port 54776 [preauth] Dec 25 07:57:59 host sshd[9995]: User root from 219.91.170.99 not allowed because not listed in AllowUsers Dec 25 07:57:59 host sshd[9995]: input_userauth_request: invalid user root [preauth] Dec 25 07:57:59 host unix_chkpwd[9997]: password check failed for user (root) Dec 25 07:57:59 host sshd[9995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.91.170.99 user=root Dec 25 07:57:59 host sshd[9995]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 07:58:01 host sshd[9995]: Failed password for invalid user root from 219.91.170.99 port 31938 ssh2 Dec 25 07:58:01 host sshd[9995]: Received disconnect from 219.91.170.99 port 31938:11: Bye Bye [preauth] Dec 25 07:58:01 host sshd[9995]: Disconnected from 219.91.170.99 port 31938 [preauth] Dec 25 07:58:26 host sshd[10099]: User root from 221.161.235.166 not allowed because not listed in AllowUsers Dec 25 07:58:26 host sshd[10099]: input_userauth_request: invalid user root [preauth] Dec 25 07:58:26 host unix_chkpwd[10102]: password check failed for user (root) Dec 25 07:58:26 host sshd[10099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.161.235.166 user=root Dec 25 07:58:26 host sshd[10099]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 07:58:28 host sshd[10099]: Failed password for invalid user root from 221.161.235.166 port 32041 ssh2 Dec 25 07:58:28 host sshd[10099]: Received disconnect from 221.161.235.166 port 32041:11: Bye Bye [preauth] Dec 25 07:58:28 host sshd[10099]: Disconnected from 221.161.235.166 port 32041 [preauth] Dec 25 07:58:52 host sshd[10160]: User root from 24.19.195.182 not allowed because not listed in AllowUsers Dec 25 07:58:52 host sshd[10160]: input_userauth_request: invalid user root [preauth] Dec 25 07:58:52 host unix_chkpwd[10169]: password check failed for user (root) Dec 25 07:58:52 host sshd[10160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.19.195.182 user=root Dec 25 07:58:52 host sshd[10160]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 07:58:53 host sshd[10164]: User root from 129.150.180.148 not allowed because not listed in AllowUsers Dec 25 07:58:53 host sshd[10164]: input_userauth_request: invalid user root [preauth] Dec 25 07:58:53 host unix_chkpwd[10170]: password check failed for user (root) Dec 25 07:58:53 host sshd[10164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.150.180.148 user=root Dec 25 07:58:53 host sshd[10164]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 07:58:54 host sshd[10160]: Failed password for invalid user root from 24.19.195.182 port 52820 ssh2 Dec 25 07:58:54 host sshd[10164]: Failed password for invalid user root from 129.150.180.148 port 9185 ssh2 Dec 25 08:00:01 host sshd[10351]: User root from 210.104.76.192 not allowed because not listed in AllowUsers Dec 25 08:00:01 host sshd[10351]: input_userauth_request: invalid user root [preauth] Dec 25 08:00:01 host unix_chkpwd[10400]: password check failed for user (root) Dec 25 08:00:01 host sshd[10351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.104.76.192 user=root Dec 25 08:00:01 host sshd[10351]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 08:00:03 host sshd[10351]: Failed password for invalid user root from 210.104.76.192 port 51322 ssh2 Dec 25 08:00:03 host sshd[10351]: Received disconnect from 210.104.76.192 port 51322:11: Bye Bye [preauth] Dec 25 08:00:03 host sshd[10351]: Disconnected from 210.104.76.192 port 51322 [preauth] Dec 25 08:00:24 host sshd[10591]: User root from 34.101.150.10 not allowed because not listed in AllowUsers Dec 25 08:00:24 host sshd[10591]: input_userauth_request: invalid user root [preauth] Dec 25 08:00:24 host unix_chkpwd[10622]: password check failed for user (root) Dec 25 08:00:24 host sshd[10591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.101.150.10 user=root Dec 25 08:00:24 host sshd[10591]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 08:00:26 host sshd[10591]: Failed password for invalid user root from 34.101.150.10 port 41620 ssh2 Dec 25 08:00:26 host sshd[10591]: Received disconnect from 34.101.150.10 port 41620:11: Bye Bye [preauth] Dec 25 08:00:26 host sshd[10591]: Disconnected from 34.101.150.10 port 41620 [preauth] Dec 25 08:01:42 host sshd[10814]: User root from 202.169.46.155 not allowed because not listed in AllowUsers Dec 25 08:01:42 host sshd[10814]: input_userauth_request: invalid user root [preauth] Dec 25 08:01:42 host unix_chkpwd[10819]: password check failed for user (root) Dec 25 08:01:42 host sshd[10814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.169.46.155 user=root Dec 25 08:01:42 host sshd[10814]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 08:01:44 host sshd[10814]: Failed password for invalid user root from 202.169.46.155 port 44629 ssh2 Dec 25 08:01:44 host sshd[10814]: Received disconnect from 202.169.46.155 port 44629:11: Bye Bye [preauth] Dec 25 08:01:44 host sshd[10814]: Disconnected from 202.169.46.155 port 44629 [preauth] Dec 25 08:03:23 host sshd[11045]: Bad protocol version identification 'MGLNDD_167.71.234.10_22' from 198.199.97.57 port 34454 Dec 25 08:03:25 host sshd[11067]: User root from 164.92.192.229 not allowed because not listed in AllowUsers Dec 25 08:03:25 host sshd[11067]: input_userauth_request: invalid user root [preauth] Dec 25 08:03:25 host unix_chkpwd[11070]: password check failed for user (root) Dec 25 08:03:25 host sshd[11067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.192.229 user=root Dec 25 08:03:25 host sshd[11067]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 08:03:27 host sshd[11067]: Failed password for invalid user root from 164.92.192.229 port 50948 ssh2 Dec 25 08:03:27 host sshd[11067]: Received disconnect from 164.92.192.229 port 50948:11: Bye Bye [preauth] Dec 25 08:03:27 host sshd[11067]: Disconnected from 164.92.192.229 port 50948 [preauth] Dec 25 08:04:45 host sshd[11190]: User root from 103.255.216.43 not allowed because not listed in AllowUsers Dec 25 08:04:45 host sshd[11190]: input_userauth_request: invalid user root [preauth] Dec 25 08:04:45 host unix_chkpwd[11192]: password check failed for user (root) Dec 25 08:04:45 host sshd[11190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.255.216.43 user=root Dec 25 08:04:45 host sshd[11190]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 08:04:48 host sshd[11190]: Failed password for invalid user root from 103.255.216.43 port 56080 ssh2 Dec 25 08:04:48 host sshd[11190]: Received disconnect from 103.255.216.43 port 56080:11: Bye Bye [preauth] Dec 25 08:04:48 host sshd[11190]: Disconnected from 103.255.216.43 port 56080 [preauth] Dec 25 08:07:29 host sshd[11685]: User root from 92.50.154.66 not allowed because not listed in AllowUsers Dec 25 08:07:29 host sshd[11685]: input_userauth_request: invalid user root [preauth] Dec 25 08:07:30 host unix_chkpwd[11687]: password check failed for user (root) Dec 25 08:07:30 host sshd[11685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.50.154.66 user=root Dec 25 08:07:30 host sshd[11685]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 08:07:32 host sshd[11685]: Failed password for invalid user root from 92.50.154.66 port 49476 ssh2 Dec 25 08:07:32 host sshd[11685]: Received disconnect from 92.50.154.66 port 49476:11: Bye Bye [preauth] Dec 25 08:07:32 host sshd[11685]: Disconnected from 92.50.154.66 port 49476 [preauth] Dec 25 08:10:47 host sshd[12185]: User root from 92.50.154.66 not allowed because not listed in AllowUsers Dec 25 08:10:47 host sshd[12185]: input_userauth_request: invalid user root [preauth] Dec 25 08:10:47 host unix_chkpwd[12188]: password check failed for user (root) Dec 25 08:10:47 host sshd[12185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.50.154.66 user=root Dec 25 08:10:47 host sshd[12185]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 08:10:49 host sshd[12185]: Failed password for invalid user root from 92.50.154.66 port 58750 ssh2 Dec 25 08:10:49 host sshd[12185]: Received disconnect from 92.50.154.66 port 58750:11: Bye Bye [preauth] Dec 25 08:10:49 host sshd[12185]: Disconnected from 92.50.154.66 port 58750 [preauth] Dec 25 08:10:55 host sshd[12228]: User root from 103.255.216.43 not allowed because not listed in AllowUsers Dec 25 08:10:55 host sshd[12228]: input_userauth_request: invalid user root [preauth] Dec 25 08:10:55 host unix_chkpwd[12230]: password check failed for user (root) Dec 25 08:10:55 host sshd[12228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.255.216.43 user=root Dec 25 08:10:55 host sshd[12228]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 08:10:57 host sshd[12228]: Failed password for invalid user root from 103.255.216.43 port 56466 ssh2 Dec 25 08:10:57 host sshd[12228]: Received disconnect from 103.255.216.43 port 56466:11: Bye Bye [preauth] Dec 25 08:10:57 host sshd[12228]: Disconnected from 103.255.216.43 port 56466 [preauth] Dec 25 08:13:10 host sshd[12527]: Invalid user james from 107.189.30.59 port 58564 Dec 25 08:13:10 host sshd[12527]: input_userauth_request: invalid user james [preauth] Dec 25 08:13:10 host sshd[12527]: pam_unix(sshd:auth): check pass; user unknown Dec 25 08:13:10 host sshd[12527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Dec 25 08:13:13 host sshd[12527]: Failed password for invalid user james from 107.189.30.59 port 58564 ssh2 Dec 25 08:13:14 host sshd[12527]: Connection closed by 107.189.30.59 port 58564 [preauth] Dec 25 08:15:20 host sshd[12779]: Invalid user install from 103.13.40.2 port 51060 Dec 25 08:15:20 host sshd[12779]: input_userauth_request: invalid user install [preauth] Dec 25 08:15:20 host sshd[12779]: pam_unix(sshd:auth): check pass; user unknown Dec 25 08:15:20 host sshd[12779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 25 08:15:22 host sshd[12779]: Failed password for invalid user install from 103.13.40.2 port 51060 ssh2 Dec 25 08:15:22 host sshd[12779]: Connection closed by 103.13.40.2 port 51060 [preauth] Dec 25 08:17:03 host sshd[13097]: Invalid user james from 107.189.30.59 port 43896 Dec 25 08:17:03 host sshd[13097]: input_userauth_request: invalid user james [preauth] Dec 25 08:17:03 host sshd[13097]: pam_unix(sshd:auth): check pass; user unknown Dec 25 08:17:03 host sshd[13097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Dec 25 08:17:05 host sshd[13097]: Failed password for invalid user james from 107.189.30.59 port 43896 ssh2 Dec 25 08:17:06 host sshd[13097]: Connection closed by 107.189.30.59 port 43896 [preauth] Dec 25 08:19:31 host sshd[13378]: User root from 106.10.122.53 not allowed because not listed in AllowUsers Dec 25 08:19:31 host sshd[13378]: input_userauth_request: invalid user root [preauth] Dec 25 08:19:31 host unix_chkpwd[13381]: password check failed for user (root) Dec 25 08:19:31 host sshd[13378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 user=root Dec 25 08:19:31 host sshd[13378]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 08:19:33 host sshd[13378]: Failed password for invalid user root from 106.10.122.53 port 51744 ssh2 Dec 25 08:19:33 host sshd[13378]: Connection closed by 106.10.122.53 port 51744 [preauth] Dec 25 08:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 08:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 08:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 08:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 08:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 08:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 08:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 08:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 08:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 08:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 25 08:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 08:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 08:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 25 08:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 08:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 08:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 25 08:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 08:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 08:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 25 08:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 08:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 08:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 25 08:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 08:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 08:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 25 08:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 08:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 08:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 25 08:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 08:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 08:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 25 08:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 08:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 25 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkapin user-2=woodpeck user-3=remysagr user-4=disposeat user-5=wwwkmaorg user-6=pmcresources user-7=shalinijames user-8=wwwtestugo user-9=vfmassets user-10=wwwletsstalkfood user-11=straightcurve user-12=wwwevmhonda user-13=bonifacegroup user-14=wwwnexidigital user-15=mrsclean user-16=phmetals user-17=kottayamcalldriv user-18=palco123 user-19=gifterman user-20=wwwkaretakers user-21=cochintaxi user-22=laundryboniface user-23=a2zgroup user-24=dartsimp user-25=wwwpmcresource user-26=ugotscom user-27=keralaholi user-28=wwwresourcehunte user-29=wwwrmswll user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 25 08:21:46 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 25 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-njMPiBKANzCWXAwV.~ Dec 25 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-njMPiBKANzCWXAwV.~' Dec 25 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-njMPiBKANzCWXAwV.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 25 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 08:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 25 08:21:47 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 08:21:47 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 08:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 08:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 08:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 08:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 08:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 08:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 08:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 08:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 08:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 08:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 25 08:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 08:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 25 08:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 25 08:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 25 08:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 25 08:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 25 08:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 25 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 25 08:21:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 25 08:21:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 25 08:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 25 08:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 08:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 25 08:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 08:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 08:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 25 08:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 08:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 25 08:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 08:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 25 08:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 08:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 08:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 25 08:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 25 08:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 25 08:25:37 host sshd[14408]: Invalid user zhaochen from 84.110.99.202 port 46142 Dec 25 08:25:37 host sshd[14408]: input_userauth_request: invalid user zhaochen [preauth] Dec 25 08:25:37 host sshd[14408]: pam_unix(sshd:auth): check pass; user unknown Dec 25 08:25:37 host sshd[14408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.110.99.202 Dec 25 08:25:40 host sshd[14408]: Failed password for invalid user zhaochen from 84.110.99.202 port 46142 ssh2 Dec 25 08:25:40 host sshd[14408]: Connection closed by 84.110.99.202 port 46142 [preauth] Dec 25 08:46:04 host sshd[17204]: Invalid user james from 107.189.30.59 port 48728 Dec 25 08:46:04 host sshd[17204]: input_userauth_request: invalid user james [preauth] Dec 25 08:46:04 host sshd[17204]: pam_unix(sshd:auth): check pass; user unknown Dec 25 08:46:04 host sshd[17204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Dec 25 08:46:06 host sshd[17204]: Failed password for invalid user james from 107.189.30.59 port 48728 ssh2 Dec 25 08:58:51 host sshd[18959]: Invalid user cwp from 162.218.126.136 port 49156 Dec 25 08:58:51 host sshd[18959]: input_userauth_request: invalid user cwp [preauth] Dec 25 08:58:51 host sshd[18959]: pam_unix(sshd:auth): check pass; user unknown Dec 25 08:58:51 host sshd[18959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 25 08:58:53 host sshd[18959]: Failed password for invalid user cwp from 162.218.126.136 port 49156 ssh2 Dec 25 08:58:53 host sshd[18959]: Connection closed by 162.218.126.136 port 49156 [preauth] Dec 25 09:11:49 host sshd[20706]: Invalid user pi from 94.193.186.71 port 54062 Dec 25 09:11:49 host sshd[20706]: input_userauth_request: invalid user pi [preauth] Dec 25 09:11:49 host sshd[20706]: pam_unix(sshd:auth): check pass; user unknown Dec 25 09:11:49 host sshd[20706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.193.186.71 Dec 25 09:11:49 host sshd[20708]: Invalid user pi from 94.193.186.71 port 54064 Dec 25 09:11:49 host sshd[20708]: input_userauth_request: invalid user pi [preauth] Dec 25 09:11:49 host sshd[20708]: pam_unix(sshd:auth): check pass; user unknown Dec 25 09:11:49 host sshd[20708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.193.186.71 Dec 25 09:11:51 host sshd[20706]: Failed password for invalid user pi from 94.193.186.71 port 54062 ssh2 Dec 25 09:11:52 host sshd[20706]: Connection closed by 94.193.186.71 port 54062 [preauth] Dec 25 09:11:52 host sshd[20708]: Failed password for invalid user pi from 94.193.186.71 port 54064 ssh2 Dec 25 09:11:52 host sshd[20708]: Connection closed by 94.193.186.71 port 54064 [preauth] Dec 25 09:16:03 host sshd[21285]: Invalid user ck from 45.93.201.90 port 57926 Dec 25 09:16:03 host sshd[21285]: input_userauth_request: invalid user ck [preauth] Dec 25 09:16:03 host sshd[21285]: pam_unix(sshd:auth): check pass; user unknown Dec 25 09:16:03 host sshd[21285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 25 09:16:05 host sshd[21285]: Failed password for invalid user ck from 45.93.201.90 port 57926 ssh2 Dec 25 09:16:08 host sshd[21285]: pam_unix(sshd:auth): check pass; user unknown Dec 25 09:16:11 host sshd[21285]: Failed password for invalid user ck from 45.93.201.90 port 57926 ssh2 Dec 25 09:16:14 host sshd[21285]: pam_unix(sshd:auth): check pass; user unknown Dec 25 09:16:16 host sshd[21285]: Failed password for invalid user ck from 45.93.201.90 port 57926 ssh2 Dec 25 09:16:19 host sshd[21285]: Connection closed by 45.93.201.90 port 57926 [preauth] Dec 25 09:16:19 host sshd[21285]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 25 09:17:43 host sshd[21448]: Invalid user hadoop from 41.197.31.178 port 46796 Dec 25 09:17:43 host sshd[21448]: input_userauth_request: invalid user hadoop [preauth] Dec 25 09:17:43 host sshd[21448]: pam_unix(sshd:auth): check pass; user unknown Dec 25 09:17:43 host sshd[21448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 25 09:17:45 host sshd[21448]: Failed password for invalid user hadoop from 41.197.31.178 port 46796 ssh2 Dec 25 09:17:45 host sshd[21448]: Connection closed by 41.197.31.178 port 46796 [preauth] Dec 25 09:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 09:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 09:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 09:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 09:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 09:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 09:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 09:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 09:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 09:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 25 09:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 09:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 09:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 25 09:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 09:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 09:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 25 09:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 09:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 09:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 25 09:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 09:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 09:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 25 09:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 09:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 09:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 25 09:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 09:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 09:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 25 09:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 09:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 09:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 25 09:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 09:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 09:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 09:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 09:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 09:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 25 09:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 09:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=wwwrmswll user-3=keralaholi user-4=wwwresourcehunte user-5=ugotscom user-6=travelboniface user-7=wwwkaretakers user-8=cochintaxi user-9=laundryboniface user-10=dartsimp user-11=a2zgroup user-12=wwwletsstalkfood user-13=straightcurve user-14=bonifacegroup user-15=wwwevmhonda user-16=mrsclean user-17=wwwnexidigital user-18=gifterman user-19=palco123 user-20=kottayamcalldriv user-21=phmetals user-22=wwwkapin user-23=woodpeck user-24=disposeat user-25=remysagr user-26=wwwkmaorg user-27=pmcresources user-28=vfmassets user-29=wwwtestugo user-30=shalinijames feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 25 09:21:46 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 25 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-vAdRCyiKp0qaMVbs.~ Dec 25 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-vAdRCyiKp0qaMVbs.~' Dec 25 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-vAdRCyiKp0qaMVbs.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 25 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 25 09:21:46 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 09:21:46 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 09:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 09:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 09:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 09:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 09:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 09:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 09:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 09:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 09:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 09:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 25 09:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 09:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 09:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 09:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 09:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 09:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 25 09:21:48 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 25 09:21:49 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 25 09:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 25 09:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 25 09:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 25 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 25 09:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 25 09:22:01 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 25 09:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 25 09:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 09:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 09:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 25 09:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 09:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 09:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 25 09:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 09:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 09:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 25 09:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 09:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 09:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 25 09:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 09:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 09:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 25 09:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 25 09:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 25 09:28:33 host sshd[23138]: Invalid user user from 92.46.108.20 port 45898 Dec 25 09:28:33 host sshd[23138]: input_userauth_request: invalid user user [preauth] Dec 25 09:28:33 host sshd[23138]: pam_unix(sshd:auth): check pass; user unknown Dec 25 09:28:33 host sshd[23138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 25 09:28:35 host sshd[23138]: Failed password for invalid user user from 92.46.108.20 port 45898 ssh2 Dec 25 09:28:35 host sshd[23138]: Connection closed by 92.46.108.20 port 45898 [preauth] Dec 25 09:44:50 host sshd[25537]: User root from 128.199.233.192 not allowed because not listed in AllowUsers Dec 25 09:44:50 host sshd[25537]: input_userauth_request: invalid user root [preauth] Dec 25 09:44:50 host unix_chkpwd[25540]: password check failed for user (root) Dec 25 09:44:50 host sshd[25537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.233.192 user=root Dec 25 09:44:50 host sshd[25537]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 09:44:52 host sshd[25537]: Failed password for invalid user root from 128.199.233.192 port 52480 ssh2 Dec 25 09:44:52 host sshd[25537]: Received disconnect from 128.199.233.192 port 52480:11: Bye Bye [preauth] Dec 25 09:44:52 host sshd[25537]: Disconnected from 128.199.233.192 port 52480 [preauth] Dec 25 09:46:46 host sshd[25907]: User root from 116.92.213.114 not allowed because not listed in AllowUsers Dec 25 09:46:46 host sshd[25907]: input_userauth_request: invalid user root [preauth] Dec 25 09:46:46 host unix_chkpwd[25910]: password check failed for user (root) Dec 25 09:46:46 host sshd[25907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.92.213.114 user=root Dec 25 09:46:46 host sshd[25907]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 09:46:48 host sshd[25907]: Failed password for invalid user root from 116.92.213.114 port 53850 ssh2 Dec 25 09:46:48 host sshd[25907]: Received disconnect from 116.92.213.114 port 53850:11: Bye Bye [preauth] Dec 25 09:46:48 host sshd[25907]: Disconnected from 116.92.213.114 port 53850 [preauth] Dec 25 09:49:23 host sshd[26220]: User root from 128.199.233.192 not allowed because not listed in AllowUsers Dec 25 09:49:23 host sshd[26220]: input_userauth_request: invalid user root [preauth] Dec 25 09:49:23 host unix_chkpwd[26223]: password check failed for user (root) Dec 25 09:49:23 host sshd[26220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.233.192 user=root Dec 25 09:49:23 host sshd[26220]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 09:49:25 host sshd[26220]: Failed password for invalid user root from 128.199.233.192 port 42600 ssh2 Dec 25 09:49:25 host sshd[26220]: Received disconnect from 128.199.233.192 port 42600:11: Bye Bye [preauth] Dec 25 09:49:25 host sshd[26220]: Disconnected from 128.199.233.192 port 42600 [preauth] Dec 25 09:49:39 host sshd[26303]: User root from 84.110.99.202 not allowed because not listed in AllowUsers Dec 25 09:49:39 host sshd[26303]: input_userauth_request: invalid user root [preauth] Dec 25 09:49:39 host unix_chkpwd[26306]: password check failed for user (root) Dec 25 09:49:39 host sshd[26303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.110.99.202 user=root Dec 25 09:49:39 host sshd[26303]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 09:49:41 host sshd[26303]: Failed password for invalid user root from 84.110.99.202 port 60736 ssh2 Dec 25 09:49:41 host sshd[26303]: Connection closed by 84.110.99.202 port 60736 [preauth] Dec 25 09:50:32 host sshd[26460]: Invalid user user from 103.13.40.2 port 32850 Dec 25 09:50:32 host sshd[26460]: input_userauth_request: invalid user user [preauth] Dec 25 09:50:32 host sshd[26460]: pam_unix(sshd:auth): check pass; user unknown Dec 25 09:50:32 host sshd[26460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 25 09:50:34 host sshd[26460]: Failed password for invalid user user from 103.13.40.2 port 32850 ssh2 Dec 25 09:50:34 host sshd[26460]: Connection closed by 103.13.40.2 port 32850 [preauth] Dec 25 09:51:37 host sshd[26600]: User root from 116.92.213.114 not allowed because not listed in AllowUsers Dec 25 09:51:37 host sshd[26600]: input_userauth_request: invalid user root [preauth] Dec 25 09:51:37 host unix_chkpwd[26603]: password check failed for user (root) Dec 25 09:51:37 host sshd[26600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.92.213.114 user=root Dec 25 09:51:37 host sshd[26600]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 09:51:39 host sshd[26600]: Failed password for invalid user root from 116.92.213.114 port 45118 ssh2 Dec 25 09:53:42 host sshd[26992]: User root from 106.10.122.53 not allowed because not listed in AllowUsers Dec 25 09:53:42 host sshd[26992]: input_userauth_request: invalid user root [preauth] Dec 25 09:53:42 host unix_chkpwd[26995]: password check failed for user (root) Dec 25 09:53:42 host sshd[26992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 user=root Dec 25 09:53:42 host sshd[26992]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 09:53:44 host sshd[26992]: Failed password for invalid user root from 106.10.122.53 port 47444 ssh2 Dec 25 09:53:44 host sshd[26992]: Connection closed by 106.10.122.53 port 47444 [preauth] Dec 25 10:12:44 host sshd[29778]: User root from 49.51.104.136 not allowed because not listed in AllowUsers Dec 25 10:12:44 host sshd[29778]: input_userauth_request: invalid user root [preauth] Dec 25 10:12:44 host unix_chkpwd[29781]: password check failed for user (root) Dec 25 10:12:44 host sshd[29778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.104.136 user=root Dec 25 10:12:44 host sshd[29778]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 10:12:47 host sshd[29778]: Failed password for invalid user root from 49.51.104.136 port 33682 ssh2 Dec 25 10:12:47 host sshd[29778]: Received disconnect from 49.51.104.136 port 33682:11: Bye Bye [preauth] Dec 25 10:12:47 host sshd[29778]: Disconnected from 49.51.104.136 port 33682 [preauth] Dec 25 10:13:08 host sshd[29835]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Dec 25 10:13:08 host sshd[29835]: input_userauth_request: invalid user root [preauth] Dec 25 10:13:09 host unix_chkpwd[29839]: password check failed for user (root) Dec 25 10:13:09 host sshd[29835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Dec 25 10:13:09 host sshd[29835]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 10:13:11 host sshd[29835]: Failed password for invalid user root from 162.218.126.136 port 53042 ssh2 Dec 25 10:13:11 host sshd[29835]: Connection closed by 162.218.126.136 port 53042 [preauth] Dec 25 10:17:05 host sshd[30266]: User root from 68.183.79.205 not allowed because not listed in AllowUsers Dec 25 10:17:05 host sshd[30266]: input_userauth_request: invalid user root [preauth] Dec 25 10:17:05 host unix_chkpwd[30269]: password check failed for user (root) Dec 25 10:17:05 host sshd[30266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.79.205 user=root Dec 25 10:17:05 host sshd[30266]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 10:17:07 host sshd[30266]: Failed password for invalid user root from 68.183.79.205 port 47816 ssh2 Dec 25 10:17:07 host sshd[30266]: Received disconnect from 68.183.79.205 port 47816:11: Bye Bye [preauth] Dec 25 10:17:07 host sshd[30266]: Disconnected from 68.183.79.205 port 47816 [preauth] Dec 25 10:18:19 host sshd[30387]: User root from 49.51.104.136 not allowed because not listed in AllowUsers Dec 25 10:18:19 host sshd[30387]: input_userauth_request: invalid user root [preauth] Dec 25 10:18:19 host unix_chkpwd[30390]: password check failed for user (root) Dec 25 10:18:19 host sshd[30387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.104.136 user=root Dec 25 10:18:19 host sshd[30387]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 10:18:21 host sshd[30387]: Failed password for invalid user root from 49.51.104.136 port 36886 ssh2 Dec 25 10:18:22 host sshd[30387]: Received disconnect from 49.51.104.136 port 36886:11: Bye Bye [preauth] Dec 25 10:18:22 host sshd[30387]: Disconnected from 49.51.104.136 port 36886 [preauth] Dec 25 10:19:06 host sshd[30615]: User root from 68.183.79.205 not allowed because not listed in AllowUsers Dec 25 10:19:06 host sshd[30615]: input_userauth_request: invalid user root [preauth] Dec 25 10:19:06 host unix_chkpwd[30622]: password check failed for user (root) Dec 25 10:19:06 host sshd[30615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.79.205 user=root Dec 25 10:19:06 host sshd[30615]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 10:19:08 host sshd[30615]: Failed password for invalid user root from 68.183.79.205 port 59352 ssh2 Dec 25 10:20:08 host sshd[30772]: User root from 2.42.206.17 not allowed because not listed in AllowUsers Dec 25 10:20:08 host sshd[30772]: input_userauth_request: invalid user root [preauth] Dec 25 10:20:08 host unix_chkpwd[30775]: password check failed for user (root) Dec 25 10:20:08 host sshd[30772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.42.206.17 user=root Dec 25 10:20:08 host sshd[30772]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 10:20:10 host sshd[30772]: Failed password for invalid user root from 2.42.206.17 port 51910 ssh2 Dec 25 10:20:10 host sshd[30772]: Received disconnect from 2.42.206.17 port 51910:11: Bye Bye [preauth] Dec 25 10:20:10 host sshd[30772]: Disconnected from 2.42.206.17 port 51910 [preauth] Dec 25 10:20:49 host sshd[30850]: Invalid user eclipse from 62.233.50.248 port 44410 Dec 25 10:20:49 host sshd[30850]: input_userauth_request: invalid user eclipse [preauth] Dec 25 10:20:50 host sshd[30850]: pam_unix(sshd:auth): check pass; user unknown Dec 25 10:20:50 host sshd[30850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.233.50.248 Dec 25 10:20:51 host sshd[30850]: Failed password for invalid user eclipse from 62.233.50.248 port 44410 ssh2 Dec 25 10:20:51 host sshd[30850]: Received disconnect from 62.233.50.248 port 44410:11: Client disconnecting normally [preauth] Dec 25 10:20:51 host sshd[30850]: Disconnected from 62.233.50.248 port 44410 [preauth] Dec 25 10:20:52 host sshd[30854]: Invalid user ubnt from 62.233.50.248 port 47459 Dec 25 10:20:52 host sshd[30854]: input_userauth_request: invalid user ubnt [preauth] Dec 25 10:20:52 host sshd[30854]: pam_unix(sshd:auth): check pass; user unknown Dec 25 10:20:52 host sshd[30854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.233.50.248 Dec 25 10:20:55 host sshd[30854]: Failed password for invalid user ubnt from 62.233.50.248 port 47459 ssh2 Dec 25 10:20:55 host sshd[30854]: Received disconnect from 62.233.50.248 port 47459:11: Client disconnecting normally [preauth] Dec 25 10:20:55 host sshd[30854]: Disconnected from 62.233.50.248 port 47459 [preauth] Dec 25 10:20:56 host sshd[30861]: Invalid user admin from 62.233.50.248 port 51382 Dec 25 10:20:56 host sshd[30861]: input_userauth_request: invalid user admin [preauth] Dec 25 10:20:57 host sshd[30861]: pam_unix(sshd:auth): check pass; user unknown Dec 25 10:20:57 host sshd[30861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.233.50.248 Dec 25 10:20:59 host sshd[30861]: Failed password for invalid user admin from 62.233.50.248 port 51382 ssh2 Dec 25 10:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 10:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 10:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 10:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 10:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 10:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 10:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 10:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 10:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 10:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 25 10:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 10:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 10:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 25 10:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 10:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 10:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 25 10:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 10:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 10:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 25 10:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 10:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 10:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 25 10:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 10:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 10:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 25 10:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 10:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 10:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 25 10:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 10:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 10:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 25 10:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 10:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 10:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 25 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 10:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=dartsimp user-2=a2zgroup user-3=laundryboniface user-4=wwwkaretakers user-5=cochintaxi user-6=travelboniface user-7=wwwrmswll user-8=keralaholi user-9=wwwresourcehunte user-10=ugotscom user-11=wwwpmcresource user-12=vfmassets user-13=wwwtestugo user-14=shalinijames user-15=pmcresources user-16=remysagr user-17=disposeat user-18=wwwkmaorg user-19=woodpeck user-20=wwwkapin user-21=gifterman user-22=palco123 user-23=phmetals user-24=kottayamcalldriv user-25=mrsclean user-26=wwwnexidigital user-27=bonifacegroup user-28=wwwevmhonda user-29=straightcurve user-30=wwwletsstalkfood feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 25 10:21:46 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 25 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 10:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 10:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-sY956DWPV5ZI03jI.~ Dec 25 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 10:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-sY956DWPV5ZI03jI.~' Dec 25 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 10:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-sY956DWPV5ZI03jI.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 10:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 25 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 10:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 10:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 25 10:21:47 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 10:21:47 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 10:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 10:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 10:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 10:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 10:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 10:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 10:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 10:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 10:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 10:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 25 10:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 25 10:21:48 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 25 10:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 25 10:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 25 10:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 25 10:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 25 10:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 25 10:21:51 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 25 10:21:53 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 25 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 25 10:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 10:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 10:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 25 10:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 10:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 10:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 25 10:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 10:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 25 10:21:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 10:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 25 10:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 10:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 10:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 25 10:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 25 10:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 25 10:22:50 host sshd[31314]: User root from 2.42.206.17 not allowed because not listed in AllowUsers Dec 25 10:22:50 host sshd[31314]: input_userauth_request: invalid user root [preauth] Dec 25 10:22:50 host unix_chkpwd[31317]: password check failed for user (root) Dec 25 10:22:50 host sshd[31314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.42.206.17 user=root Dec 25 10:22:50 host sshd[31314]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 10:22:52 host sshd[31314]: Failed password for invalid user root from 2.42.206.17 port 40205 ssh2 Dec 25 10:22:52 host sshd[31314]: Received disconnect from 2.42.206.17 port 40205:11: Bye Bye [preauth] Dec 25 10:22:52 host sshd[31314]: Disconnected from 2.42.206.17 port 40205 [preauth] Dec 25 10:29:10 host sshd[32166]: User root from 51.250.65.57 not allowed because not listed in AllowUsers Dec 25 10:29:10 host sshd[32166]: input_userauth_request: invalid user root [preauth] Dec 25 10:29:10 host unix_chkpwd[32169]: password check failed for user (root) Dec 25 10:29:10 host sshd[32166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.65.57 user=root Dec 25 10:29:10 host sshd[32166]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 10:29:11 host sshd[32166]: Failed password for invalid user root from 51.250.65.57 port 32796 ssh2 Dec 25 10:29:12 host sshd[32166]: Received disconnect from 51.250.65.57 port 32796:11: Bye Bye [preauth] Dec 25 10:29:12 host sshd[32166]: Disconnected from 51.250.65.57 port 32796 [preauth] Dec 25 10:29:34 host sshd[32216]: User root from 137.184.69.227 not allowed because not listed in AllowUsers Dec 25 10:29:34 host sshd[32216]: input_userauth_request: invalid user root [preauth] Dec 25 10:29:34 host unix_chkpwd[32219]: password check failed for user (root) Dec 25 10:29:34 host sshd[32216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.69.227 user=root Dec 25 10:29:34 host sshd[32216]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 10:29:36 host sshd[32216]: Failed password for invalid user root from 137.184.69.227 port 33458 ssh2 Dec 25 10:29:36 host sshd[32216]: Received disconnect from 137.184.69.227 port 33458:11: Bye Bye [preauth] Dec 25 10:29:36 host sshd[32216]: Disconnected from 137.184.69.227 port 33458 [preauth] Dec 25 10:29:57 host sshd[32244]: User root from 137.184.224.216 not allowed because not listed in AllowUsers Dec 25 10:29:57 host sshd[32244]: input_userauth_request: invalid user root [preauth] Dec 25 10:29:57 host unix_chkpwd[32308]: password check failed for user (root) Dec 25 10:29:57 host sshd[32244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.224.216 user=root Dec 25 10:29:57 host sshd[32244]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 10:29:59 host sshd[32244]: Failed password for invalid user root from 137.184.224.216 port 48672 ssh2 Dec 25 10:29:59 host sshd[32244]: Received disconnect from 137.184.224.216 port 48672:11: Bye Bye [preauth] Dec 25 10:29:59 host sshd[32244]: Disconnected from 137.184.224.216 port 48672 [preauth] Dec 25 10:30:04 host sshd[32380]: User root from 107.2.221.123 not allowed because not listed in AllowUsers Dec 25 10:30:04 host sshd[32380]: input_userauth_request: invalid user root [preauth] Dec 25 10:30:04 host unix_chkpwd[32385]: password check failed for user (root) Dec 25 10:30:04 host sshd[32380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.2.221.123 user=root Dec 25 10:30:04 host sshd[32380]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 10:30:06 host sshd[32380]: Failed password for invalid user root from 107.2.221.123 port 48436 ssh2 Dec 25 10:30:06 host sshd[32380]: Received disconnect from 107.2.221.123 port 48436:11: Bye Bye [preauth] Dec 25 10:30:06 host sshd[32380]: Disconnected from 107.2.221.123 port 48436 [preauth] Dec 25 10:30:33 host sshd[32454]: Did not receive identification string from 123.59.97.195 port 34966 Dec 25 10:31:08 host sshd[32505]: User root from 194.4.49.6 not allowed because not listed in AllowUsers Dec 25 10:31:08 host sshd[32505]: input_userauth_request: invalid user root [preauth] Dec 25 10:31:08 host unix_chkpwd[32508]: password check failed for user (root) Dec 25 10:31:08 host sshd[32505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.4.49.6 user=root Dec 25 10:31:08 host sshd[32505]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 10:31:10 host sshd[32505]: Failed password for invalid user root from 194.4.49.6 port 49004 ssh2 Dec 25 10:31:10 host sshd[32505]: Received disconnect from 194.4.49.6 port 49004:11: Bye Bye [preauth] Dec 25 10:31:10 host sshd[32505]: Disconnected from 194.4.49.6 port 49004 [preauth] Dec 25 10:31:34 host sshd[32570]: User root from 82.200.226.226 not allowed because not listed in AllowUsers Dec 25 10:31:34 host sshd[32570]: input_userauth_request: invalid user root [preauth] Dec 25 10:31:34 host unix_chkpwd[32573]: password check failed for user (root) Dec 25 10:31:34 host sshd[32570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.200.226.226 user=root Dec 25 10:31:34 host sshd[32570]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 10:31:36 host sshd[32570]: Failed password for invalid user root from 82.200.226.226 port 51178 ssh2 Dec 25 10:31:36 host sshd[32570]: Received disconnect from 82.200.226.226 port 51178:11: Bye Bye [preauth] Dec 25 10:31:36 host sshd[32570]: Disconnected from 82.200.226.226 port 51178 [preauth] Dec 25 10:34:45 host sshd[455]: User root from 51.250.65.57 not allowed because not listed in AllowUsers Dec 25 10:34:45 host sshd[455]: input_userauth_request: invalid user root [preauth] Dec 25 10:34:45 host unix_chkpwd[457]: password check failed for user (root) Dec 25 10:34:45 host sshd[455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.65.57 user=root Dec 25 10:34:45 host sshd[455]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 10:34:47 host sshd[455]: Failed password for invalid user root from 51.250.65.57 port 34976 ssh2 Dec 25 10:34:48 host sshd[455]: Received disconnect from 51.250.65.57 port 34976:11: Bye Bye [preauth] Dec 25 10:34:48 host sshd[455]: Disconnected from 51.250.65.57 port 34976 [preauth] Dec 25 10:35:00 host sshd[503]: User root from 137.184.224.216 not allowed because not listed in AllowUsers Dec 25 10:35:00 host sshd[503]: input_userauth_request: invalid user root [preauth] Dec 25 10:35:00 host unix_chkpwd[508]: password check failed for user (root) Dec 25 10:35:00 host sshd[503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.224.216 user=root Dec 25 10:35:00 host sshd[503]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 10:35:02 host sshd[503]: Failed password for invalid user root from 137.184.224.216 port 47830 ssh2 Dec 25 10:35:02 host sshd[503]: Received disconnect from 137.184.224.216 port 47830:11: Bye Bye [preauth] Dec 25 10:35:02 host sshd[503]: Disconnected from 137.184.224.216 port 47830 [preauth] Dec 25 10:35:18 host sshd[716]: User root from 194.4.49.6 not allowed because not listed in AllowUsers Dec 25 10:35:18 host sshd[716]: input_userauth_request: invalid user root [preauth] Dec 25 10:35:18 host unix_chkpwd[718]: password check failed for user (root) Dec 25 10:35:18 host sshd[716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.4.49.6 user=root Dec 25 10:35:18 host sshd[716]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 10:35:20 host sshd[716]: Failed password for invalid user root from 194.4.49.6 port 38266 ssh2 Dec 25 10:35:37 host sshd[803]: User root from 137.184.69.227 not allowed because not listed in AllowUsers Dec 25 10:35:37 host sshd[803]: input_userauth_request: invalid user root [preauth] Dec 25 10:35:37 host unix_chkpwd[806]: password check failed for user (root) Dec 25 10:35:37 host sshd[803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.69.227 user=root Dec 25 10:35:37 host sshd[803]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 10:35:39 host sshd[803]: Failed password for invalid user root from 137.184.69.227 port 52886 ssh2 Dec 25 10:35:49 host sshd[848]: User root from 107.2.221.123 not allowed because not listed in AllowUsers Dec 25 10:35:49 host sshd[848]: input_userauth_request: invalid user root [preauth] Dec 25 10:35:49 host unix_chkpwd[851]: password check failed for user (root) Dec 25 10:35:49 host sshd[848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.2.221.123 user=root Dec 25 10:35:49 host sshd[848]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 10:35:51 host sshd[848]: Failed password for invalid user root from 107.2.221.123 port 49720 ssh2 Dec 25 10:35:52 host sshd[848]: Received disconnect from 107.2.221.123 port 49720:11: Bye Bye [preauth] Dec 25 10:35:52 host sshd[848]: Disconnected from 107.2.221.123 port 49720 [preauth] Dec 25 10:36:09 host sshd[911]: User root from 82.200.226.226 not allowed because not listed in AllowUsers Dec 25 10:36:09 host sshd[911]: input_userauth_request: invalid user root [preauth] Dec 25 10:36:09 host unix_chkpwd[916]: password check failed for user (root) Dec 25 10:36:09 host sshd[911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.200.226.226 user=root Dec 25 10:36:09 host sshd[911]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 10:36:11 host sshd[911]: Failed password for invalid user root from 82.200.226.226 port 40872 ssh2 Dec 25 10:36:11 host sshd[911]: Received disconnect from 82.200.226.226 port 40872:11: Bye Bye [preauth] Dec 25 10:36:11 host sshd[911]: Disconnected from 82.200.226.226 port 40872 [preauth] Dec 25 10:56:14 host sshd[3657]: Invalid user pi from 82.66.3.241 port 35026 Dec 25 10:56:14 host sshd[3657]: input_userauth_request: invalid user pi [preauth] Dec 25 10:56:14 host sshd[3659]: Invalid user pi from 82.66.3.241 port 35030 Dec 25 10:56:14 host sshd[3659]: input_userauth_request: invalid user pi [preauth] Dec 25 10:56:14 host sshd[3657]: pam_unix(sshd:auth): check pass; user unknown Dec 25 10:56:14 host sshd[3657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.66.3.241 Dec 25 10:56:14 host sshd[3659]: pam_unix(sshd:auth): check pass; user unknown Dec 25 10:56:14 host sshd[3659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.66.3.241 Dec 25 10:56:17 host sshd[3657]: Failed password for invalid user pi from 82.66.3.241 port 35026 ssh2 Dec 25 10:56:17 host sshd[3659]: Failed password for invalid user pi from 82.66.3.241 port 35030 ssh2 Dec 25 10:56:17 host sshd[3657]: Connection closed by 82.66.3.241 port 35026 [preauth] Dec 25 10:56:17 host sshd[3659]: Connection closed by 82.66.3.241 port 35030 [preauth] Dec 25 11:04:47 host sshd[4765]: Invalid user user1 from 134.122.90.159 port 36524 Dec 25 11:04:47 host sshd[4765]: input_userauth_request: invalid user user1 [preauth] Dec 25 11:04:48 host sshd[4765]: pam_unix(sshd:auth): check pass; user unknown Dec 25 11:04:48 host sshd[4765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.90.159 Dec 25 11:04:50 host sshd[4765]: Failed password for invalid user user1 from 134.122.90.159 port 36524 ssh2 Dec 25 11:04:51 host sshd[4765]: Connection closed by 134.122.90.159 port 36524 [preauth] Dec 25 11:05:35 host sshd[4885]: Invalid user cl from 45.93.201.90 port 37976 Dec 25 11:05:35 host sshd[4885]: input_userauth_request: invalid user cl [preauth] Dec 25 11:05:35 host sshd[4885]: pam_unix(sshd:auth): check pass; user unknown Dec 25 11:05:35 host sshd[4885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 25 11:05:38 host sshd[4885]: Failed password for invalid user cl from 45.93.201.90 port 37976 ssh2 Dec 25 11:05:41 host sshd[4885]: pam_unix(sshd:auth): check pass; user unknown Dec 25 11:05:43 host sshd[4885]: Failed password for invalid user cl from 45.93.201.90 port 37976 ssh2 Dec 25 11:05:46 host sshd[4885]: pam_unix(sshd:auth): check pass; user unknown Dec 25 11:05:48 host sshd[4885]: Failed password for invalid user cl from 45.93.201.90 port 37976 ssh2 Dec 25 11:05:51 host sshd[4885]: Connection closed by 45.93.201.90 port 37976 [preauth] Dec 25 11:05:51 host sshd[4885]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 25 11:09:06 host sshd[5358]: Invalid user user1 from 41.197.31.178 port 36830 Dec 25 11:09:06 host sshd[5358]: input_userauth_request: invalid user user1 [preauth] Dec 25 11:09:06 host sshd[5358]: pam_unix(sshd:auth): check pass; user unknown Dec 25 11:09:06 host sshd[5358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 25 11:09:08 host sshd[5358]: Failed password for invalid user user1 from 41.197.31.178 port 36830 ssh2 Dec 25 11:09:08 host sshd[5358]: Connection closed by 41.197.31.178 port 36830 [preauth] Dec 25 11:14:03 host sshd[6086]: Invalid user user from 84.110.99.202 port 51260 Dec 25 11:14:03 host sshd[6086]: input_userauth_request: invalid user user [preauth] Dec 25 11:14:03 host sshd[6086]: pam_unix(sshd:auth): check pass; user unknown Dec 25 11:14:03 host sshd[6086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.110.99.202 Dec 25 11:14:06 host sshd[6086]: Failed password for invalid user user from 84.110.99.202 port 51260 ssh2 Dec 25 11:14:06 host sshd[6086]: Connection closed by 84.110.99.202 port 51260 [preauth] Dec 25 11:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 11:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 11:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 11:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 11:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 11:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 11:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 11:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 11:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 11:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 25 11:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 11:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 11:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 25 11:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 11:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 11:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 25 11:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 11:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 11:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 25 11:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 11:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 11:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 25 11:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 11:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 11:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 25 11:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 11:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 11:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 25 11:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 11:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 11:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 25 11:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 11:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 11:21:45 host sshd[7299]: Invalid user user1 from 92.46.108.20 port 51582 Dec 25 11:21:45 host sshd[7299]: input_userauth_request: invalid user user1 [preauth] Dec 25 11:21:46 host sshd[7299]: pam_unix(sshd:auth): check pass; user unknown Dec 25 11:21:46 host sshd[7299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 25 11:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 11:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 11:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 11:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 25 11:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 11:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 11:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=laundryboniface user-4=a2zgroup user-5=dartsimp user-6=wwwpmcresource user-7=keralaholi user-8=wwwresourcehunte user-9=wwwrmswll user-10=ugotscom user-11=travelboniface user-12=woodpeck user-13=wwwkapin user-14=disposeat user-15=wwwkmaorg user-16=remysagr user-17=pmcresources user-18=vfmassets user-19=shalinijames user-20=wwwtestugo user-21=straightcurve user-22=wwwletsstalkfood user-23=bonifacegroup user-24=wwwevmhonda user-25=wwwnexidigital user-26=mrsclean user-27=palco123 user-28=gifterman user-29=phmetals user-30=kottayamcalldriv feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 25 11:21:46 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 25 11:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 11:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 11:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 11:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 11:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 11:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-FckQACYoTv3s13nl.~ Dec 25 11:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 11:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 11:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-FckQACYoTv3s13nl.~' Dec 25 11:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 11:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 11:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-FckQACYoTv3s13nl.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 11:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 11:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 11:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 25 11:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 11:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 11:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 25 11:21:47 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 11:21:47 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 11:21:47 host sshd[7299]: Failed password for invalid user user1 from 92.46.108.20 port 51582 ssh2 Dec 25 11:21:48 host sshd[7299]: Connection closed by 92.46.108.20 port 51582 [preauth] Dec 25 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 25 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 25 11:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 25 11:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 25 11:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 25 11:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 25 11:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 25 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 25 11:21:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 25 11:21:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 25 11:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 25 11:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 11:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 11:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 25 11:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 11:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 11:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 25 11:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 11:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 25 11:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 11:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 11:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 25 11:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 11:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 11:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 25 11:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 25 11:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 25 11:25:16 host sshd[8070]: User root from 103.13.40.2 not allowed because not listed in AllowUsers Dec 25 11:25:16 host sshd[8070]: input_userauth_request: invalid user root [preauth] Dec 25 11:25:16 host unix_chkpwd[8073]: password check failed for user (root) Dec 25 11:25:16 host sshd[8070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 user=root Dec 25 11:25:16 host sshd[8070]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 11:25:18 host sshd[8070]: Failed password for invalid user root from 103.13.40.2 port 52168 ssh2 Dec 25 11:25:18 host sshd[8070]: Connection closed by 103.13.40.2 port 52168 [preauth] Dec 25 11:27:00 host sshd[8291]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Dec 25 11:27:00 host sshd[8291]: input_userauth_request: invalid user root [preauth] Dec 25 11:27:00 host unix_chkpwd[8295]: password check failed for user (root) Dec 25 11:27:00 host sshd[8291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Dec 25 11:27:00 host sshd[8291]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 11:27:02 host sshd[8291]: Failed password for invalid user root from 162.218.126.136 port 54526 ssh2 Dec 25 11:27:02 host sshd[8291]: Connection closed by 162.218.126.136 port 54526 [preauth] Dec 25 11:27:50 host sshd[8415]: User root from 106.10.122.53 not allowed because not listed in AllowUsers Dec 25 11:27:50 host sshd[8415]: input_userauth_request: invalid user root [preauth] Dec 25 11:27:50 host unix_chkpwd[8418]: password check failed for user (root) Dec 25 11:27:50 host sshd[8415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 user=root Dec 25 11:27:50 host sshd[8415]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 11:27:52 host sshd[8415]: Failed password for invalid user root from 106.10.122.53 port 35394 ssh2 Dec 25 11:27:53 host sshd[8415]: Connection closed by 106.10.122.53 port 35394 [preauth] Dec 25 12:09:33 host sshd[14141]: User root from 58.144.251.16 not allowed because not listed in AllowUsers Dec 25 12:09:33 host sshd[14141]: input_userauth_request: invalid user root [preauth] Dec 25 12:09:33 host unix_chkpwd[14150]: password check failed for user (root) Dec 25 12:09:33 host sshd[14141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.144.251.16 user=root Dec 25 12:09:33 host sshd[14141]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:09:35 host sshd[14141]: Failed password for invalid user root from 58.144.251.16 port 39128 ssh2 Dec 25 12:09:35 host sshd[14141]: Received disconnect from 58.144.251.16 port 39128:11: Bye Bye [preauth] Dec 25 12:09:35 host sshd[14141]: Disconnected from 58.144.251.16 port 39128 [preauth] Dec 25 12:15:22 host sshd[15380]: Connection closed by 172.104.11.46 port 29522 [preauth] Dec 25 12:15:24 host sshd[15395]: Connection closed by 172.104.11.46 port 29530 [preauth] Dec 25 12:15:26 host sshd[15429]: Connection closed by 172.104.11.46 port 29534 [preauth] Dec 25 12:17:12 host sshd[16030]: Did not receive identification string from 65.2.24.248 port 52508 Dec 25 12:17:13 host sshd[16032]: User root from 107.175.33.240 not allowed because not listed in AllowUsers Dec 25 12:17:13 host sshd[16032]: input_userauth_request: invalid user root [preauth] Dec 25 12:17:13 host unix_chkpwd[16035]: password check failed for user (root) Dec 25 12:17:13 host sshd[16032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.175.33.240 user=root Dec 25 12:17:13 host sshd[16032]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:17:15 host sshd[16032]: Failed password for invalid user root from 107.175.33.240 port 36296 ssh2 Dec 25 12:17:15 host sshd[16032]: Received disconnect from 107.175.33.240 port 36296:11: Bye Bye [preauth] Dec 25 12:17:15 host sshd[16032]: Disconnected from 107.175.33.240 port 36296 [preauth] Dec 25 12:17:21 host sshd[16042]: User root from 102.219.86.14 not allowed because not listed in AllowUsers Dec 25 12:17:21 host sshd[16042]: input_userauth_request: invalid user root [preauth] Dec 25 12:17:21 host unix_chkpwd[16045]: password check failed for user (root) Dec 25 12:17:21 host sshd[16042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.219.86.14 user=root Dec 25 12:17:21 host sshd[16042]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:17:23 host sshd[16042]: Failed password for invalid user root from 102.219.86.14 port 52454 ssh2 Dec 25 12:17:23 host sshd[16042]: Received disconnect from 102.219.86.14 port 52454:11: Bye Bye [preauth] Dec 25 12:17:23 host sshd[16042]: Disconnected from 102.219.86.14 port 52454 [preauth] Dec 25 12:17:40 host sshd[16092]: User root from 152.70.148.207 not allowed because not listed in AllowUsers Dec 25 12:17:40 host sshd[16092]: input_userauth_request: invalid user root [preauth] Dec 25 12:17:40 host unix_chkpwd[16095]: password check failed for user (root) Dec 25 12:17:40 host sshd[16092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.70.148.207 user=root Dec 25 12:17:40 host sshd[16092]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:17:42 host sshd[16092]: Failed password for invalid user root from 152.70.148.207 port 56908 ssh2 Dec 25 12:17:42 host sshd[16092]: Received disconnect from 152.70.148.207 port 56908:11: Bye Bye [preauth] Dec 25 12:17:42 host sshd[16092]: Disconnected from 152.70.148.207 port 56908 [preauth] Dec 25 12:17:46 host sshd[16149]: Invalid user admin from 65.2.24.248 port 48656 Dec 25 12:17:46 host sshd[16149]: input_userauth_request: invalid user admin [preauth] Dec 25 12:17:46 host sshd[16149]: pam_unix(sshd:auth): check pass; user unknown Dec 25 12:17:46 host sshd[16149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.2.24.248 Dec 25 12:17:48 host sshd[16149]: Failed password for invalid user admin from 65.2.24.248 port 48656 ssh2 Dec 25 12:17:48 host sshd[16149]: Connection closed by 65.2.24.248 port 48656 [preauth] Dec 25 12:17:51 host sshd[16175]: User root from 102.219.86.14 not allowed because not listed in AllowUsers Dec 25 12:17:51 host sshd[16175]: input_userauth_request: invalid user root [preauth] Dec 25 12:17:51 host unix_chkpwd[16179]: password check failed for user (root) Dec 25 12:17:51 host sshd[16175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.219.86.14 user=root Dec 25 12:17:51 host sshd[16175]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:17:53 host sshd[16175]: Failed password for invalid user root from 102.219.86.14 port 53054 ssh2 Dec 25 12:18:31 host sshd[16324]: Invalid user admin from 65.2.24.248 port 35580 Dec 25 12:18:31 host sshd[16324]: input_userauth_request: invalid user admin [preauth] Dec 25 12:18:32 host sshd[16324]: pam_unix(sshd:auth): check pass; user unknown Dec 25 12:18:32 host sshd[16324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.2.24.248 Dec 25 12:18:32 host sshd[16326]: User root from 144.24.84.192 not allowed because not listed in AllowUsers Dec 25 12:18:32 host sshd[16326]: input_userauth_request: invalid user root [preauth] Dec 25 12:18:32 host unix_chkpwd[16339]: password check failed for user (root) Dec 25 12:18:32 host sshd[16326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.24.84.192 user=root Dec 25 12:18:32 host sshd[16326]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:18:33 host sshd[16324]: Failed password for invalid user admin from 65.2.24.248 port 35580 ssh2 Dec 25 12:18:33 host sshd[16324]: Connection closed by 65.2.24.248 port 35580 [preauth] Dec 25 12:18:34 host sshd[16326]: Failed password for invalid user root from 144.24.84.192 port 45264 ssh2 Dec 25 12:18:34 host sshd[16326]: Received disconnect from 144.24.84.192 port 45264:11: Bye Bye [preauth] Dec 25 12:18:34 host sshd[16326]: Disconnected from 144.24.84.192 port 45264 [preauth] Dec 25 12:20:13 host sshd[16614]: Bad protocol version identification '\026\003\001\001)\001' from 101.199.254.203 port 29525 Dec 25 12:20:32 host sshd[16627]: Did not receive identification string from 101.199.254.198 port 41519 Dec 25 12:21:04 host sshd[16805]: User root from 195.94.209.197 not allowed because not listed in AllowUsers Dec 25 12:21:04 host sshd[16805]: input_userauth_request: invalid user root [preauth] Dec 25 12:21:04 host unix_chkpwd[16812]: password check failed for user (root) Dec 25 12:21:04 host sshd[16805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.94.209.197 user=root Dec 25 12:21:04 host sshd[16805]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:21:06 host sshd[16805]: Failed password for invalid user root from 195.94.209.197 port 46044 ssh2 Dec 25 12:21:06 host sshd[16805]: Received disconnect from 195.94.209.197 port 46044:11: Bye Bye [preauth] Dec 25 12:21:06 host sshd[16805]: Disconnected from 195.94.209.197 port 46044 [preauth] Dec 25 12:21:34 host sshd[16922]: User root from 104.248.127.185 not allowed because not listed in AllowUsers Dec 25 12:21:34 host sshd[16922]: input_userauth_request: invalid user root [preauth] Dec 25 12:21:34 host unix_chkpwd[16930]: password check failed for user (root) Dec 25 12:21:34 host sshd[16922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.127.185 user=root Dec 25 12:21:34 host sshd[16922]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:21:37 host sshd[16922]: Failed password for invalid user root from 104.248.127.185 port 58738 ssh2 Dec 25 12:21:37 host sshd[16922]: Received disconnect from 104.248.127.185 port 58738:11: Bye Bye [preauth] Dec 25 12:21:37 host sshd[16922]: Disconnected from 104.248.127.185 port 58738 [preauth] Dec 25 12:21:37 host sshd[16940]: User root from 193.70.84.66 not allowed because not listed in AllowUsers Dec 25 12:21:37 host sshd[16940]: input_userauth_request: invalid user root [preauth] Dec 25 12:21:37 host unix_chkpwd[16945]: password check failed for user (root) Dec 25 12:21:37 host sshd[16940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.84.66 user=root Dec 25 12:21:37 host sshd[16940]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:21:40 host sshd[16940]: Failed password for invalid user root from 193.70.84.66 port 59236 ssh2 Dec 25 12:21:40 host sshd[16940]: Received disconnect from 193.70.84.66 port 59236:11: Bye Bye [preauth] Dec 25 12:21:40 host sshd[16940]: Disconnected from 193.70.84.66 port 59236 [preauth] Dec 25 12:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 12:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 12:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 12:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 12:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 12:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 12:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 12:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 12:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 12:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 25 12:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 12:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 12:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 25 12:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 12:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 12:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 25 12:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 12:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 12:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 25 12:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 12:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 12:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 25 12:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 12:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 12:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 25 12:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 12:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 12:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 25 12:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 12:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 12:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 25 12:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 12:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 12:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 12:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 12:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 12:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 25 12:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 12:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 12:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=dartsimp user-4=a2zgroup user-5=laundryboniface user-6=wwwpmcresource user-7=travelboniface user-8=ugotscom user-9=wwwrmswll user-10=keralaholi user-11=wwwresourcehunte user-12=disposeat user-13=wwwkmaorg user-14=remysagr user-15=wwwkapin user-16=woodpeck user-17=wwwtestugo user-18=shalinijames user-19=vfmassets user-20=pmcresources user-21=wwwevmhonda user-22=bonifacegroup user-23=wwwletsstalkfood user-24=straightcurve user-25=phmetals user-26=kottayamcalldriv user-27=gifterman user-28=palco123 user-29=wwwnexidigital user-30=mrsclean feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 25 12:21:46 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 25 12:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 12:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 12:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 12:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 12:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 12:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-XBGzD8LvUfjj2Op5.~ Dec 25 12:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 12:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 12:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-XBGzD8LvUfjj2Op5.~' Dec 25 12:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 12:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 12:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-XBGzD8LvUfjj2Op5.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 12:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 12:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 12:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 25 12:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 12:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 25 12:21:47 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 12:21:47 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 25 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 12:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 12:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 12:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 12:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 25 12:21:48 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 25 12:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 25 12:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 25 12:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 25 12:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 25 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 25 12:21:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 25 12:21:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 25 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 25 12:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 12:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 12:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 25 12:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 12:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 12:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 25 12:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 12:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 25 12:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 12:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 12:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 25 12:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 12:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 12:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 25 12:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 25 12:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 25 12:22:14 host sshd[17360]: User root from 207.154.251.92 not allowed because not listed in AllowUsers Dec 25 12:22:14 host sshd[17360]: input_userauth_request: invalid user root [preauth] Dec 25 12:22:14 host unix_chkpwd[17363]: password check failed for user (root) Dec 25 12:22:14 host sshd[17360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.251.92 user=root Dec 25 12:22:14 host sshd[17360]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:22:16 host sshd[17360]: Failed password for invalid user root from 207.154.251.92 port 37218 ssh2 Dec 25 12:22:16 host sshd[17360]: Received disconnect from 207.154.251.92 port 37218:11: Bye Bye [preauth] Dec 25 12:22:16 host sshd[17360]: Disconnected from 207.154.251.92 port 37218 [preauth] Dec 25 12:22:26 host sshd[17401]: User root from 107.175.33.240 not allowed because not listed in AllowUsers Dec 25 12:22:26 host sshd[17401]: input_userauth_request: invalid user root [preauth] Dec 25 12:22:26 host unix_chkpwd[17408]: password check failed for user (root) Dec 25 12:22:26 host sshd[17401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.175.33.240 user=root Dec 25 12:22:26 host sshd[17401]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:22:27 host sshd[17401]: Failed password for invalid user root from 107.175.33.240 port 43890 ssh2 Dec 25 12:22:45 host sshd[17494]: User root from 195.94.209.197 not allowed because not listed in AllowUsers Dec 25 12:22:45 host sshd[17494]: input_userauth_request: invalid user root [preauth] Dec 25 12:22:45 host unix_chkpwd[17497]: password check failed for user (root) Dec 25 12:22:45 host sshd[17494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.94.209.197 user=root Dec 25 12:22:45 host sshd[17494]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:22:47 host sshd[17494]: Failed password for invalid user root from 195.94.209.197 port 48498 ssh2 Dec 25 12:22:47 host sshd[17494]: Received disconnect from 195.94.209.197 port 48498:11: Bye Bye [preauth] Dec 25 12:22:47 host sshd[17494]: Disconnected from 195.94.209.197 port 48498 [preauth] Dec 25 12:22:49 host sshd[17536]: Connection closed by 101.199.254.232 port 18254 [preauth] Dec 25 12:22:50 host sshd[17541]: Protocol major versions differ for 101.199.254.234 port 16742: SSH-2.0-OpenSSH_7.4 vs. SSH-1.5-Server Dec 25 12:23:19 host sshd[17602]: User root from 152.70.148.207 not allowed because not listed in AllowUsers Dec 25 12:23:19 host sshd[17602]: input_userauth_request: invalid user root [preauth] Dec 25 12:23:19 host unix_chkpwd[17605]: password check failed for user (root) Dec 25 12:23:19 host sshd[17602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.70.148.207 user=root Dec 25 12:23:19 host sshd[17602]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:23:21 host sshd[17602]: Failed password for invalid user root from 152.70.148.207 port 57468 ssh2 Dec 25 12:23:21 host sshd[17602]: Received disconnect from 152.70.148.207 port 57468:11: Bye Bye [preauth] Dec 25 12:23:21 host sshd[17602]: Disconnected from 152.70.148.207 port 57468 [preauth] Dec 25 12:23:27 host sshd[17664]: User root from 193.70.84.66 not allowed because not listed in AllowUsers Dec 25 12:23:27 host sshd[17664]: input_userauth_request: invalid user root [preauth] Dec 25 12:23:27 host unix_chkpwd[17666]: password check failed for user (root) Dec 25 12:23:27 host sshd[17664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.84.66 user=root Dec 25 12:23:27 host sshd[17664]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:23:28 host sshd[17664]: Failed password for invalid user root from 193.70.84.66 port 51076 ssh2 Dec 25 12:23:29 host sshd[17676]: User root from 177.96.71.51 not allowed because not listed in AllowUsers Dec 25 12:23:29 host sshd[17676]: input_userauth_request: invalid user root [preauth] Dec 25 12:23:29 host unix_chkpwd[17704]: password check failed for user (root) Dec 25 12:23:29 host sshd[17676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.96.71.51 user=root Dec 25 12:23:29 host sshd[17676]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:23:31 host sshd[17676]: Failed password for invalid user root from 177.96.71.51 port 42392 ssh2 Dec 25 12:23:31 host sshd[17676]: Received disconnect from 177.96.71.51 port 42392:11: Bye Bye [preauth] Dec 25 12:23:31 host sshd[17676]: Disconnected from 177.96.71.51 port 42392 [preauth] Dec 25 12:23:41 host sshd[17726]: User root from 104.248.127.185 not allowed because not listed in AllowUsers Dec 25 12:23:41 host sshd[17726]: input_userauth_request: invalid user root [preauth] Dec 25 12:23:42 host unix_chkpwd[17729]: password check failed for user (root) Dec 25 12:23:42 host sshd[17726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.127.185 user=root Dec 25 12:23:42 host sshd[17726]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:23:44 host sshd[17726]: Failed password for invalid user root from 104.248.127.185 port 52662 ssh2 Dec 25 12:24:12 host sshd[17820]: User root from 207.154.251.92 not allowed because not listed in AllowUsers Dec 25 12:24:12 host sshd[17820]: input_userauth_request: invalid user root [preauth] Dec 25 12:24:12 host unix_chkpwd[17828]: password check failed for user (root) Dec 25 12:24:12 host sshd[17820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.251.92 user=root Dec 25 12:24:12 host sshd[17820]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:24:14 host sshd[17820]: Failed password for invalid user root from 207.154.251.92 port 52130 ssh2 Dec 25 12:24:14 host sshd[17820]: Received disconnect from 207.154.251.92 port 52130:11: Bye Bye [preauth] Dec 25 12:24:14 host sshd[17820]: Disconnected from 207.154.251.92 port 52130 [preauth] Dec 25 12:25:18 host sshd[18016]: User root from 144.24.84.192 not allowed because not listed in AllowUsers Dec 25 12:25:18 host sshd[18016]: input_userauth_request: invalid user root [preauth] Dec 25 12:25:18 host unix_chkpwd[18021]: password check failed for user (root) Dec 25 12:25:18 host sshd[18016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.24.84.192 user=root Dec 25 12:25:18 host sshd[18016]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:25:19 host sshd[18016]: Failed password for invalid user root from 144.24.84.192 port 52022 ssh2 Dec 25 12:25:20 host sshd[18016]: Received disconnect from 144.24.84.192 port 52022:11: Bye Bye [preauth] Dec 25 12:25:20 host sshd[18016]: Disconnected from 144.24.84.192 port 52022 [preauth] Dec 25 12:25:50 host sshd[18171]: User root from 177.96.71.51 not allowed because not listed in AllowUsers Dec 25 12:25:50 host sshd[18171]: input_userauth_request: invalid user root [preauth] Dec 25 12:25:50 host unix_chkpwd[18176]: password check failed for user (root) Dec 25 12:25:50 host sshd[18171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.96.71.51 user=root Dec 25 12:25:50 host sshd[18171]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:25:52 host sshd[18171]: Failed password for invalid user root from 177.96.71.51 port 42506 ssh2 Dec 25 12:25:52 host sshd[18171]: Received disconnect from 177.96.71.51 port 42506:11: Bye Bye [preauth] Dec 25 12:25:52 host sshd[18171]: Disconnected from 177.96.71.51 port 42506 [preauth] Dec 25 12:26:16 host sshd[18229]: Did not receive identification string from 101.199.254.230 port 2664 Dec 25 12:26:31 host sshd[18350]: User root from 58.144.251.16 not allowed because not listed in AllowUsers Dec 25 12:26:31 host sshd[18350]: input_userauth_request: invalid user root [preauth] Dec 25 12:26:31 host unix_chkpwd[18355]: password check failed for user (root) Dec 25 12:26:31 host sshd[18350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.144.251.16 user=root Dec 25 12:26:31 host sshd[18350]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:26:33 host sshd[18350]: Failed password for invalid user root from 58.144.251.16 port 60408 ssh2 Dec 25 12:26:33 host sshd[18350]: Received disconnect from 58.144.251.16 port 60408:11: Bye Bye [preauth] Dec 25 12:26:33 host sshd[18350]: Disconnected from 58.144.251.16 port 60408 [preauth] Dec 25 12:27:26 host sshd[18629]: Connection closed by 101.199.254.235 port 30179 [preauth] Dec 25 12:27:27 host sshd[18674]: Protocol major versions differ for 101.199.254.201 port 63379: SSH-2.0-OpenSSH_7.4 vs. SSH-1.5-Server Dec 25 12:36:08 host sshd[19976]: Did not receive identification string from 58.72.18.130 port 30990 Dec 25 12:38:23 host sshd[20301]: Invalid user user from 84.110.99.202 port 36142 Dec 25 12:38:23 host sshd[20301]: input_userauth_request: invalid user user [preauth] Dec 25 12:38:23 host sshd[20301]: pam_unix(sshd:auth): check pass; user unknown Dec 25 12:38:23 host sshd[20301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.110.99.202 Dec 25 12:38:25 host sshd[20301]: Failed password for invalid user user from 84.110.99.202 port 36142 ssh2 Dec 25 12:38:26 host sshd[20301]: Connection closed by 84.110.99.202 port 36142 [preauth] Dec 25 12:41:04 host sshd[20653]: Invalid user student2 from 162.218.126.136 port 50960 Dec 25 12:41:04 host sshd[20653]: input_userauth_request: invalid user student2 [preauth] Dec 25 12:41:04 host sshd[20653]: pam_unix(sshd:auth): check pass; user unknown Dec 25 12:41:04 host sshd[20653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 25 12:41:06 host sshd[20653]: Failed password for invalid user student2 from 162.218.126.136 port 50960 ssh2 Dec 25 12:41:06 host sshd[20653]: Connection closed by 162.218.126.136 port 50960 [preauth] Dec 25 12:45:35 host sshd[21330]: User root from 164.92.143.10 not allowed because not listed in AllowUsers Dec 25 12:45:35 host sshd[21330]: input_userauth_request: invalid user root [preauth] Dec 25 12:45:35 host unix_chkpwd[21333]: password check failed for user (root) Dec 25 12:45:35 host sshd[21330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.143.10 user=root Dec 25 12:45:35 host sshd[21330]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:45:37 host sshd[21330]: Failed password for invalid user root from 164.92.143.10 port 49552 ssh2 Dec 25 12:45:37 host sshd[21330]: Received disconnect from 164.92.143.10 port 49552:11: Bye Bye [preauth] Dec 25 12:45:37 host sshd[21330]: Disconnected from 164.92.143.10 port 49552 [preauth] Dec 25 12:46:12 host sshd[21398]: User root from 189.242.193.78 not allowed because not listed in AllowUsers Dec 25 12:46:12 host sshd[21398]: input_userauth_request: invalid user root [preauth] Dec 25 12:46:12 host unix_chkpwd[21402]: password check failed for user (root) Dec 25 12:46:12 host sshd[21398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.242.193.78 user=root Dec 25 12:46:12 host sshd[21398]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:46:14 host sshd[21398]: Failed password for invalid user root from 189.242.193.78 port 53198 ssh2 Dec 25 12:46:14 host sshd[21398]: Received disconnect from 189.242.193.78 port 53198:11: Bye Bye [preauth] Dec 25 12:46:14 host sshd[21398]: Disconnected from 189.242.193.78 port 53198 [preauth] Dec 25 12:46:26 host sshd[21436]: User root from 170.64.158.78 not allowed because not listed in AllowUsers Dec 25 12:46:26 host sshd[21436]: input_userauth_request: invalid user root [preauth] Dec 25 12:46:26 host unix_chkpwd[21439]: password check failed for user (root) Dec 25 12:46:26 host sshd[21436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.158.78 user=root Dec 25 12:46:26 host sshd[21436]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:46:29 host sshd[21436]: Failed password for invalid user root from 170.64.158.78 port 53536 ssh2 Dec 25 12:46:29 host sshd[21436]: Received disconnect from 170.64.158.78 port 53536:11: Bye Bye [preauth] Dec 25 12:46:29 host sshd[21436]: Disconnected from 170.64.158.78 port 53536 [preauth] Dec 25 12:47:04 host sshd[21494]: User root from 61.156.33.81 not allowed because not listed in AllowUsers Dec 25 12:47:04 host sshd[21494]: input_userauth_request: invalid user root [preauth] Dec 25 12:47:04 host unix_chkpwd[21497]: password check failed for user (root) Dec 25 12:47:04 host sshd[21494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.156.33.81 user=root Dec 25 12:47:04 host sshd[21494]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:47:07 host sshd[21494]: Failed password for invalid user root from 61.156.33.81 port 43635 ssh2 Dec 25 12:47:07 host sshd[21494]: Received disconnect from 61.156.33.81 port 43635:11: Bye Bye [preauth] Dec 25 12:47:07 host sshd[21494]: Disconnected from 61.156.33.81 port 43635 [preauth] Dec 25 12:48:00 host sshd[21584]: User root from 189.242.193.78 not allowed because not listed in AllowUsers Dec 25 12:48:00 host sshd[21584]: input_userauth_request: invalid user root [preauth] Dec 25 12:48:00 host unix_chkpwd[21591]: password check failed for user (root) Dec 25 12:48:00 host sshd[21584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.242.193.78 user=root Dec 25 12:48:00 host sshd[21584]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:48:02 host sshd[21584]: Failed password for invalid user root from 189.242.193.78 port 50244 ssh2 Dec 25 12:48:02 host sshd[21584]: Received disconnect from 189.242.193.78 port 50244:11: Bye Bye [preauth] Dec 25 12:48:02 host sshd[21584]: Disconnected from 189.242.193.78 port 50244 [preauth] Dec 25 12:49:34 host sshd[21766]: Connection closed by 189.242.198.28 port 40832 [preauth] Dec 25 12:49:35 host sshd[21808]: User root from 68.168.141.140 not allowed because not listed in AllowUsers Dec 25 12:49:35 host sshd[21808]: input_userauth_request: invalid user root [preauth] Dec 25 12:49:35 host unix_chkpwd[21811]: password check failed for user (root) Dec 25 12:49:35 host sshd[21808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.168.141.140 user=root Dec 25 12:49:35 host sshd[21808]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:49:36 host sshd[21808]: Failed password for invalid user root from 68.168.141.140 port 51338 ssh2 Dec 25 12:49:37 host sshd[21808]: Received disconnect from 68.168.141.140 port 51338:11: Bye Bye [preauth] Dec 25 12:49:37 host sshd[21808]: Disconnected from 68.168.141.140 port 51338 [preauth] Dec 25 12:49:46 host sshd[21820]: User root from 72.167.52.254 not allowed because not listed in AllowUsers Dec 25 12:49:46 host sshd[21820]: input_userauth_request: invalid user root [preauth] Dec 25 12:49:46 host unix_chkpwd[21823]: password check failed for user (root) Dec 25 12:49:46 host sshd[21820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.167.52.254 user=root Dec 25 12:49:46 host sshd[21820]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:49:49 host sshd[21820]: Failed password for invalid user root from 72.167.52.254 port 38200 ssh2 Dec 25 12:49:49 host sshd[21820]: Received disconnect from 72.167.52.254 port 38200:11: Bye Bye [preauth] Dec 25 12:49:49 host sshd[21820]: Disconnected from 72.167.52.254 port 38200 [preauth] Dec 25 12:49:50 host sshd[21827]: User root from 197.5.145.68 not allowed because not listed in AllowUsers Dec 25 12:49:50 host sshd[21827]: input_userauth_request: invalid user root [preauth] Dec 25 12:49:50 host unix_chkpwd[21834]: password check failed for user (root) Dec 25 12:49:50 host sshd[21827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.68 user=root Dec 25 12:49:50 host sshd[21827]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:49:52 host sshd[21827]: Failed password for invalid user root from 197.5.145.68 port 20216 ssh2 Dec 25 12:49:53 host sshd[21827]: Received disconnect from 197.5.145.68 port 20216:11: Bye Bye [preauth] Dec 25 12:49:53 host sshd[21827]: Disconnected from 197.5.145.68 port 20216 [preauth] Dec 25 12:50:37 host sshd[22069]: User root from 164.92.143.10 not allowed because not listed in AllowUsers Dec 25 12:50:37 host sshd[22069]: input_userauth_request: invalid user root [preauth] Dec 25 12:50:37 host unix_chkpwd[22073]: password check failed for user (root) Dec 25 12:50:37 host sshd[22069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.143.10 user=root Dec 25 12:50:37 host sshd[22069]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:50:39 host sshd[22069]: Failed password for invalid user root from 164.92.143.10 port 48900 ssh2 Dec 25 12:50:40 host sshd[22108]: User root from 20.198.123.108 not allowed because not listed in AllowUsers Dec 25 12:50:40 host sshd[22108]: input_userauth_request: invalid user root [preauth] Dec 25 12:50:40 host unix_chkpwd[22111]: password check failed for user (root) Dec 25 12:50:40 host sshd[22108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.198.123.108 user=root Dec 25 12:50:40 host sshd[22108]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:50:42 host sshd[22108]: Failed password for invalid user root from 20.198.123.108 port 43687 ssh2 Dec 25 12:50:42 host sshd[22108]: Received disconnect from 20.198.123.108 port 43687:11: Bye Bye [preauth] Dec 25 12:50:42 host sshd[22108]: Disconnected from 20.198.123.108 port 43687 [preauth] Dec 25 12:51:17 host sshd[22163]: User root from 201.217.5.167 not allowed because not listed in AllowUsers Dec 25 12:51:17 host sshd[22163]: input_userauth_request: invalid user root [preauth] Dec 25 12:51:17 host unix_chkpwd[22168]: password check failed for user (root) Dec 25 12:51:17 host sshd[22163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.217.5.167 user=root Dec 25 12:51:17 host sshd[22163]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:51:19 host sshd[22163]: Failed password for invalid user root from 201.217.5.167 port 64164 ssh2 Dec 25 12:51:19 host sshd[22166]: User root from 61.156.33.81 not allowed because not listed in AllowUsers Dec 25 12:51:19 host sshd[22166]: input_userauth_request: invalid user root [preauth] Dec 25 12:51:19 host unix_chkpwd[22172]: password check failed for user (root) Dec 25 12:51:19 host sshd[22166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.156.33.81 user=root Dec 25 12:51:19 host sshd[22166]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:51:20 host sshd[22163]: Received disconnect from 201.217.5.167 port 64164:11: Bye Bye [preauth] Dec 25 12:51:20 host sshd[22163]: Disconnected from 201.217.5.167 port 64164 [preauth] Dec 25 12:51:21 host sshd[22166]: Failed password for invalid user root from 61.156.33.81 port 37330 ssh2 Dec 25 12:51:22 host sshd[22166]: Received disconnect from 61.156.33.81 port 37330:11: Bye Bye [preauth] Dec 25 12:51:22 host sshd[22166]: Disconnected from 61.156.33.81 port 37330 [preauth] Dec 25 12:51:43 host sshd[22260]: User root from 170.64.158.78 not allowed because not listed in AllowUsers Dec 25 12:51:43 host sshd[22260]: input_userauth_request: invalid user root [preauth] Dec 25 12:51:43 host unix_chkpwd[22264]: password check failed for user (root) Dec 25 12:51:43 host sshd[22260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.158.78 user=root Dec 25 12:51:43 host sshd[22260]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:51:45 host sshd[22260]: Failed password for invalid user root from 170.64.158.78 port 51620 ssh2 Dec 25 12:51:45 host sshd[22260]: Received disconnect from 170.64.158.78 port 51620:11: Bye Bye [preauth] Dec 25 12:51:45 host sshd[22260]: Disconnected from 170.64.158.78 port 51620 [preauth] Dec 25 12:51:49 host sshd[22269]: Connection closed by 189.242.198.28 port 45570 [preauth] Dec 25 12:52:11 host sshd[22340]: User root from 72.167.52.254 not allowed because not listed in AllowUsers Dec 25 12:52:11 host sshd[22340]: input_userauth_request: invalid user root [preauth] Dec 25 12:52:11 host unix_chkpwd[22349]: password check failed for user (root) Dec 25 12:52:11 host sshd[22340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.167.52.254 user=root Dec 25 12:52:11 host sshd[22340]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:52:13 host sshd[22340]: Failed password for invalid user root from 72.167.52.254 port 46960 ssh2 Dec 25 12:52:13 host sshd[22340]: Received disconnect from 72.167.52.254 port 46960:11: Bye Bye [preauth] Dec 25 12:52:13 host sshd[22340]: Disconnected from 72.167.52.254 port 46960 [preauth] Dec 25 12:53:12 host sshd[22490]: User root from 197.5.145.68 not allowed because not listed in AllowUsers Dec 25 12:53:12 host sshd[22490]: input_userauth_request: invalid user root [preauth] Dec 25 12:53:12 host unix_chkpwd[22493]: password check failed for user (root) Dec 25 12:53:12 host sshd[22490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.68 user=root Dec 25 12:53:12 host sshd[22490]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:53:14 host sshd[22490]: Failed password for invalid user root from 197.5.145.68 port 20220 ssh2 Dec 25 12:53:32 host sshd[22565]: User root from 20.198.123.108 not allowed because not listed in AllowUsers Dec 25 12:53:32 host sshd[22565]: input_userauth_request: invalid user root [preauth] Dec 25 12:53:32 host unix_chkpwd[22567]: password check failed for user (root) Dec 25 12:53:32 host sshd[22565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.198.123.108 user=root Dec 25 12:53:32 host sshd[22565]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:53:33 host sshd[22565]: Failed password for invalid user root from 20.198.123.108 port 24448 ssh2 Dec 25 12:53:34 host sshd[22565]: Received disconnect from 20.198.123.108 port 24448:11: Bye Bye [preauth] Dec 25 12:53:34 host sshd[22565]: Disconnected from 20.198.123.108 port 24448 [preauth] Dec 25 12:53:45 host sshd[22615]: User root from 201.217.5.167 not allowed because not listed in AllowUsers Dec 25 12:53:45 host sshd[22615]: input_userauth_request: invalid user root [preauth] Dec 25 12:53:45 host unix_chkpwd[22618]: password check failed for user (root) Dec 25 12:53:45 host sshd[22615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.217.5.167 user=root Dec 25 12:53:45 host sshd[22615]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:53:47 host sshd[22451]: Connection closed by 189.242.198.28 port 60071 [preauth] Dec 25 12:53:47 host sshd[22615]: Failed password for invalid user root from 201.217.5.167 port 40381 ssh2 Dec 25 12:53:48 host sshd[22615]: Received disconnect from 201.217.5.167 port 40381:11: Bye Bye [preauth] Dec 25 12:53:48 host sshd[22615]: Disconnected from 201.217.5.167 port 40381 [preauth] Dec 25 12:54:17 host sshd[22690]: User root from 189.242.198.28 not allowed because not listed in AllowUsers Dec 25 12:54:17 host sshd[22690]: input_userauth_request: invalid user root [preauth] Dec 25 12:54:17 host unix_chkpwd[22696]: password check failed for user (root) Dec 25 12:54:17 host sshd[22690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.242.198.28 user=root Dec 25 12:54:17 host sshd[22690]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:54:19 host sshd[22690]: Failed password for invalid user root from 189.242.198.28 port 51762 ssh2 Dec 25 12:54:21 host sshd[22690]: Received disconnect from 189.242.198.28 port 51762:11: Bye Bye [preauth] Dec 25 12:54:21 host sshd[22690]: Disconnected from 189.242.198.28 port 51762 [preauth] Dec 25 12:55:01 host sshd[22779]: User root from 68.168.141.140 not allowed because not listed in AllowUsers Dec 25 12:55:01 host sshd[22779]: input_userauth_request: invalid user root [preauth] Dec 25 12:55:01 host unix_chkpwd[22908]: password check failed for user (root) Dec 25 12:55:01 host sshd[22779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.168.141.140 user=root Dec 25 12:55:01 host sshd[22779]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 12:55:03 host sshd[22779]: Failed password for invalid user root from 68.168.141.140 port 39170 ssh2 Dec 25 12:55:03 host sshd[22779]: Received disconnect from 68.168.141.140 port 39170:11: Bye Bye [preauth] Dec 25 12:55:03 host sshd[22779]: Disconnected from 68.168.141.140 port 39170 [preauth] Dec 25 12:55:52 host sshd[23026]: Invalid user cm from 45.93.201.90 port 38056 Dec 25 12:55:52 host sshd[23026]: input_userauth_request: invalid user cm [preauth] Dec 25 12:55:52 host sshd[23026]: pam_unix(sshd:auth): check pass; user unknown Dec 25 12:55:52 host sshd[23026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 25 12:55:54 host sshd[23026]: Failed password for invalid user cm from 45.93.201.90 port 38056 ssh2 Dec 25 12:55:57 host sshd[23026]: pam_unix(sshd:auth): check pass; user unknown Dec 25 12:55:59 host sshd[23026]: Failed password for invalid user cm from 45.93.201.90 port 38056 ssh2 Dec 25 12:56:02 host sshd[23026]: pam_unix(sshd:auth): check pass; user unknown Dec 25 12:56:04 host sshd[23026]: Failed password for invalid user cm from 45.93.201.90 port 38056 ssh2 Dec 25 12:56:08 host sshd[23026]: Connection closed by 45.93.201.90 port 38056 [preauth] Dec 25 12:56:08 host sshd[23026]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 25 12:56:50 host sshd[23132]: Did not receive identification string from 109.248.6.78 port 57963 Dec 25 13:00:11 host sshd[23446]: User root from 112.161.214.48 not allowed because not listed in AllowUsers Dec 25 13:00:11 host sshd[23446]: input_userauth_request: invalid user root [preauth] Dec 25 13:00:11 host unix_chkpwd[23643]: password check failed for user (root) Dec 25 13:00:11 host sshd[23446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.161.214.48 user=root Dec 25 13:00:11 host sshd[23446]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 13:00:14 host sshd[23446]: Failed password for invalid user root from 112.161.214.48 port 39632 ssh2 Dec 25 13:00:14 host sshd[23446]: Received disconnect from 112.161.214.48 port 39632:11: Bye Bye [preauth] Dec 25 13:00:14 host sshd[23446]: Disconnected from 112.161.214.48 port 39632 [preauth] Dec 25 13:00:15 host sshd[23648]: Invalid user wh from 103.13.40.2 port 59614 Dec 25 13:00:15 host sshd[23648]: input_userauth_request: invalid user wh [preauth] Dec 25 13:00:15 host sshd[23648]: pam_unix(sshd:auth): check pass; user unknown Dec 25 13:00:15 host sshd[23648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 25 13:00:17 host sshd[23648]: Failed password for invalid user wh from 103.13.40.2 port 59614 ssh2 Dec 25 13:00:17 host sshd[23648]: Connection closed by 103.13.40.2 port 59614 [preauth] Dec 25 13:01:01 host sshd[23728]: Connection closed by 112.161.214.48 port 48888 [preauth] Dec 25 13:01:20 host sshd[23786]: Invalid user lxc from 41.197.31.178 port 51562 Dec 25 13:01:20 host sshd[23786]: input_userauth_request: invalid user lxc [preauth] Dec 25 13:01:21 host sshd[23786]: pam_unix(sshd:auth): check pass; user unknown Dec 25 13:01:21 host sshd[23786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 25 13:01:23 host sshd[23786]: Failed password for invalid user lxc from 41.197.31.178 port 51562 ssh2 Dec 25 13:01:23 host sshd[23786]: Connection closed by 41.197.31.178 port 51562 [preauth] Dec 25 13:02:45 host sshd[23853]: User root from 112.161.214.48 not allowed because not listed in AllowUsers Dec 25 13:02:45 host sshd[23853]: input_userauth_request: invalid user root [preauth] Dec 25 13:02:45 host unix_chkpwd[23938]: password check failed for user (root) Dec 25 13:02:45 host sshd[23853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.161.214.48 user=root Dec 25 13:02:45 host sshd[23853]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 13:02:47 host sshd[23853]: Failed password for invalid user root from 112.161.214.48 port 56332 ssh2 Dec 25 13:02:47 host sshd[23853]: Received disconnect from 112.161.214.48 port 56332:11: Bye Bye [preauth] Dec 25 13:02:47 host sshd[23853]: Disconnected from 112.161.214.48 port 56332 [preauth] Dec 25 13:03:06 host sshd[24005]: User root from 106.10.122.53 not allowed because not listed in AllowUsers Dec 25 13:03:06 host sshd[24005]: input_userauth_request: invalid user root [preauth] Dec 25 13:03:06 host unix_chkpwd[24008]: password check failed for user (root) Dec 25 13:03:06 host sshd[24005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 user=root Dec 25 13:03:06 host sshd[24005]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 13:03:07 host sshd[24005]: Failed password for invalid user root from 106.10.122.53 port 54330 ssh2 Dec 25 13:03:08 host sshd[24005]: Connection closed by 106.10.122.53 port 54330 [preauth] Dec 25 13:20:55 host sshd[26417]: Invalid user user from 92.46.108.20 port 54756 Dec 25 13:20:55 host sshd[26417]: input_userauth_request: invalid user user [preauth] Dec 25 13:20:55 host sshd[26417]: pam_unix(sshd:auth): check pass; user unknown Dec 25 13:20:55 host sshd[26417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 25 13:20:57 host sshd[26417]: Failed password for invalid user user from 92.46.108.20 port 54756 ssh2 Dec 25 13:20:57 host sshd[26417]: Connection closed by 92.46.108.20 port 54756 [preauth] Dec 25 13:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 13:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 13:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 13:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 13:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 13:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 13:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 13:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 13:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 13:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 25 13:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 13:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 13:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 25 13:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 13:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 13:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 25 13:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 13:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 13:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 25 13:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 13:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 13:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 25 13:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 13:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 13:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 25 13:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 13:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 13:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 25 13:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 13:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 13:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 25 13:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 13:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 13:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 13:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 13:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 13:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 25 13:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 13:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 13:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkapin user-2=woodpeck user-3=disposeat user-4=wwwkmaorg user-5=remysagr user-6=pmcresources user-7=wwwtestugo user-8=shalinijames user-9=vfmassets user-10=wwwletsstalkfood user-11=straightcurve user-12=wwwevmhonda user-13=bonifacegroup user-14=wwwnexidigital user-15=mrsclean user-16=phmetals user-17=kottayamcalldriv user-18=gifterman user-19=palco123 user-20=cochintaxi user-21=wwwkaretakers user-22=laundryboniface user-23=dartsimp user-24=a2zgroup user-25=wwwpmcresource user-26=ugotscom user-27=wwwrmswll user-28=keralaholi user-29=wwwresourcehunte user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 25 13:21:46 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 25 13:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 13:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 13:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 13:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 13:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 13:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-nBMw2iNbWXypd293.~ Dec 25 13:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 13:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 13:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-nBMw2iNbWXypd293.~' Dec 25 13:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 13:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 13:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-nBMw2iNbWXypd293.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 13:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 13:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 13:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 25 13:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 13:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 13:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 25 13:21:47 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 13:21:47 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 13:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 13:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 13:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 13:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 13:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 13:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 13:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 13:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 13:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 13:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 25 13:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 13:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 13:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 13:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 25 13:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 25 13:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 25 13:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 25 13:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 25 13:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 25 13:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 25 13:21:51 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 25 13:21:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 25 13:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 25 13:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 13:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 13:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 25 13:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 13:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 13:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 25 13:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 13:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 13:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 25 13:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 13:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 13:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 25 13:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 13:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 13:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 25 13:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 25 13:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 25 13:55:12 host sshd[31840]: Invalid user cwd from 162.218.126.136 port 37520 Dec 25 13:55:12 host sshd[31840]: input_userauth_request: invalid user cwd [preauth] Dec 25 13:55:12 host sshd[31840]: pam_unix(sshd:auth): check pass; user unknown Dec 25 13:55:12 host sshd[31840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 25 13:55:15 host sshd[31840]: Failed password for invalid user cwd from 162.218.126.136 port 37520 ssh2 Dec 25 13:55:15 host sshd[31840]: Connection closed by 162.218.126.136 port 37520 [preauth] Dec 25 14:03:01 host sshd[377]: User root from 84.110.99.202 not allowed because not listed in AllowUsers Dec 25 14:03:01 host sshd[377]: input_userauth_request: invalid user root [preauth] Dec 25 14:03:02 host unix_chkpwd[390]: password check failed for user (root) Dec 25 14:03:02 host sshd[377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.110.99.202 user=root Dec 25 14:03:02 host sshd[377]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 14:03:03 host sshd[377]: Failed password for invalid user root from 84.110.99.202 port 36976 ssh2 Dec 25 14:03:03 host sshd[377]: Connection closed by 84.110.99.202 port 36976 [preauth] Dec 25 14:07:05 host sshd[953]: Connection closed by 162.243.147.17 port 41096 [preauth] Dec 25 14:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 14:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 14:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 14:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 14:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 14:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 14:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 14:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 14:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 14:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 25 14:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 14:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 14:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 25 14:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 14:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 14:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 25 14:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 14:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 14:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 25 14:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 14:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 14:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 25 14:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 14:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 14:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 25 14:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 14:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 14:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 25 14:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 14:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 14:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 25 14:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 14:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 14:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 14:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 14:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 14:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 25 14:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 14:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 14:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=ugotscom user-2=wwwrmswll user-3=keralaholi user-4=wwwresourcehunte user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=dartsimp user-9=a2zgroup user-10=wwwkaretakers user-11=cochintaxi user-12=wwwnexidigital user-13=mrsclean user-14=phmetals user-15=kottayamcalldriv user-16=gifterman user-17=palco123 user-18=wwwletsstalkfood user-19=straightcurve user-20=wwwevmhonda user-21=bonifacegroup user-22=pmcresources user-23=wwwtestugo user-24=shalinijames user-25=vfmassets user-26=woodpeck user-27=wwwkapin user-28=disposeat user-29=wwwkmaorg user-30=remysagr feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 25 14:21:46 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 25 14:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 14:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 14:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 14:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 14:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 14:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-j7EygVfYUJSp8aTK.~ Dec 25 14:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 14:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 14:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-j7EygVfYUJSp8aTK.~' Dec 25 14:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 14:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 14:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-j7EygVfYUJSp8aTK.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 14:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 14:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 14:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 25 14:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 14:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 14:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 25 14:21:47 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 14:21:47 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 14:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 14:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 14:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 14:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 14:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 14:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 14:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 14:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 14:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 14:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 25 14:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 14:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 14:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 14:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 14:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 14:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 25 14:21:48 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 25 14:21:49 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 25 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 25 14:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 25 14:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 25 14:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 25 14:21:51 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 25 14:21:52 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 25 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 25 14:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 14:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 14:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 25 14:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 14:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 14:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 25 14:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 14:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 25 14:21:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 14:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 14:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 25 14:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 14:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 14:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 25 14:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 25 14:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 25 14:35:31 host sshd[5036]: Invalid user user from 103.13.40.2 port 48832 Dec 25 14:35:31 host sshd[5036]: input_userauth_request: invalid user user [preauth] Dec 25 14:35:31 host sshd[5036]: pam_unix(sshd:auth): check pass; user unknown Dec 25 14:35:31 host sshd[5036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 25 14:35:32 host sshd[5036]: Failed password for invalid user user from 103.13.40.2 port 48832 ssh2 Dec 25 14:35:32 host sshd[5036]: Connection closed by 103.13.40.2 port 48832 [preauth] Dec 25 14:38:54 host sshd[5511]: Invalid user user1 from 106.10.122.53 port 38852 Dec 25 14:38:54 host sshd[5511]: input_userauth_request: invalid user user1 [preauth] Dec 25 14:38:54 host sshd[5511]: pam_unix(sshd:auth): check pass; user unknown Dec 25 14:38:54 host sshd[5511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 25 14:38:56 host sshd[5511]: Failed password for invalid user user1 from 106.10.122.53 port 38852 ssh2 Dec 25 14:38:57 host sshd[5511]: Connection closed by 106.10.122.53 port 38852 [preauth] Dec 25 14:44:55 host sshd[6292]: Invalid user cn from 45.93.201.90 port 48214 Dec 25 14:44:55 host sshd[6292]: input_userauth_request: invalid user cn [preauth] Dec 25 14:44:55 host sshd[6292]: pam_unix(sshd:auth): check pass; user unknown Dec 25 14:44:55 host sshd[6292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 25 14:44:57 host sshd[6292]: Failed password for invalid user cn from 45.93.201.90 port 48214 ssh2 Dec 25 14:45:00 host sshd[6292]: pam_unix(sshd:auth): check pass; user unknown Dec 25 14:45:02 host sshd[6292]: Failed password for invalid user cn from 45.93.201.90 port 48214 ssh2 Dec 25 14:45:06 host sshd[6292]: pam_unix(sshd:auth): check pass; user unknown Dec 25 14:45:08 host sshd[6292]: Failed password for invalid user cn from 45.93.201.90 port 48214 ssh2 Dec 25 14:45:11 host sshd[6292]: Connection closed by 45.93.201.90 port 48214 [preauth] Dec 25 14:45:11 host sshd[6292]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 25 14:53:41 host sshd[7554]: User root from 41.197.31.178 not allowed because not listed in AllowUsers Dec 25 14:53:41 host sshd[7554]: input_userauth_request: invalid user root [preauth] Dec 25 14:53:41 host unix_chkpwd[7557]: password check failed for user (root) Dec 25 14:53:41 host sshd[7554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 user=root Dec 25 14:53:41 host sshd[7554]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 14:53:44 host sshd[7554]: Failed password for invalid user root from 41.197.31.178 port 56200 ssh2 Dec 25 14:53:44 host sshd[7554]: Connection closed by 41.197.31.178 port 56200 [preauth] Dec 25 15:09:32 host sshd[10022]: Invalid user abonent1 from 162.218.126.136 port 43290 Dec 25 15:09:32 host sshd[10022]: input_userauth_request: invalid user abonent1 [preauth] Dec 25 15:09:32 host sshd[10022]: pam_unix(sshd:auth): check pass; user unknown Dec 25 15:09:32 host sshd[10022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 25 15:09:33 host sshd[10022]: Failed password for invalid user abonent1 from 162.218.126.136 port 43290 ssh2 Dec 25 15:09:34 host sshd[10022]: Connection closed by 162.218.126.136 port 43290 [preauth] Dec 25 15:16:26 host sshd[11074]: Invalid user hadoop from 92.46.108.20 port 42696 Dec 25 15:16:26 host sshd[11074]: input_userauth_request: invalid user hadoop [preauth] Dec 25 15:16:26 host sshd[11074]: pam_unix(sshd:auth): check pass; user unknown Dec 25 15:16:26 host sshd[11074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 25 15:16:28 host sshd[11074]: Failed password for invalid user hadoop from 92.46.108.20 port 42696 ssh2 Dec 25 15:16:28 host sshd[11074]: Connection closed by 92.46.108.20 port 42696 [preauth] Dec 25 15:20:03 host sshd[11621]: User root from 65.108.223.221 not allowed because not listed in AllowUsers Dec 25 15:20:03 host sshd[11621]: input_userauth_request: invalid user root [preauth] Dec 25 15:20:03 host unix_chkpwd[11624]: password check failed for user (root) Dec 25 15:20:03 host sshd[11621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.108.223.221 user=root Dec 25 15:20:03 host sshd[11621]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 15:20:06 host sshd[11621]: Failed password for invalid user root from 65.108.223.221 port 49078 ssh2 Dec 25 15:20:06 host sshd[11621]: Received disconnect from 65.108.223.221 port 49078:11: Bye Bye [preauth] Dec 25 15:20:06 host sshd[11621]: Disconnected from 65.108.223.221 port 49078 [preauth] Dec 25 15:20:20 host sshd[11645]: User root from 158.101.165.108 not allowed because not listed in AllowUsers Dec 25 15:20:20 host sshd[11645]: input_userauth_request: invalid user root [preauth] Dec 25 15:20:20 host unix_chkpwd[11648]: password check failed for user (root) Dec 25 15:20:20 host sshd[11645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.101.165.108 user=root Dec 25 15:20:20 host sshd[11645]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 15:20:22 host sshd[11645]: Failed password for invalid user root from 158.101.165.108 port 46134 ssh2 Dec 25 15:20:22 host sshd[11645]: Received disconnect from 158.101.165.108 port 46134:11: Bye Bye [preauth] Dec 25 15:20:22 host sshd[11645]: Disconnected from 158.101.165.108 port 46134 [preauth] Dec 25 15:20:58 host sshd[11739]: User root from 43.155.165.118 not allowed because not listed in AllowUsers Dec 25 15:20:58 host sshd[11739]: input_userauth_request: invalid user root [preauth] Dec 25 15:20:58 host unix_chkpwd[11744]: password check failed for user (root) Dec 25 15:20:58 host sshd[11739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.165.118 user=root Dec 25 15:20:58 host sshd[11739]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 15:20:59 host sshd[11739]: Failed password for invalid user root from 43.155.165.118 port 56604 ssh2 Dec 25 15:21:00 host sshd[11739]: Received disconnect from 43.155.165.118 port 56604:11: Bye Bye [preauth] Dec 25 15:21:00 host sshd[11739]: Disconnected from 43.155.165.118 port 56604 [preauth] Dec 25 15:21:09 host sshd[11774]: User root from 150.109.172.228 not allowed because not listed in AllowUsers Dec 25 15:21:09 host sshd[11774]: input_userauth_request: invalid user root [preauth] Dec 25 15:21:09 host unix_chkpwd[11776]: password check failed for user (root) Dec 25 15:21:09 host sshd[11774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.172.228 user=root Dec 25 15:21:09 host sshd[11774]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 15:21:10 host sshd[11774]: Failed password for invalid user root from 150.109.172.228 port 40422 ssh2 Dec 25 15:21:11 host sshd[11774]: Received disconnect from 150.109.172.228 port 40422:11: Bye Bye [preauth] Dec 25 15:21:11 host sshd[11774]: Disconnected from 150.109.172.228 port 40422 [preauth] Dec 25 15:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 15:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 15:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 15:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 15:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 15:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 15:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 15:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 15:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 15:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 25 15:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 15:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 15:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 25 15:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 15:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 15:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 25 15:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 15:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 15:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 25 15:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 15:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 15:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 25 15:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 15:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 15:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 25 15:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 15:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 15:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 25 15:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 15:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 15:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 25 15:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 15:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 15:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 15:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 15:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 15:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 25 15:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 15:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 15:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=wwwrmswll user-4=keralaholi user-5=wwwresourcehunte user-6=ugotscom user-7=wwwkaretakers user-8=cochintaxi user-9=dartsimp user-10=a2zgroup user-11=laundryboniface user-12=bonifacegroup user-13=wwwevmhonda user-14=straightcurve user-15=wwwletsstalkfood user-16=gifterman user-17=palco123 user-18=phmetals user-19=kottayamcalldriv user-20=wwwnexidigital user-21=mrsclean user-22=disposeat user-23=wwwkmaorg user-24=remysagr user-25=wwwkapin user-26=woodpeck user-27=vfmassets user-28=wwwtestugo user-29=shalinijames user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 25 15:21:46 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 25 15:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 15:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 15:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 15:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 15:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 15:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-QGAI2Aidor7erII0.~ Dec 25 15:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 15:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 15:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-QGAI2Aidor7erII0.~' Dec 25 15:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 15:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 15:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-QGAI2Aidor7erII0.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 15:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 15:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 15:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 25 15:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 15:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 15:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 25 15:21:46 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 15:21:46 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 25 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 15:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 15:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 15:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 15:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 25 15:21:48 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 25 15:21:49 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 25 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 25 15:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 25 15:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 25 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 25 15:21:51 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 25 15:21:53 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 25 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 25 15:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 15:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 25 15:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 15:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 15:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 25 15:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 15:21:55 host sshd[12040]: User root from 159.89.162.253 not allowed because not listed in AllowUsers Dec 25 15:21:55 host sshd[12040]: input_userauth_request: invalid user root [preauth] Dec 25 15:21:55 host unix_chkpwd[12042]: password check failed for user (root) Dec 25 15:21:55 host sshd[12040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.162.253 user=root Dec 25 15:21:55 host sshd[12040]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 15:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 15:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 25 15:21:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 15:21:58 host sshd[12040]: Failed password for invalid user root from 159.89.162.253 port 51962 ssh2 Dec 25 15:21:58 host sshd[12040]: Received disconnect from 159.89.162.253 port 51962:11: Bye Bye [preauth] Dec 25 15:21:58 host sshd[12040]: Disconnected from 159.89.162.253 port 51962 [preauth] Dec 25 15:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 25 15:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 15:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 15:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 25 15:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 25 15:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 25 15:22:23 host sshd[12113]: User root from 178.217.173.54 not allowed because not listed in AllowUsers Dec 25 15:22:23 host sshd[12113]: input_userauth_request: invalid user root [preauth] Dec 25 15:22:23 host unix_chkpwd[12124]: password check failed for user (root) Dec 25 15:22:23 host sshd[12113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.217.173.54 user=root Dec 25 15:22:23 host sshd[12113]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 15:22:25 host sshd[12113]: Failed password for invalid user root from 178.217.173.54 port 42390 ssh2 Dec 25 15:22:25 host sshd[12113]: Received disconnect from 178.217.173.54 port 42390:11: Bye Bye [preauth] Dec 25 15:22:25 host sshd[12113]: Disconnected from 178.217.173.54 port 42390 [preauth] Dec 25 15:25:20 host sshd[12582]: User root from 158.101.165.108 not allowed because not listed in AllowUsers Dec 25 15:25:20 host sshd[12582]: input_userauth_request: invalid user root [preauth] Dec 25 15:25:20 host unix_chkpwd[12584]: password check failed for user (root) Dec 25 15:25:20 host sshd[12582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.101.165.108 user=root Dec 25 15:25:20 host sshd[12582]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 15:25:22 host sshd[12582]: Failed password for invalid user root from 158.101.165.108 port 55852 ssh2 Dec 25 15:25:22 host sshd[12582]: Received disconnect from 158.101.165.108 port 55852:11: Bye Bye [preauth] Dec 25 15:25:22 host sshd[12582]: Disconnected from 158.101.165.108 port 55852 [preauth] Dec 25 15:26:07 host sshd[12730]: User root from 65.108.223.221 not allowed because not listed in AllowUsers Dec 25 15:26:07 host sshd[12730]: input_userauth_request: invalid user root [preauth] Dec 25 15:26:07 host unix_chkpwd[12733]: password check failed for user (root) Dec 25 15:26:07 host sshd[12730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.108.223.221 user=root Dec 25 15:26:07 host sshd[12730]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 15:26:10 host sshd[12730]: Failed password for invalid user root from 65.108.223.221 port 50238 ssh2 Dec 25 15:26:28 host sshd[12818]: User root from 159.89.162.253 not allowed because not listed in AllowUsers Dec 25 15:26:28 host sshd[12818]: input_userauth_request: invalid user root [preauth] Dec 25 15:26:28 host unix_chkpwd[12820]: password check failed for user (root) Dec 25 15:26:28 host sshd[12818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.162.253 user=root Dec 25 15:26:28 host sshd[12818]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 15:26:28 host sshd[12815]: User root from 43.155.165.118 not allowed because not listed in AllowUsers Dec 25 15:26:28 host sshd[12815]: input_userauth_request: invalid user root [preauth] Dec 25 15:26:28 host unix_chkpwd[12821]: password check failed for user (root) Dec 25 15:26:28 host sshd[12815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.165.118 user=root Dec 25 15:26:28 host sshd[12815]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 15:26:30 host sshd[12818]: Failed password for invalid user root from 159.89.162.253 port 44794 ssh2 Dec 25 15:26:30 host sshd[12818]: Received disconnect from 159.89.162.253 port 44794:11: Bye Bye [preauth] Dec 25 15:26:30 host sshd[12818]: Disconnected from 159.89.162.253 port 44794 [preauth] Dec 25 15:26:31 host sshd[12815]: Failed password for invalid user root from 43.155.165.118 port 57228 ssh2 Dec 25 15:26:31 host sshd[12815]: Received disconnect from 43.155.165.118 port 57228:11: Bye Bye [preauth] Dec 25 15:26:31 host sshd[12815]: Disconnected from 43.155.165.118 port 57228 [preauth] Dec 25 15:26:57 host sshd[12913]: User root from 150.109.172.228 not allowed because not listed in AllowUsers Dec 25 15:26:57 host sshd[12913]: input_userauth_request: invalid user root [preauth] Dec 25 15:26:57 host unix_chkpwd[12916]: password check failed for user (root) Dec 25 15:26:57 host sshd[12913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.172.228 user=root Dec 25 15:26:57 host sshd[12913]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 15:26:59 host sshd[12913]: Failed password for invalid user root from 150.109.172.228 port 40714 ssh2 Dec 25 15:27:20 host sshd[12965]: User root from 191.33.245.18 not allowed because not listed in AllowUsers Dec 25 15:27:20 host sshd[12965]: input_userauth_request: invalid user root [preauth] Dec 25 15:27:20 host unix_chkpwd[12991]: password check failed for user (root) Dec 25 15:27:20 host sshd[12965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.33.245.18 user=root Dec 25 15:27:20 host sshd[12965]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 15:27:21 host sshd[12965]: Failed password for invalid user root from 191.33.245.18 port 57026 ssh2 Dec 25 15:27:22 host sshd[12965]: Received disconnect from 191.33.245.18 port 57026:11: Bye Bye [preauth] Dec 25 15:27:22 host sshd[12965]: Disconnected from 191.33.245.18 port 57026 [preauth] Dec 25 15:27:23 host sshd[12993]: User root from 178.217.173.54 not allowed because not listed in AllowUsers Dec 25 15:27:23 host sshd[12993]: input_userauth_request: invalid user root [preauth] Dec 25 15:27:23 host unix_chkpwd[12996]: password check failed for user (root) Dec 25 15:27:23 host sshd[12993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.217.173.54 user=root Dec 25 15:27:23 host sshd[12993]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 15:27:24 host sshd[12993]: Failed password for invalid user root from 178.217.173.54 port 60684 ssh2 Dec 25 15:27:25 host sshd[12993]: Received disconnect from 178.217.173.54 port 60684:11: Bye Bye [preauth] Dec 25 15:27:25 host sshd[12993]: Disconnected from 178.217.173.54 port 60684 [preauth] Dec 25 15:27:38 host sshd[13066]: Invalid user wordpress from 84.110.99.202 port 49592 Dec 25 15:27:38 host sshd[13066]: input_userauth_request: invalid user wordpress [preauth] Dec 25 15:27:38 host sshd[13066]: pam_unix(sshd:auth): check pass; user unknown Dec 25 15:27:38 host sshd[13066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.110.99.202 Dec 25 15:27:40 host sshd[13066]: Failed password for invalid user wordpress from 84.110.99.202 port 49592 ssh2 Dec 25 15:27:40 host sshd[13066]: Connection closed by 84.110.99.202 port 49592 [preauth] Dec 25 15:36:47 host sshd[14501]: User root from 191.33.245.18 not allowed because not listed in AllowUsers Dec 25 15:36:47 host sshd[14501]: input_userauth_request: invalid user root [preauth] Dec 25 15:36:47 host unix_chkpwd[14534]: password check failed for user (root) Dec 25 15:36:47 host sshd[14501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.33.245.18 user=root Dec 25 15:36:47 host sshd[14501]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 15:36:50 host sshd[14501]: Failed password for invalid user root from 191.33.245.18 port 44018 ssh2 Dec 25 15:51:48 host sshd[16688]: Connection closed by 94.102.61.20 port 54284 [preauth] Dec 25 15:59:46 host sshd[17914]: User root from 218.92.0.210 not allowed because not listed in AllowUsers Dec 25 15:59:46 host sshd[17914]: input_userauth_request: invalid user root [preauth] Dec 25 15:59:46 host unix_chkpwd[17921]: password check failed for user (root) Dec 25 15:59:46 host sshd[17914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.210 user=root Dec 25 15:59:46 host sshd[17914]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 15:59:48 host sshd[17914]: Failed password for invalid user root from 218.92.0.210 port 32408 ssh2 Dec 25 15:59:49 host unix_chkpwd[17924]: password check failed for user (root) Dec 25 15:59:49 host sshd[17914]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 15:59:51 host sshd[17914]: Failed password for invalid user root from 218.92.0.210 port 32408 ssh2 Dec 25 15:59:51 host unix_chkpwd[17927]: password check failed for user (root) Dec 25 15:59:51 host sshd[17914]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 15:59:53 host sshd[17914]: Failed password for invalid user root from 218.92.0.210 port 32408 ssh2 Dec 25 15:59:53 host sshd[17914]: Received disconnect from 218.92.0.210 port 32408:11: [preauth] Dec 25 15:59:53 host sshd[17914]: Disconnected from 218.92.0.210 port 32408 [preauth] Dec 25 15:59:53 host sshd[17914]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.210 user=root Dec 25 16:05:14 host sshd[18783]: Invalid user from 64.62.197.69 port 59729 Dec 25 16:05:14 host sshd[18783]: input_userauth_request: invalid user [preauth] Dec 25 16:05:18 host sshd[18783]: Connection closed by 64.62.197.69 port 59729 [preauth] Dec 25 16:09:46 host sshd[19418]: User root from 103.13.40.2 not allowed because not listed in AllowUsers Dec 25 16:09:46 host sshd[19418]: input_userauth_request: invalid user root [preauth] Dec 25 16:09:46 host unix_chkpwd[19420]: password check failed for user (root) Dec 25 16:09:46 host sshd[19418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 user=root Dec 25 16:09:46 host sshd[19418]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 16:09:48 host sshd[19418]: Failed password for invalid user root from 103.13.40.2 port 59014 ssh2 Dec 25 16:09:48 host sshd[19418]: Connection closed by 103.13.40.2 port 59014 [preauth] Dec 25 16:13:42 host sshd[20031]: User root from 106.10.122.53 not allowed because not listed in AllowUsers Dec 25 16:13:42 host sshd[20031]: input_userauth_request: invalid user root [preauth] Dec 25 16:13:42 host unix_chkpwd[20036]: password check failed for user (root) Dec 25 16:13:42 host sshd[20031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 user=root Dec 25 16:13:42 host sshd[20031]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 16:13:44 host sshd[20031]: Failed password for invalid user root from 106.10.122.53 port 36236 ssh2 Dec 25 16:13:44 host sshd[20031]: Connection closed by 106.10.122.53 port 36236 [preauth] Dec 25 16:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 16:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 16:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 16:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 16:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 16:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 16:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 16:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 16:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 16:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 25 16:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 16:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 16:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 25 16:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 16:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 16:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 25 16:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 16:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 16:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 25 16:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 16:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 16:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 25 16:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 16:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 16:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 25 16:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 16:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 16:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 25 16:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 16:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 16:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 25 16:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 16:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 25 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=palco123 user-2=gifterman user-3=phmetals user-4=kottayamcalldriv user-5=mrsclean user-6=wwwnexidigital user-7=bonifacegroup user-8=wwwevmhonda user-9=wwwletsstalkfood user-10=straightcurve user-11=vfmassets user-12=shalinijames user-13=wwwtestugo user-14=pmcresources user-15=disposeat user-16=wwwkmaorg user-17=remysagr user-18=wwwkapin user-19=woodpeck user-20=travelboniface user-21=keralaholi user-22=wwwresourcehunte user-23=wwwrmswll user-24=ugotscom user-25=wwwpmcresource user-26=a2zgroup user-27=dartsimp user-28=laundryboniface user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 25 16:21:47 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 25 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-v2QdJMLyCnTZTuMd.~ Dec 25 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-v2QdJMLyCnTZTuMd.~' Dec 25 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-v2QdJMLyCnTZTuMd.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 25 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 16:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 25 16:21:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 16:21:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 16:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 16:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 16:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 16:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 16:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 16:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 16:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 16:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 16:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 16:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 25 16:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 16:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 25 16:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 25 16:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 25 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 25 16:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 25 16:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 25 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 25 16:21:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 25 16:21:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 25 16:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 25 16:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 16:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 25 16:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 16:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 16:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 25 16:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 16:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 16:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 25 16:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 16:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 16:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 25 16:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 16:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 16:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 25 16:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 25 16:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 25 16:23:34 host sshd[21768]: Invalid user wangfei from 162.218.126.136 port 33776 Dec 25 16:23:34 host sshd[21768]: input_userauth_request: invalid user wangfei [preauth] Dec 25 16:23:35 host sshd[21768]: pam_unix(sshd:auth): check pass; user unknown Dec 25 16:23:35 host sshd[21768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 25 16:23:37 host sshd[21768]: Failed password for invalid user wangfei from 162.218.126.136 port 33776 ssh2 Dec 25 16:23:37 host sshd[21768]: Connection closed by 162.218.126.136 port 33776 [preauth] Dec 25 16:29:33 host sshd[22654]: Did not receive identification string from 193.42.33.81 port 48670 Dec 25 16:29:54 host sshd[22681]: User root from 193.42.33.81 not allowed because not listed in AllowUsers Dec 25 16:29:54 host sshd[22681]: input_userauth_request: invalid user root [preauth] Dec 25 16:29:54 host unix_chkpwd[22684]: password check failed for user (root) Dec 25 16:29:54 host sshd[22681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.42.33.81 user=root Dec 25 16:29:54 host sshd[22681]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 16:29:56 host sshd[22681]: Failed password for invalid user root from 193.42.33.81 port 39354 ssh2 Dec 25 16:29:56 host sshd[22681]: Received disconnect from 193.42.33.81 port 39354:11: Normal Shutdown, Thank you for playing [preauth] Dec 25 16:29:56 host sshd[22681]: Disconnected from 193.42.33.81 port 39354 [preauth] Dec 25 16:30:10 host sshd[22757]: User root from 193.42.33.81 not allowed because not listed in AllowUsers Dec 25 16:30:10 host sshd[22757]: input_userauth_request: invalid user root [preauth] Dec 25 16:30:10 host unix_chkpwd[22761]: password check failed for user (root) Dec 25 16:30:10 host sshd[22757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.42.33.81 user=root Dec 25 16:30:10 host sshd[22757]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 16:30:12 host sshd[22757]: Failed password for invalid user root from 193.42.33.81 port 32980 ssh2 Dec 25 16:30:12 host sshd[22757]: Received disconnect from 193.42.33.81 port 32980:11: Normal Shutdown, Thank you for playing [preauth] Dec 25 16:30:12 host sshd[22757]: Disconnected from 193.42.33.81 port 32980 [preauth] Dec 25 16:31:53 host sshd[23004]: Invalid user co from 45.93.201.90 port 33200 Dec 25 16:31:53 host sshd[23004]: input_userauth_request: invalid user co [preauth] Dec 25 16:31:53 host sshd[23004]: pam_unix(sshd:auth): check pass; user unknown Dec 25 16:31:53 host sshd[23004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 25 16:31:55 host sshd[23004]: Failed password for invalid user co from 45.93.201.90 port 33200 ssh2 Dec 25 16:31:58 host sshd[23004]: pam_unix(sshd:auth): check pass; user unknown Dec 25 16:32:00 host sshd[23004]: Failed password for invalid user co from 45.93.201.90 port 33200 ssh2 Dec 25 16:32:03 host sshd[23004]: pam_unix(sshd:auth): check pass; user unknown Dec 25 16:32:04 host sshd[23004]: Failed password for invalid user co from 45.93.201.90 port 33200 ssh2 Dec 25 16:32:08 host sshd[23004]: Connection closed by 45.93.201.90 port 33200 [preauth] Dec 25 16:32:08 host sshd[23004]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 25 16:39:47 host sshd[24241]: User root from 181.48.134.66 not allowed because not listed in AllowUsers Dec 25 16:39:47 host sshd[24241]: input_userauth_request: invalid user root [preauth] Dec 25 16:39:47 host unix_chkpwd[24245]: password check failed for user (root) Dec 25 16:39:47 host sshd[24241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.134.66 user=root Dec 25 16:39:47 host sshd[24241]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 16:39:49 host sshd[24241]: Failed password for invalid user root from 181.48.134.66 port 44576 ssh2 Dec 25 16:39:49 host sshd[24241]: Received disconnect from 181.48.134.66 port 44576:11: Bye Bye [preauth] Dec 25 16:39:49 host sshd[24241]: Disconnected from 181.48.134.66 port 44576 [preauth] Dec 25 16:40:22 host sshd[24324]: User root from 137.184.120.104 not allowed because not listed in AllowUsers Dec 25 16:40:22 host sshd[24324]: input_userauth_request: invalid user root [preauth] Dec 25 16:40:23 host unix_chkpwd[24331]: password check failed for user (root) Dec 25 16:40:23 host sshd[24324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.120.104 user=root Dec 25 16:40:23 host sshd[24324]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 16:40:24 host sshd[24324]: Failed password for invalid user root from 137.184.120.104 port 59350 ssh2 Dec 25 16:40:25 host sshd[24324]: Received disconnect from 137.184.120.104 port 59350:11: Bye Bye [preauth] Dec 25 16:40:25 host sshd[24324]: Disconnected from 137.184.120.104 port 59350 [preauth] Dec 25 16:43:12 host sshd[24711]: User root from 202.29.220.126 not allowed because not listed in AllowUsers Dec 25 16:43:12 host sshd[24711]: input_userauth_request: invalid user root [preauth] Dec 25 16:43:13 host unix_chkpwd[24713]: password check failed for user (root) Dec 25 16:43:13 host sshd[24711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.29.220.126 user=root Dec 25 16:43:13 host sshd[24711]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 16:43:14 host sshd[24711]: Failed password for invalid user root from 202.29.220.126 port 63932 ssh2 Dec 25 16:43:14 host sshd[24711]: Received disconnect from 202.29.220.126 port 63932:11: Bye Bye [preauth] Dec 25 16:43:14 host sshd[24711]: Disconnected from 202.29.220.126 port 63932 [preauth] Dec 25 16:44:01 host sshd[24803]: User root from 68.183.104.78 not allowed because not listed in AllowUsers Dec 25 16:44:01 host sshd[24803]: input_userauth_request: invalid user root [preauth] Dec 25 16:44:01 host unix_chkpwd[24813]: password check failed for user (root) Dec 25 16:44:01 host sshd[24803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.104.78 user=root Dec 25 16:44:01 host sshd[24803]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 16:44:02 host sshd[24803]: Failed password for invalid user root from 68.183.104.78 port 40554 ssh2 Dec 25 16:44:03 host sshd[24803]: Received disconnect from 68.183.104.78 port 40554:11: Bye Bye [preauth] Dec 25 16:44:03 host sshd[24803]: Disconnected from 68.183.104.78 port 40554 [preauth] Dec 25 16:45:45 host sshd[25148]: Invalid user a from 41.197.31.178 port 42482 Dec 25 16:45:45 host sshd[25148]: input_userauth_request: invalid user a [preauth] Dec 25 16:45:45 host sshd[25148]: pam_unix(sshd:auth): check pass; user unknown Dec 25 16:45:45 host sshd[25148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 25 16:45:47 host sshd[25148]: Failed password for invalid user a from 41.197.31.178 port 42482 ssh2 Dec 25 16:45:47 host sshd[25148]: Connection closed by 41.197.31.178 port 42482 [preauth] Dec 25 16:46:09 host sshd[25215]: User root from 202.29.220.126 not allowed because not listed in AllowUsers Dec 25 16:46:09 host sshd[25215]: input_userauth_request: invalid user root [preauth] Dec 25 16:46:09 host unix_chkpwd[25220]: password check failed for user (root) Dec 25 16:46:09 host sshd[25215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.29.220.126 user=root Dec 25 16:46:09 host sshd[25215]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 16:46:11 host sshd[25215]: Failed password for invalid user root from 202.29.220.126 port 4846 ssh2 Dec 25 16:46:11 host sshd[25215]: Received disconnect from 202.29.220.126 port 4846:11: Bye Bye [preauth] Dec 25 16:46:11 host sshd[25215]: Disconnected from 202.29.220.126 port 4846 [preauth] Dec 25 16:46:14 host sshd[25264]: User root from 137.184.120.104 not allowed because not listed in AllowUsers Dec 25 16:46:14 host sshd[25264]: input_userauth_request: invalid user root [preauth] Dec 25 16:46:14 host unix_chkpwd[25267]: password check failed for user (root) Dec 25 16:46:14 host sshd[25264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.120.104 user=root Dec 25 16:46:14 host sshd[25264]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 16:46:16 host sshd[25264]: Failed password for invalid user root from 137.184.120.104 port 53532 ssh2 Dec 25 16:46:55 host sshd[25368]: User root from 68.183.104.78 not allowed because not listed in AllowUsers Dec 25 16:46:55 host sshd[25368]: input_userauth_request: invalid user root [preauth] Dec 25 16:46:55 host unix_chkpwd[25371]: password check failed for user (root) Dec 25 16:46:55 host sshd[25368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.104.78 user=root Dec 25 16:46:55 host sshd[25368]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 16:46:58 host sshd[25368]: Failed password for invalid user root from 68.183.104.78 port 53578 ssh2 Dec 25 16:51:46 host sshd[26154]: Invalid user bbnc from 84.110.99.202 port 54588 Dec 25 16:51:46 host sshd[26154]: input_userauth_request: invalid user bbnc [preauth] Dec 25 16:51:46 host sshd[26154]: pam_unix(sshd:auth): check pass; user unknown Dec 25 16:51:46 host sshd[26154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.110.99.202 Dec 25 16:51:48 host sshd[26154]: Failed password for invalid user bbnc from 84.110.99.202 port 54588 ssh2 Dec 25 16:51:48 host sshd[26154]: Connection closed by 84.110.99.202 port 54588 [preauth] Dec 25 17:02:57 host sshd[27754]: User root from 92.46.108.20 not allowed because not listed in AllowUsers Dec 25 17:02:57 host sshd[27754]: input_userauth_request: invalid user root [preauth] Dec 25 17:02:58 host unix_chkpwd[27757]: password check failed for user (root) Dec 25 17:02:58 host sshd[27754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 user=root Dec 25 17:02:58 host sshd[27754]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 17:03:00 host sshd[27754]: Failed password for invalid user root from 92.46.108.20 port 37424 ssh2 Dec 25 17:03:00 host sshd[27754]: Connection closed by 92.46.108.20 port 37424 [preauth] Dec 25 17:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 17:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 17:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 17:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 17:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 17:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 17:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 17:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 17:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 17:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 25 17:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 17:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 17:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 25 17:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 17:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 17:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 25 17:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 17:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 17:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 25 17:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 17:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 17:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 25 17:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 17:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 17:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 25 17:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 17:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 17:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 25 17:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 17:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 17:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 25 17:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 17:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 17:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 17:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 17:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 17:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 25 17:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 17:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 17:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwletsstalkfood user-2=straightcurve user-3=bonifacegroup user-4=wwwevmhonda user-5=mrsclean user-6=wwwnexidigital user-7=palco123 user-8=gifterman user-9=phmetals user-10=kottayamcalldriv user-11=woodpeck user-12=wwwkapin user-13=disposeat user-14=wwwkmaorg user-15=remysagr user-16=pmcresources user-17=vfmassets user-18=shalinijames user-19=wwwtestugo user-20=wwwpmcresource user-21=keralaholi user-22=wwwresourcehunte user-23=wwwrmswll user-24=ugotscom user-25=travelboniface user-26=cochintaxi user-27=wwwkaretakers user-28=laundryboniface user-29=a2zgroup user-30=dartsimp feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 25 17:21:46 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 25 17:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 17:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 17:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 17:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 17:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 17:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-8KNY78kMDk5PHhse.~ Dec 25 17:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 17:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 17:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-8KNY78kMDk5PHhse.~' Dec 25 17:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 17:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 17:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-8KNY78kMDk5PHhse.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 17:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 17:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 17:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 25 17:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 17:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 25 17:21:47 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 17:21:47 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 17:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 17:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 17:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 17:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 17:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 17:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 17:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 25 17:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 17:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 17:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 25 17:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 25 17:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 25 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 25 17:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 25 17:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 25 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 25 17:21:51 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 25 17:21:53 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 25 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 25 17:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 17:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 25 17:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 17:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 25 17:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 17:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 17:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 25 17:21:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 17:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 25 17:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 17:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 17:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 25 17:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 25 17:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 25 17:35:08 host sshd[32701]: User root from 119.167.219.132 not allowed because not listed in AllowUsers Dec 25 17:35:08 host sshd[32701]: input_userauth_request: invalid user root [preauth] Dec 25 17:35:08 host unix_chkpwd[32705]: password check failed for user (root) Dec 25 17:35:08 host sshd[32701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.167.219.132 user=root Dec 25 17:35:08 host sshd[32701]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 17:35:10 host sshd[32701]: Failed password for invalid user root from 119.167.219.132 port 48144 ssh2 Dec 25 17:35:10 host sshd[32701]: Received disconnect from 119.167.219.132 port 48144:11: Bye Bye [preauth] Dec 25 17:35:10 host sshd[32701]: Disconnected from 119.167.219.132 port 48144 [preauth] Dec 25 17:35:12 host sshd[32708]: User root from 128.199.1.140 not allowed because not listed in AllowUsers Dec 25 17:35:12 host sshd[32708]: input_userauth_request: invalid user root [preauth] Dec 25 17:35:12 host unix_chkpwd[32713]: password check failed for user (root) Dec 25 17:35:12 host sshd[32708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.1.140 user=root Dec 25 17:35:12 host sshd[32708]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 17:35:14 host sshd[32708]: Failed password for invalid user root from 128.199.1.140 port 47018 ssh2 Dec 25 17:35:14 host sshd[32708]: Received disconnect from 128.199.1.140 port 47018:11: Bye Bye [preauth] Dec 25 17:35:14 host sshd[32708]: Disconnected from 128.199.1.140 port 47018 [preauth] Dec 25 17:35:27 host sshd[32753]: User root from 110.138.151.170 not allowed because not listed in AllowUsers Dec 25 17:35:27 host sshd[32753]: input_userauth_request: invalid user root [preauth] Dec 25 17:35:27 host unix_chkpwd[32755]: password check failed for user (root) Dec 25 17:35:27 host sshd[32753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.138.151.170 user=root Dec 25 17:35:27 host sshd[32753]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 17:35:29 host sshd[32753]: Failed password for invalid user root from 110.138.151.170 port 49562 ssh2 Dec 25 17:35:29 host sshd[32753]: Received disconnect from 110.138.151.170 port 49562:11: Bye Bye [preauth] Dec 25 17:35:29 host sshd[32753]: Disconnected from 110.138.151.170 port 49562 [preauth] Dec 25 17:36:24 host sshd[416]: User root from 159.65.147.235 not allowed because not listed in AllowUsers Dec 25 17:36:24 host sshd[416]: input_userauth_request: invalid user root [preauth] Dec 25 17:36:24 host unix_chkpwd[418]: password check failed for user (root) Dec 25 17:36:24 host sshd[416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.147.235 user=root Dec 25 17:36:24 host sshd[416]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 17:36:26 host sshd[416]: Failed password for invalid user root from 159.65.147.235 port 55948 ssh2 Dec 25 17:36:26 host sshd[416]: Received disconnect from 159.65.147.235 port 55948:11: Bye Bye [preauth] Dec 25 17:36:26 host sshd[416]: Disconnected from 159.65.147.235 port 55948 [preauth] Dec 25 17:37:07 host sshd[491]: Invalid user pubsftp from 162.218.126.136 port 37428 Dec 25 17:37:07 host sshd[491]: input_userauth_request: invalid user pubsftp [preauth] Dec 25 17:37:07 host sshd[491]: pam_unix(sshd:auth): check pass; user unknown Dec 25 17:37:07 host sshd[491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 25 17:37:09 host sshd[491]: Failed password for invalid user pubsftp from 162.218.126.136 port 37428 ssh2 Dec 25 17:37:09 host sshd[491]: Connection closed by 162.218.126.136 port 37428 [preauth] Dec 25 17:37:11 host sshd[497]: User root from 186.249.41.182 not allowed because not listed in AllowUsers Dec 25 17:37:11 host sshd[497]: input_userauth_request: invalid user root [preauth] Dec 25 17:37:11 host unix_chkpwd[501]: password check failed for user (root) Dec 25 17:37:11 host sshd[497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.249.41.182 user=root Dec 25 17:37:11 host sshd[497]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 17:37:13 host sshd[497]: Failed password for invalid user root from 186.249.41.182 port 43998 ssh2 Dec 25 17:37:13 host sshd[497]: Received disconnect from 186.249.41.182 port 43998:11: Bye Bye [preauth] Dec 25 17:37:13 host sshd[497]: Disconnected from 186.249.41.182 port 43998 [preauth] Dec 25 17:37:54 host sshd[697]: User root from 207.178.145.171 not allowed because not listed in AllowUsers Dec 25 17:37:54 host sshd[697]: input_userauth_request: invalid user root [preauth] Dec 25 17:37:54 host unix_chkpwd[702]: password check failed for user (root) Dec 25 17:37:54 host sshd[697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.178.145.171 user=root Dec 25 17:37:54 host sshd[697]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 17:37:56 host sshd[697]: Failed password for invalid user root from 207.178.145.171 port 46975 ssh2 Dec 25 17:37:56 host sshd[697]: Received disconnect from 207.178.145.171 port 46975:11: Bye Bye [preauth] Dec 25 17:37:56 host sshd[697]: Disconnected from 207.178.145.171 port 46975 [preauth] Dec 25 17:38:08 host sshd[737]: User root from 103.120.82.30 not allowed because not listed in AllowUsers Dec 25 17:38:08 host sshd[737]: input_userauth_request: invalid user root [preauth] Dec 25 17:38:08 host unix_chkpwd[742]: password check failed for user (root) Dec 25 17:38:08 host sshd[737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.120.82.30 user=root Dec 25 17:38:08 host sshd[737]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 17:38:08 host sshd[740]: User root from 119.17.252.197 not allowed because not listed in AllowUsers Dec 25 17:38:08 host sshd[740]: input_userauth_request: invalid user root [preauth] Dec 25 17:38:08 host unix_chkpwd[743]: password check failed for user (root) Dec 25 17:38:08 host sshd[740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.17.252.197 user=root Dec 25 17:38:08 host sshd[740]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 17:38:10 host sshd[737]: Failed password for invalid user root from 103.120.82.30 port 48700 ssh2 Dec 25 17:38:10 host sshd[737]: Received disconnect from 103.120.82.30 port 48700:11: Bye Bye [preauth] Dec 25 17:38:10 host sshd[737]: Disconnected from 103.120.82.30 port 48700 [preauth] Dec 25 17:38:10 host sshd[740]: Failed password for invalid user root from 119.17.252.197 port 45186 ssh2 Dec 25 17:38:11 host sshd[740]: Received disconnect from 119.17.252.197 port 45186:11: Bye Bye [preauth] Dec 25 17:38:11 host sshd[740]: Disconnected from 119.17.252.197 port 45186 [preauth] Dec 25 17:38:43 host sshd[807]: User root from 192.241.156.50 not allowed because not listed in AllowUsers Dec 25 17:38:43 host sshd[807]: input_userauth_request: invalid user root [preauth] Dec 25 17:38:43 host unix_chkpwd[815]: password check failed for user (root) Dec 25 17:38:43 host sshd[807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.156.50 user=root Dec 25 17:38:43 host sshd[807]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 17:38:45 host sshd[807]: Failed password for invalid user root from 192.241.156.50 port 40200 ssh2 Dec 25 17:38:45 host sshd[807]: Received disconnect from 192.241.156.50 port 40200:11: Bye Bye [preauth] Dec 25 17:38:45 host sshd[807]: Disconnected from 192.241.156.50 port 40200 [preauth] Dec 25 17:39:56 host sshd[951]: User root from 128.199.1.140 not allowed because not listed in AllowUsers Dec 25 17:39:56 host sshd[951]: input_userauth_request: invalid user root [preauth] Dec 25 17:39:57 host unix_chkpwd[954]: password check failed for user (root) Dec 25 17:39:57 host sshd[951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.1.140 user=root Dec 25 17:39:57 host sshd[951]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 17:39:58 host sshd[951]: Failed password for invalid user root from 128.199.1.140 port 44288 ssh2 Dec 25 17:40:16 host sshd[1027]: User root from 192.241.156.50 not allowed because not listed in AllowUsers Dec 25 17:40:16 host sshd[1027]: input_userauth_request: invalid user root [preauth] Dec 25 17:40:16 host unix_chkpwd[1031]: password check failed for user (root) Dec 25 17:40:16 host sshd[1027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.156.50 user=root Dec 25 17:40:16 host sshd[1027]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 17:40:18 host sshd[1027]: Failed password for invalid user root from 192.241.156.50 port 43440 ssh2 Dec 25 17:40:20 host sshd[1069]: User root from 159.65.147.235 not allowed because not listed in AllowUsers Dec 25 17:40:20 host sshd[1069]: input_userauth_request: invalid user root [preauth] Dec 25 17:40:20 host unix_chkpwd[1072]: password check failed for user (root) Dec 25 17:40:20 host sshd[1069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.147.235 user=root Dec 25 17:40:20 host sshd[1069]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 17:40:22 host sshd[1069]: Failed password for invalid user root from 159.65.147.235 port 44708 ssh2 Dec 25 17:40:22 host sshd[1069]: Received disconnect from 159.65.147.235 port 44708:11: Bye Bye [preauth] Dec 25 17:40:22 host sshd[1069]: Disconnected from 159.65.147.235 port 44708 [preauth] Dec 25 17:40:50 host sshd[1172]: User root from 186.249.41.182 not allowed because not listed in AllowUsers Dec 25 17:40:50 host sshd[1172]: input_userauth_request: invalid user root [preauth] Dec 25 17:40:50 host unix_chkpwd[1175]: password check failed for user (root) Dec 25 17:40:50 host sshd[1172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.249.41.182 user=root Dec 25 17:40:50 host sshd[1172]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 17:40:52 host sshd[1172]: Failed password for invalid user root from 186.249.41.182 port 44630 ssh2 Dec 25 17:40:52 host sshd[1172]: Received disconnect from 186.249.41.182 port 44630:11: Bye Bye [preauth] Dec 25 17:40:52 host sshd[1172]: Disconnected from 186.249.41.182 port 44630 [preauth] Dec 25 17:41:17 host sshd[1253]: User root from 103.120.82.30 not allowed because not listed in AllowUsers Dec 25 17:41:17 host sshd[1253]: input_userauth_request: invalid user root [preauth] Dec 25 17:41:17 host unix_chkpwd[1258]: password check failed for user (root) Dec 25 17:41:17 host sshd[1253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.120.82.30 user=root Dec 25 17:41:17 host sshd[1253]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 17:41:18 host sshd[1256]: User root from 110.138.151.170 not allowed because not listed in AllowUsers Dec 25 17:41:18 host sshd[1256]: input_userauth_request: invalid user root [preauth] Dec 25 17:41:18 host unix_chkpwd[1259]: password check failed for user (root) Dec 25 17:41:18 host sshd[1256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.138.151.170 user=root Dec 25 17:41:18 host sshd[1256]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 17:41:19 host sshd[1253]: Failed password for invalid user root from 103.120.82.30 port 45590 ssh2 Dec 25 17:41:19 host sshd[1253]: Received disconnect from 103.120.82.30 port 45590:11: Bye Bye [preauth] Dec 25 17:41:19 host sshd[1253]: Disconnected from 103.120.82.30 port 45590 [preauth] Dec 25 17:41:20 host sshd[1256]: Failed password for invalid user root from 110.138.151.170 port 46346 ssh2 Dec 25 17:41:20 host sshd[1256]: Received disconnect from 110.138.151.170 port 46346:11: Bye Bye [preauth] Dec 25 17:41:20 host sshd[1256]: Disconnected from 110.138.151.170 port 46346 [preauth] Dec 25 17:41:21 host sshd[1263]: User root from 119.17.252.197 not allowed because not listed in AllowUsers Dec 25 17:41:21 host sshd[1263]: input_userauth_request: invalid user root [preauth] Dec 25 17:41:21 host unix_chkpwd[1265]: password check failed for user (root) Dec 25 17:41:21 host sshd[1263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.17.252.197 user=root Dec 25 17:41:21 host sshd[1263]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 17:41:23 host sshd[1263]: Failed password for invalid user root from 119.17.252.197 port 42642 ssh2 Dec 25 17:43:12 host sshd[1571]: User root from 103.13.40.2 not allowed because not listed in AllowUsers Dec 25 17:43:12 host sshd[1571]: input_userauth_request: invalid user root [preauth] Dec 25 17:43:12 host unix_chkpwd[1573]: password check failed for user (root) Dec 25 17:43:12 host sshd[1571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 user=root Dec 25 17:43:12 host sshd[1571]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 17:43:15 host sshd[1571]: Failed password for invalid user root from 103.13.40.2 port 52278 ssh2 Dec 25 17:43:15 host sshd[1571]: Connection closed by 103.13.40.2 port 52278 [preauth] Dec 25 17:47:59 host sshd[2286]: Invalid user mazheng from 106.10.122.53 port 50656 Dec 25 17:47:59 host sshd[2286]: input_userauth_request: invalid user mazheng [preauth] Dec 25 17:48:00 host sshd[2286]: pam_unix(sshd:auth): check pass; user unknown Dec 25 17:48:00 host sshd[2286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 25 17:48:02 host sshd[2286]: Failed password for invalid user mazheng from 106.10.122.53 port 50656 ssh2 Dec 25 17:48:02 host sshd[2286]: Connection closed by 106.10.122.53 port 50656 [preauth] Dec 25 17:48:51 host sshd[2397]: User root from 119.167.219.132 not allowed because not listed in AllowUsers Dec 25 17:48:51 host sshd[2397]: input_userauth_request: invalid user root [preauth] Dec 25 17:48:51 host unix_chkpwd[2400]: password check failed for user (root) Dec 25 17:48:51 host sshd[2397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.167.219.132 user=root Dec 25 17:48:51 host sshd[2397]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 17:48:52 host sshd[2397]: Failed password for invalid user root from 119.167.219.132 port 47728 ssh2 Dec 25 17:48:53 host sshd[2397]: Received disconnect from 119.167.219.132 port 47728:11: Bye Bye [preauth] Dec 25 17:48:53 host sshd[2397]: Disconnected from 119.167.219.132 port 47728 [preauth] Dec 25 18:08:32 host sshd[5205]: Connection closed by 172.104.11.34 port 7090 [preauth] Dec 25 18:08:34 host sshd[5210]: Connection closed by 172.104.11.34 port 7106 [preauth] Dec 25 18:08:36 host sshd[5213]: Connection closed by 172.104.11.34 port 7116 [preauth] Dec 25 18:08:56 host sshd[5248]: User root from 182.73.147.154 not allowed because not listed in AllowUsers Dec 25 18:08:56 host sshd[5248]: input_userauth_request: invalid user root [preauth] Dec 25 18:08:56 host unix_chkpwd[5251]: password check failed for user (root) Dec 25 18:08:56 host sshd[5248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.73.147.154 user=root Dec 25 18:08:56 host sshd[5248]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 18:08:59 host sshd[5248]: Failed password for invalid user root from 182.73.147.154 port 36474 ssh2 Dec 25 18:08:59 host sshd[5248]: Received disconnect from 182.73.147.154 port 36474:11: Bye Bye [preauth] Dec 25 18:08:59 host sshd[5248]: Disconnected from 182.73.147.154 port 36474 [preauth] Dec 25 18:09:10 host sshd[5286]: User root from 14.97.93.66 not allowed because not listed in AllowUsers Dec 25 18:09:10 host sshd[5286]: input_userauth_request: invalid user root [preauth] Dec 25 18:09:10 host unix_chkpwd[5289]: password check failed for user (root) Dec 25 18:09:10 host sshd[5286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.97.93.66 user=root Dec 25 18:09:10 host sshd[5286]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 18:09:11 host sshd[5286]: Failed password for invalid user root from 14.97.93.66 port 40294 ssh2 Dec 25 18:09:11 host sshd[5286]: Received disconnect from 14.97.93.66 port 40294:11: Bye Bye [preauth] Dec 25 18:09:11 host sshd[5286]: Disconnected from 14.97.93.66 port 40294 [preauth] Dec 25 18:09:38 host sshd[5342]: User root from 87.197.152.170 not allowed because not listed in AllowUsers Dec 25 18:09:38 host sshd[5342]: input_userauth_request: invalid user root [preauth] Dec 25 18:09:38 host unix_chkpwd[5345]: password check failed for user (root) Dec 25 18:09:38 host sshd[5342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.197.152.170 user=root Dec 25 18:09:38 host sshd[5342]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 18:09:41 host sshd[5342]: Failed password for invalid user root from 87.197.152.170 port 56502 ssh2 Dec 25 18:09:41 host sshd[5342]: Received disconnect from 87.197.152.170 port 56502:11: Bye Bye [preauth] Dec 25 18:09:41 host sshd[5342]: Disconnected from 87.197.152.170 port 56502 [preauth] Dec 25 18:10:01 host sshd[5468]: User root from 157.245.91.72 not allowed because not listed in AllowUsers Dec 25 18:10:01 host sshd[5468]: input_userauth_request: invalid user root [preauth] Dec 25 18:10:01 host unix_chkpwd[5477]: password check failed for user (root) Dec 25 18:10:01 host sshd[5468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.91.72 user=root Dec 25 18:10:01 host sshd[5468]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 18:10:03 host sshd[5468]: Failed password for invalid user root from 157.245.91.72 port 41484 ssh2 Dec 25 18:10:04 host sshd[5468]: Received disconnect from 157.245.91.72 port 41484:11: Bye Bye [preauth] Dec 25 18:10:04 host sshd[5468]: Disconnected from 157.245.91.72 port 41484 [preauth] Dec 25 18:11:32 host sshd[5703]: Did not receive identification string from 103.195.236.159 port 42242 Dec 25 18:11:33 host sshd[5728]: User centos from 103.195.236.159 not allowed because not listed in AllowUsers Dec 25 18:11:33 host sshd[5728]: input_userauth_request: invalid user centos [preauth] Dec 25 18:11:33 host sshd[5706]: Invalid user ubuntu from 103.195.236.159 port 46884 Dec 25 18:11:33 host sshd[5706]: input_userauth_request: invalid user ubuntu [preauth] Dec 25 18:11:34 host sshd[5717]: Invalid user steam from 103.195.236.159 port 46906 Dec 25 18:11:34 host sshd[5708]: Invalid user postgres from 103.195.236.159 port 46882 Dec 25 18:11:34 host sshd[5717]: input_userauth_request: invalid user steam [preauth] Dec 25 18:11:34 host sshd[5708]: input_userauth_request: invalid user postgres [preauth] Dec 25 18:11:34 host sshd[5726]: Invalid user zjw from 103.195.236.159 port 46854 Dec 25 18:11:34 host sshd[5712]: Invalid user steam from 103.195.236.159 port 46868 Dec 25 18:11:34 host sshd[5712]: input_userauth_request: invalid user steam [preauth] Dec 25 18:11:34 host sshd[5726]: input_userauth_request: invalid user zjw [preauth] Dec 25 18:11:34 host sshd[5704]: Invalid user ubuntu from 103.195.236.159 port 46840 Dec 25 18:11:34 host sshd[5724]: Invalid user mc from 103.195.236.159 port 46862 Dec 25 18:11:34 host sshd[5710]: Invalid user es from 103.195.236.159 port 46886 Dec 25 18:11:34 host sshd[5716]: Invalid user ftpuser from 103.195.236.159 port 46888 Dec 25 18:11:34 host sshd[5724]: input_userauth_request: invalid user mc [preauth] Dec 25 18:11:34 host sshd[5704]: input_userauth_request: invalid user ubuntu [preauth] Dec 25 18:11:34 host sshd[5716]: input_userauth_request: invalid user ftpuser [preauth] Dec 25 18:11:34 host sshd[5719]: Invalid user ftpuser from 103.195.236.159 port 46914 Dec 25 18:11:34 host sshd[5719]: input_userauth_request: invalid user ftpuser [preauth] Dec 25 18:11:34 host sshd[5730]: User centos from 103.195.236.159 not allowed because not listed in AllowUsers Dec 25 18:11:34 host sshd[5710]: input_userauth_request: invalid user es [preauth] Dec 25 18:11:34 host sshd[5725]: User centos from 103.195.236.159 not allowed because not listed in AllowUsers Dec 25 18:11:34 host sshd[5720]: Invalid user es from 103.195.236.159 port 46858 Dec 25 18:11:34 host sshd[5709]: Invalid user dockeradmin from 103.195.236.159 port 46894 Dec 25 18:11:34 host sshd[5709]: input_userauth_request: invalid user dockeradmin [preauth] Dec 25 18:11:34 host sshd[5720]: input_userauth_request: invalid user es [preauth] Dec 25 18:11:34 host sshd[5707]: Invalid user dockeradmin from 103.195.236.159 port 46890 Dec 25 18:11:34 host sshd[5707]: input_userauth_request: invalid user dockeradmin [preauth] Dec 25 18:11:34 host sshd[5725]: input_userauth_request: invalid user centos [preauth] Dec 25 18:11:34 host sshd[5730]: input_userauth_request: invalid user centos [preauth] Dec 25 18:11:34 host sshd[5714]: Invalid user jenkins from 103.195.236.159 port 46908 Dec 25 18:11:34 host sshd[5723]: Invalid user user from 103.195.236.159 port 46900 Dec 25 18:11:34 host sshd[5729]: Invalid user git from 103.195.236.159 port 46842 Dec 25 18:11:34 host sshd[5718]: Invalid user user from 103.195.236.159 port 46856 Dec 25 18:11:34 host sshd[5714]: input_userauth_request: invalid user jenkins [preauth] Dec 25 18:11:34 host sshd[5723]: input_userauth_request: invalid user user [preauth] Dec 25 18:11:34 host sshd[5721]: Invalid user test from 103.195.236.159 port 46846 Dec 25 18:11:34 host sshd[5718]: input_userauth_request: invalid user user [preauth] Dec 25 18:11:34 host sshd[5729]: input_userauth_request: invalid user git [preauth] Dec 25 18:11:34 host sshd[5721]: input_userauth_request: invalid user test [preauth] Dec 25 18:11:34 host sshd[5705]: Invalid user test from 103.195.236.159 port 46756 Dec 25 18:11:34 host sshd[5713]: Invalid user mcserver from 103.195.236.159 port 46910 Dec 25 18:11:34 host sshd[5705]: input_userauth_request: invalid user test [preauth] Dec 25 18:11:34 host sshd[5713]: input_userauth_request: invalid user mcserver [preauth] Dec 25 18:11:34 host sshd[5711]: Invalid user www from 103.195.236.159 port 46860 Dec 25 18:11:34 host sshd[5715]: User centos from 103.195.236.159 not allowed because not listed in AllowUsers Dec 25 18:11:34 host sshd[5711]: input_userauth_request: invalid user www [preauth] Dec 25 18:11:34 host sshd[5715]: input_userauth_request: invalid user centos [preauth] Dec 25 18:11:34 host sshd[5706]: pam_unix(sshd:auth): check pass; user unknown Dec 25 18:11:34 host sshd[5706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159 Dec 25 18:11:34 host unix_chkpwd[5759]: password check failed for user (centos) Dec 25 18:11:34 host sshd[5728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159 user=centos Dec 25 18:11:34 host sshd[5717]: pam_unix(sshd:auth): check pass; user unknown Dec 25 18:11:34 host sshd[5717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159 Dec 25 18:11:34 host sshd[5708]: pam_unix(sshd:auth): check pass; user unknown Dec 25 18:11:34 host sshd[5708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159 Dec 25 18:11:34 host sshd[5707]: pam_unix(sshd:auth): check pass; user unknown Dec 25 18:11:34 host sshd[5707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159 Dec 25 18:11:34 host sshd[5719]: pam_unix(sshd:auth): check pass; user unknown Dec 25 18:11:34 host sshd[5719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159 Dec 25 18:11:34 host sshd[5709]: pam_unix(sshd:auth): check pass; user unknown Dec 25 18:11:34 host sshd[5709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159 Dec 25 18:11:34 host sshd[5716]: pam_unix(sshd:auth): check pass; user unknown Dec 25 18:11:34 host sshd[5716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159 Dec 25 18:11:34 host sshd[5712]: pam_unix(sshd:auth): check pass; user unknown Dec 25 18:11:34 host sshd[5712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159 Dec 25 18:11:34 host sshd[5710]: pam_unix(sshd:auth): check pass; user unknown Dec 25 18:11:34 host sshd[5710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159 Dec 25 18:11:34 host sshd[5704]: pam_unix(sshd:auth): check pass; user unknown Dec 25 18:11:34 host sshd[5704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159 Dec 25 18:11:34 host sshd[5713]: pam_unix(sshd:auth): check pass; user unknown Dec 25 18:11:34 host sshd[5713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159 Dec 25 18:11:34 host sshd[5724]: pam_unix(sshd:auth): check pass; user unknown Dec 25 18:11:34 host sshd[5724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159 Dec 25 18:11:34 host sshd[5720]: pam_unix(sshd:auth): check pass; user unknown Dec 25 18:11:34 host sshd[5720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159 Dec 25 18:11:34 host sshd[5705]: pam_unix(sshd:auth): check pass; user unknown Dec 25 18:11:34 host sshd[5705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159 Dec 25 18:11:34 host sshd[5714]: pam_unix(sshd:auth): check pass; user unknown Dec 25 18:11:34 host sshd[5729]: pam_unix(sshd:auth): check pass; user unknown Dec 25 18:11:34 host sshd[5714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159 Dec 25 18:11:34 host sshd[5721]: pam_unix(sshd:auth): check pass; user unknown Dec 25 18:11:34 host sshd[5729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159 Dec 25 18:11:34 host sshd[5721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159 Dec 25 18:11:34 host sshd[5726]: pam_unix(sshd:auth): check pass; user unknown Dec 25 18:11:34 host sshd[5726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159 Dec 25 18:11:34 host sshd[5718]: pam_unix(sshd:auth): check pass; user unknown Dec 25 18:11:34 host sshd[5718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159 Dec 25 18:11:34 host sshd[5723]: pam_unix(sshd:auth): check pass; user unknown Dec 25 18:11:34 host sshd[5723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159 Dec 25 18:11:34 host unix_chkpwd[5761]: password check failed for user (centos) Dec 25 18:11:34 host unix_chkpwd[5760]: password check failed for user (centos) Dec 25 18:11:34 host sshd[5730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159 user=centos Dec 25 18:11:34 host sshd[5725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159 user=centos Dec 25 18:11:34 host sshd[5711]: pam_unix(sshd:auth): check pass; user unknown Dec 25 18:11:34 host sshd[5711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159 Dec 25 18:11:34 host sshd[5727]: Invalid user guest from 103.195.236.159 port 46916 Dec 25 18:11:34 host sshd[5727]: input_userauth_request: invalid user guest [preauth] Dec 25 18:11:34 host unix_chkpwd[5763]: password check failed for user (centos) Dec 25 18:11:34 host sshd[5715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159 user=centos Dec 25 18:11:34 host sshd[5722]: User centos from 103.195.236.159 not allowed because not listed in AllowUsers Dec 25 18:11:34 host sshd[5722]: input_userauth_request: invalid user centos [preauth] Dec 25 18:11:34 host sshd[5727]: pam_unix(sshd:auth): check pass; user unknown Dec 25 18:11:34 host sshd[5727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159 Dec 25 18:11:34 host unix_chkpwd[5765]: password check failed for user (centos) Dec 25 18:11:34 host sshd[5722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.195.236.159 user=centos Dec 25 18:11:36 host sshd[5706]: Failed password for invalid user ubuntu from 103.195.236.159 port 46884 ssh2 Dec 25 18:11:36 host sshd[5728]: Failed password for invalid user centos from 103.195.236.159 port 46852 ssh2 Dec 25 18:11:36 host sshd[5717]: Failed password for invalid user steam from 103.195.236.159 port 46906 ssh2 Dec 25 18:11:36 host sshd[5708]: Failed password for invalid user postgres from 103.195.236.159 port 46882 ssh2 Dec 25 18:11:36 host sshd[5710]: Failed password for invalid user es from 103.195.236.159 port 46886 ssh2 Dec 25 18:11:36 host sshd[5707]: Failed password for invalid user dockeradmin from 103.195.236.159 port 46890 ssh2 Dec 25 18:11:36 host sshd[5719]: Failed password for invalid user ftpuser from 103.195.236.159 port 46914 ssh2 Dec 25 18:11:36 host sshd[5716]: Failed password for invalid user ftpuser from 103.195.236.159 port 46888 ssh2 Dec 25 18:11:36 host sshd[5712]: Failed password for invalid user steam from 103.195.236.159 port 46868 ssh2 Dec 25 18:11:36 host sshd[5713]: Failed password for invalid user mcserver from 103.195.236.159 port 46910 ssh2 Dec 25 18:11:36 host sshd[5704]: Failed password for invalid user ubuntu from 103.195.236.159 port 46840 ssh2 Dec 25 18:11:36 host sshd[5709]: Failed password for invalid user dockeradmin from 103.195.236.159 port 46894 ssh2 Dec 25 18:11:36 host sshd[5724]: Failed password for invalid user mc from 103.195.236.159 port 46862 ssh2 Dec 25 18:11:36 host sshd[5720]: Failed password for invalid user es from 103.195.236.159 port 46858 ssh2 Dec 25 18:11:36 host sshd[5705]: Failed password for invalid user test from 103.195.236.159 port 46756 ssh2 Dec 25 18:11:36 host sshd[5729]: Failed password for invalid user git from 103.195.236.159 port 46842 ssh2 Dec 25 18:11:36 host sshd[5714]: Failed password for invalid user jenkins from 103.195.236.159 port 46908 ssh2 Dec 25 18:11:36 host sshd[5726]: Failed password for invalid user zjw from 103.195.236.159 port 46854 ssh2 Dec 25 18:11:36 host sshd[5718]: Failed password for invalid user user from 103.195.236.159 port 46856 ssh2 Dec 25 18:11:36 host sshd[5723]: Failed password for invalid user user from 103.195.236.159 port 46900 ssh2 Dec 25 18:11:36 host sshd[5721]: Failed password for invalid user test from 103.195.236.159 port 46846 ssh2 Dec 25 18:11:36 host sshd[5730]: Failed password for invalid user centos from 103.195.236.159 port 46898 ssh2 Dec 25 18:11:36 host sshd[5725]: Failed password for invalid user centos from 103.195.236.159 port 46866 ssh2 Dec 25 18:11:36 host sshd[5706]: Connection closed by 103.195.236.159 port 46884 [preauth] Dec 25 18:11:36 host sshd[5711]: Failed password for invalid user www from 103.195.236.159 port 46860 ssh2 Dec 25 18:11:36 host sshd[5728]: Connection closed by 103.195.236.159 port 46852 [preauth] Dec 25 18:11:36 host sshd[5710]: Connection closed by 103.195.236.159 port 46886 [preauth] Dec 25 18:11:36 host sshd[5708]: Connection closed by 103.195.236.159 port 46882 [preauth] Dec 25 18:11:36 host sshd[5713]: Connection closed by 103.195.236.159 port 46910 [preauth] Dec 25 18:11:36 host sshd[5714]: Connection closed by 103.195.236.159 port 46908 [preauth] Dec 25 18:11:36 host sshd[5707]: Connection closed by 103.195.236.159 port 46890 [preauth] Dec 25 18:11:36 host sshd[5712]: Connection closed by 103.195.236.159 port 46868 [preauth] Dec 25 18:11:36 host sshd[5709]: Connection closed by 103.195.236.159 port 46894 [preauth] Dec 25 18:11:36 host sshd[5705]: Connection closed by 103.195.236.159 port 46756 [preauth] Dec 25 18:11:36 host sshd[5723]: Connection closed by 103.195.236.159 port 46900 [preauth] Dec 25 18:11:36 host sshd[5724]: Connection closed by 103.195.236.159 port 46862 [preauth] Dec 25 18:11:36 host sshd[5719]: Connection closed by 103.195.236.159 port 46914 [preauth] Dec 25 18:11:36 host sshd[5715]: Failed password for invalid user centos from 103.195.236.159 port 46850 ssh2 Dec 25 18:11:36 host sshd[5726]: Connection closed by 103.195.236.159 port 46854 [preauth] Dec 25 18:11:36 host sshd[5729]: Connection closed by 103.195.236.159 port 46842 [preauth] Dec 25 18:11:36 host sshd[5716]: Connection closed by 103.195.236.159 port 46888 [preauth] Dec 25 18:11:36 host sshd[5721]: Connection closed by 103.195.236.159 port 46846 [preauth] Dec 25 18:11:36 host sshd[5720]: Connection closed by 103.195.236.159 port 46858 [preauth] Dec 25 18:11:36 host sshd[5704]: Connection closed by 103.195.236.159 port 46840 [preauth] Dec 25 18:11:36 host sshd[5717]: Connection closed by 103.195.236.159 port 46906 [preauth] Dec 25 18:11:36 host sshd[5718]: Connection closed by 103.195.236.159 port 46856 [preauth] Dec 25 18:11:36 host sshd[5725]: Connection closed by 103.195.236.159 port 46866 [preauth] Dec 25 18:11:36 host sshd[5730]: Connection closed by 103.195.236.159 port 46898 [preauth] Dec 25 18:11:36 host sshd[5711]: Connection closed by 103.195.236.159 port 46860 [preauth] Dec 25 18:11:36 host sshd[5727]: Failed password for invalid user guest from 103.195.236.159 port 46916 ssh2 Dec 25 18:11:36 host sshd[5715]: Connection closed by 103.195.236.159 port 46850 [preauth] Dec 25 18:11:36 host sshd[5722]: Failed password for invalid user centos from 103.195.236.159 port 46902 ssh2 Dec 25 18:11:36 host sshd[5727]: Connection closed by 103.195.236.159 port 46916 [preauth] Dec 25 18:11:36 host sshd[5722]: Connection closed by 103.195.236.159 port 46902 [preauth] Dec 25 18:12:03 host sshd[5849]: User root from 14.97.93.66 not allowed because not listed in AllowUsers Dec 25 18:12:03 host sshd[5849]: input_userauth_request: invalid user root [preauth] Dec 25 18:12:03 host unix_chkpwd[5851]: password check failed for user (root) Dec 25 18:12:03 host sshd[5849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.97.93.66 user=root Dec 25 18:12:03 host sshd[5849]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 18:12:04 host sshd[5849]: Failed password for invalid user root from 14.97.93.66 port 58750 ssh2 Dec 25 18:12:06 host sshd[5884]: User root from 162.243.165.205 not allowed because not listed in AllowUsers Dec 25 18:12:06 host sshd[5884]: input_userauth_request: invalid user root [preauth] Dec 25 18:12:06 host unix_chkpwd[5887]: password check failed for user (root) Dec 25 18:12:06 host sshd[5884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.165.205 user=root Dec 25 18:12:06 host sshd[5884]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 18:12:07 host sshd[5884]: Failed password for invalid user root from 162.243.165.205 port 48350 ssh2 Dec 25 18:12:08 host sshd[5884]: Received disconnect from 162.243.165.205 port 48350:11: Bye Bye [preauth] Dec 25 18:12:08 host sshd[5884]: Disconnected from 162.243.165.205 port 48350 [preauth] Dec 25 18:13:16 host sshd[6031]: User root from 157.245.91.72 not allowed because not listed in AllowUsers Dec 25 18:13:16 host sshd[6031]: input_userauth_request: invalid user root [preauth] Dec 25 18:13:16 host unix_chkpwd[6034]: password check failed for user (root) Dec 25 18:13:16 host sshd[6031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.91.72 user=root Dec 25 18:13:16 host sshd[6031]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 18:13:17 host sshd[6031]: Failed password for invalid user root from 157.245.91.72 port 56944 ssh2 Dec 25 18:13:18 host sshd[6031]: Received disconnect from 157.245.91.72 port 56944:11: Bye Bye [preauth] Dec 25 18:13:18 host sshd[6031]: Disconnected from 157.245.91.72 port 56944 [preauth] Dec 25 18:13:27 host sshd[6097]: User root from 182.73.147.154 not allowed because not listed in AllowUsers Dec 25 18:13:27 host sshd[6097]: input_userauth_request: invalid user root [preauth] Dec 25 18:13:27 host unix_chkpwd[6099]: password check failed for user (root) Dec 25 18:13:27 host sshd[6097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.73.147.154 user=root Dec 25 18:13:27 host sshd[6097]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 18:13:28 host sshd[6097]: Failed password for invalid user root from 182.73.147.154 port 56092 ssh2 Dec 25 18:13:28 host sshd[6097]: Received disconnect from 182.73.147.154 port 56092:11: Bye Bye [preauth] Dec 25 18:13:28 host sshd[6097]: Disconnected from 182.73.147.154 port 56092 [preauth] Dec 25 18:14:25 host sshd[6235]: User root from 162.243.165.205 not allowed because not listed in AllowUsers Dec 25 18:14:25 host sshd[6235]: input_userauth_request: invalid user root [preauth] Dec 25 18:14:25 host unix_chkpwd[6260]: password check failed for user (root) Dec 25 18:14:25 host sshd[6235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.165.205 user=root Dec 25 18:14:25 host sshd[6235]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 18:14:27 host sshd[6235]: Failed password for invalid user root from 162.243.165.205 port 35744 ssh2 Dec 25 18:14:27 host sshd[6235]: Received disconnect from 162.243.165.205 port 35744:11: Bye Bye [preauth] Dec 25 18:14:27 host sshd[6235]: Disconnected from 162.243.165.205 port 35744 [preauth] Dec 25 18:15:13 host sshd[6366]: Invalid user jenkins from 84.110.99.202 port 45196 Dec 25 18:15:13 host sshd[6366]: input_userauth_request: invalid user jenkins [preauth] Dec 25 18:15:14 host sshd[6366]: pam_unix(sshd:auth): check pass; user unknown Dec 25 18:15:14 host sshd[6366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.110.99.202 Dec 25 18:15:16 host sshd[6366]: Failed password for invalid user jenkins from 84.110.99.202 port 45196 ssh2 Dec 25 18:15:16 host sshd[6366]: Connection closed by 84.110.99.202 port 45196 [preauth] Dec 25 18:15:24 host sshd[6411]: User root from 87.197.152.170 not allowed because not listed in AllowUsers Dec 25 18:15:24 host sshd[6411]: input_userauth_request: invalid user root [preauth] Dec 25 18:15:24 host unix_chkpwd[6414]: password check failed for user (root) Dec 25 18:15:24 host sshd[6411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.197.152.170 user=root Dec 25 18:15:24 host sshd[6411]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 18:15:27 host sshd[6411]: Failed password for invalid user root from 87.197.152.170 port 47700 ssh2 Dec 25 18:15:27 host sshd[6411]: Received disconnect from 87.197.152.170 port 47700:11: Bye Bye [preauth] Dec 25 18:15:27 host sshd[6411]: Disconnected from 87.197.152.170 port 47700 [preauth] Dec 25 18:18:37 host sshd[6913]: Invalid user cp from 45.93.201.90 port 54868 Dec 25 18:18:37 host sshd[6913]: input_userauth_request: invalid user cp [preauth] Dec 25 18:18:37 host sshd[6913]: pam_unix(sshd:auth): check pass; user unknown Dec 25 18:18:37 host sshd[6913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 25 18:18:39 host sshd[6913]: Failed password for invalid user cp from 45.93.201.90 port 54868 ssh2 Dec 25 18:18:42 host sshd[6913]: pam_unix(sshd:auth): check pass; user unknown Dec 25 18:18:44 host sshd[6913]: Failed password for invalid user cp from 45.93.201.90 port 54868 ssh2 Dec 25 18:18:47 host sshd[6913]: pam_unix(sshd:auth): check pass; user unknown Dec 25 18:18:49 host sshd[6913]: Failed password for invalid user cp from 45.93.201.90 port 54868 ssh2 Dec 25 18:18:52 host sshd[6913]: Connection closed by 45.93.201.90 port 54868 [preauth] Dec 25 18:18:52 host sshd[6913]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 25 18:21:01 host sshd[7306]: Did not receive identification string from 219.142.104.170 port 9110 Dec 25 18:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 18:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 18:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 18:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 18:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 18:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 18:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 18:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 18:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 18:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 25 18:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 18:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 18:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 25 18:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 18:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 18:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 25 18:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 18:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 18:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 25 18:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 18:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 18:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 25 18:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 18:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 18:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 25 18:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 18:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 18:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 25 18:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 18:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 18:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 25 18:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 18:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 18:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 18:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 18:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 18:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 25 18:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 18:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 18:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=a2zgroup user-2=dartsimp user-3=laundryboniface user-4=cochintaxi user-5=wwwkaretakers user-6=travelboniface user-7=ugotscom user-8=wwwresourcehunte user-9=keralaholi user-10=wwwrmswll user-11=wwwpmcresource user-12=shalinijames user-13=wwwtestugo user-14=vfmassets user-15=pmcresources user-16=wwwkmaorg user-17=disposeat user-18=remysagr user-19=woodpeck user-20=wwwkapin user-21=phmetals user-22=kottayamcalldriv user-23=palco123 user-24=gifterman user-25=mrsclean user-26=wwwnexidigital user-27=wwwevmhonda user-28=bonifacegroup user-29=straightcurve user-30=wwwletsstalkfood feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 25 18:21:46 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 25 18:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-SZvxQWlq9nX0xa6b.~ Dec 25 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-SZvxQWlq9nX0xa6b.~' Dec 25 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-SZvxQWlq9nX0xa6b.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 25 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 25 18:21:47 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 18:21:47 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 18:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 18:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 18:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 18:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 18:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 18:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 18:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 18:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 18:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 18:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 25 18:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 18:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 25 18:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 25 18:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 25 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 25 18:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 25 18:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 25 18:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 25 18:21:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 25 18:21:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 25 18:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 25 18:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 18:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 25 18:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 18:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 18:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 25 18:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 18:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 25 18:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 18:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 18:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 25 18:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 18:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 18:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 25 18:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 25 18:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 25 18:33:17 host sshd[9189]: User root from 20.198.226.97 not allowed because not listed in AllowUsers Dec 25 18:33:17 host sshd[9189]: input_userauth_request: invalid user root [preauth] Dec 25 18:33:17 host unix_chkpwd[9191]: password check failed for user (root) Dec 25 18:33:17 host sshd[9189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.198.226.97 user=root Dec 25 18:33:17 host sshd[9189]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 18:33:19 host sshd[9189]: Failed password for invalid user root from 20.198.226.97 port 53668 ssh2 Dec 25 18:33:19 host sshd[9189]: Received disconnect from 20.198.226.97 port 53668:11: Bye Bye [preauth] Dec 25 18:33:19 host sshd[9189]: Disconnected from 20.198.226.97 port 53668 [preauth] Dec 25 18:36:44 host sshd[9780]: Invalid user zhanchongming from 41.197.31.178 port 57974 Dec 25 18:36:44 host sshd[9780]: input_userauth_request: invalid user zhanchongming [preauth] Dec 25 18:36:44 host sshd[9780]: pam_unix(sshd:auth): check pass; user unknown Dec 25 18:36:44 host sshd[9780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 25 18:36:46 host sshd[9780]: Failed password for invalid user zhanchongming from 41.197.31.178 port 57974 ssh2 Dec 25 18:36:46 host sshd[9780]: Connection closed by 41.197.31.178 port 57974 [preauth] Dec 25 18:37:14 host sshd[9866]: User root from 20.198.226.97 not allowed because not listed in AllowUsers Dec 25 18:37:14 host sshd[9866]: input_userauth_request: invalid user root [preauth] Dec 25 18:37:14 host unix_chkpwd[9868]: password check failed for user (root) Dec 25 18:37:14 host sshd[9866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.198.226.97 user=root Dec 25 18:37:14 host sshd[9866]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 18:37:15 host sshd[9866]: Failed password for invalid user root from 20.198.226.97 port 39202 ssh2 Dec 25 18:39:03 host sshd[10256]: User root from 43.157.7.187 not allowed because not listed in AllowUsers Dec 25 18:39:03 host sshd[10256]: input_userauth_request: invalid user root [preauth] Dec 25 18:39:03 host unix_chkpwd[10264]: password check failed for user (root) Dec 25 18:39:03 host sshd[10256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.7.187 user=root Dec 25 18:39:03 host sshd[10256]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 18:39:05 host sshd[10256]: Failed password for invalid user root from 43.157.7.187 port 39186 ssh2 Dec 25 18:39:05 host sshd[10256]: Received disconnect from 43.157.7.187 port 39186:11: Bye Bye [preauth] Dec 25 18:39:05 host sshd[10256]: Disconnected from 43.157.7.187 port 39186 [preauth] Dec 25 18:40:02 host sshd[10423]: User root from 147.182.233.146 not allowed because not listed in AllowUsers Dec 25 18:40:02 host sshd[10423]: input_userauth_request: invalid user root [preauth] Dec 25 18:40:02 host unix_chkpwd[10449]: password check failed for user (root) Dec 25 18:40:02 host sshd[10423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.233.146 user=root Dec 25 18:40:02 host sshd[10423]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 18:40:03 host sshd[10423]: Failed password for invalid user root from 147.182.233.146 port 44822 ssh2 Dec 25 18:40:04 host sshd[10423]: Received disconnect from 147.182.233.146 port 44822:11: Bye Bye [preauth] Dec 25 18:40:04 host sshd[10423]: Disconnected from 147.182.233.146 port 44822 [preauth] Dec 25 18:42:23 host sshd[10942]: User root from 43.157.7.187 not allowed because not listed in AllowUsers Dec 25 18:42:23 host sshd[10942]: input_userauth_request: invalid user root [preauth] Dec 25 18:42:23 host unix_chkpwd[10948]: password check failed for user (root) Dec 25 18:42:23 host sshd[10942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.7.187 user=root Dec 25 18:42:23 host sshd[10942]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 18:42:25 host sshd[10942]: Failed password for invalid user root from 43.157.7.187 port 54546 ssh2 Dec 25 18:44:12 host sshd[11302]: User root from 147.182.233.146 not allowed because not listed in AllowUsers Dec 25 18:44:12 host sshd[11302]: input_userauth_request: invalid user root [preauth] Dec 25 18:44:12 host unix_chkpwd[11307]: password check failed for user (root) Dec 25 18:44:12 host sshd[11302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.233.146 user=root Dec 25 18:44:12 host sshd[11302]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 18:44:15 host sshd[11302]: Failed password for invalid user root from 147.182.233.146 port 57612 ssh2 Dec 25 18:50:00 host sshd[12461]: User root from 102.134.140.130 not allowed because not listed in AllowUsers Dec 25 18:50:00 host sshd[12461]: input_userauth_request: invalid user root [preauth] Dec 25 18:50:00 host unix_chkpwd[12466]: password check failed for user (root) Dec 25 18:50:00 host sshd[12461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.134.140.130 user=root Dec 25 18:50:00 host sshd[12461]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 18:50:02 host sshd[12461]: Failed password for invalid user root from 102.134.140.130 port 52820 ssh2 Dec 25 18:50:03 host sshd[12461]: Received disconnect from 102.134.140.130 port 52820:11: Bye Bye [preauth] Dec 25 18:50:03 host sshd[12461]: Disconnected from 102.134.140.130 port 52820 [preauth] Dec 25 18:50:11 host sshd[12505]: User root from 82.49.131.98 not allowed because not listed in AllowUsers Dec 25 18:50:11 host sshd[12505]: input_userauth_request: invalid user root [preauth] Dec 25 18:50:11 host unix_chkpwd[12517]: password check failed for user (root) Dec 25 18:50:11 host sshd[12505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.49.131.98 user=root Dec 25 18:50:11 host sshd[12505]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 18:50:13 host sshd[12505]: Failed password for invalid user root from 82.49.131.98 port 46598 ssh2 Dec 25 18:50:13 host sshd[12505]: Received disconnect from 82.49.131.98 port 46598:11: Bye Bye [preauth] Dec 25 18:50:13 host sshd[12505]: Disconnected from 82.49.131.98 port 46598 [preauth] Dec 25 18:50:23 host sshd[12540]: Invalid user user1 from 162.218.126.136 port 54104 Dec 25 18:50:23 host sshd[12540]: input_userauth_request: invalid user user1 [preauth] Dec 25 18:50:23 host sshd[12540]: pam_unix(sshd:auth): check pass; user unknown Dec 25 18:50:23 host sshd[12540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 25 18:50:25 host sshd[12540]: Failed password for invalid user user1 from 162.218.126.136 port 54104 ssh2 Dec 25 18:50:26 host sshd[12540]: Connection closed by 162.218.126.136 port 54104 [preauth] Dec 25 18:50:37 host sshd[12591]: Invalid user ops from 92.46.108.20 port 52312 Dec 25 18:50:37 host sshd[12591]: input_userauth_request: invalid user ops [preauth] Dec 25 18:50:38 host sshd[12591]: pam_unix(sshd:auth): check pass; user unknown Dec 25 18:50:38 host sshd[12591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 25 18:50:40 host sshd[12591]: Failed password for invalid user ops from 92.46.108.20 port 52312 ssh2 Dec 25 18:50:40 host sshd[12591]: Connection closed by 92.46.108.20 port 52312 [preauth] Dec 25 18:50:44 host sshd[12613]: User root from 43.157.14.134 not allowed because not listed in AllowUsers Dec 25 18:50:44 host sshd[12613]: input_userauth_request: invalid user root [preauth] Dec 25 18:50:44 host unix_chkpwd[12618]: password check failed for user (root) Dec 25 18:50:44 host sshd[12613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.14.134 user=root Dec 25 18:50:44 host sshd[12613]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 18:50:46 host sshd[12613]: Failed password for invalid user root from 43.157.14.134 port 44946 ssh2 Dec 25 18:50:46 host sshd[12613]: Received disconnect from 43.157.14.134 port 44946:11: Bye Bye [preauth] Dec 25 18:50:46 host sshd[12613]: Disconnected from 43.157.14.134 port 44946 [preauth] Dec 25 18:51:32 host sshd[12871]: User root from 164.92.154.145 not allowed because not listed in AllowUsers Dec 25 18:51:32 host sshd[12871]: input_userauth_request: invalid user root [preauth] Dec 25 18:51:33 host unix_chkpwd[12876]: password check failed for user (root) Dec 25 18:51:33 host sshd[12871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.154.145 user=root Dec 25 18:51:33 host sshd[12871]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 18:51:34 host sshd[12871]: Failed password for invalid user root from 164.92.154.145 port 59758 ssh2 Dec 25 18:51:34 host sshd[12871]: Received disconnect from 164.92.154.145 port 59758:11: Bye Bye [preauth] Dec 25 18:51:34 host sshd[12871]: Disconnected from 164.92.154.145 port 59758 [preauth] Dec 25 18:53:02 host sshd[13104]: User root from 43.157.14.134 not allowed because not listed in AllowUsers Dec 25 18:53:02 host sshd[13104]: input_userauth_request: invalid user root [preauth] Dec 25 18:53:02 host unix_chkpwd[13117]: password check failed for user (root) Dec 25 18:53:02 host sshd[13104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.14.134 user=root Dec 25 18:53:02 host sshd[13104]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 18:53:05 host sshd[13104]: Failed password for invalid user root from 43.157.14.134 port 53104 ssh2 Dec 25 18:53:39 host sshd[13203]: User root from 164.92.154.145 not allowed because not listed in AllowUsers Dec 25 18:53:39 host sshd[13203]: input_userauth_request: invalid user root [preauth] Dec 25 18:53:39 host unix_chkpwd[13206]: password check failed for user (root) Dec 25 18:53:39 host sshd[13203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.154.145 user=root Dec 25 18:53:39 host sshd[13203]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 18:53:41 host sshd[13203]: Failed password for invalid user root from 164.92.154.145 port 33790 ssh2 Dec 25 18:54:27 host sshd[13321]: User root from 102.134.140.130 not allowed because not listed in AllowUsers Dec 25 18:54:27 host sshd[13321]: input_userauth_request: invalid user root [preauth] Dec 25 18:54:27 host unix_chkpwd[13325]: password check failed for user (root) Dec 25 18:54:27 host sshd[13321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.134.140.130 user=root Dec 25 18:54:27 host sshd[13321]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 18:54:29 host sshd[13321]: Failed password for invalid user root from 102.134.140.130 port 46008 ssh2 Dec 25 18:54:29 host sshd[13321]: Received disconnect from 102.134.140.130 port 46008:11: Bye Bye [preauth] Dec 25 18:54:29 host sshd[13321]: Disconnected from 102.134.140.130 port 46008 [preauth] Dec 25 18:55:39 host sshd[13501]: User root from 89.252.131.62 not allowed because not listed in AllowUsers Dec 25 18:55:39 host sshd[13501]: input_userauth_request: invalid user root [preauth] Dec 25 18:55:39 host unix_chkpwd[13507]: password check failed for user (root) Dec 25 18:55:39 host sshd[13501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.252.131.62 user=root Dec 25 18:55:39 host sshd[13501]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 18:55:41 host sshd[13501]: Failed password for invalid user root from 89.252.131.62 port 48556 ssh2 Dec 25 18:55:41 host sshd[13501]: Received disconnect from 89.252.131.62 port 48556:11: Bye Bye [preauth] Dec 25 18:55:41 host sshd[13501]: Disconnected from 89.252.131.62 port 48556 [preauth] Dec 25 18:58:46 host sshd[13941]: User root from 43.153.69.164 not allowed because not listed in AllowUsers Dec 25 18:58:46 host sshd[13941]: input_userauth_request: invalid user root [preauth] Dec 25 18:58:46 host unix_chkpwd[13950]: password check failed for user (root) Dec 25 18:58:46 host sshd[13941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.69.164 user=root Dec 25 18:58:46 host sshd[13941]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 18:58:48 host sshd[13941]: Failed password for invalid user root from 43.153.69.164 port 60722 ssh2 Dec 25 18:58:48 host sshd[13941]: Received disconnect from 43.153.69.164 port 60722:11: Bye Bye [preauth] Dec 25 18:58:48 host sshd[13941]: Disconnected from 43.153.69.164 port 60722 [preauth] Dec 25 18:59:09 host sshd[13980]: User root from 103.76.27.3 not allowed because not listed in AllowUsers Dec 25 18:59:09 host sshd[13980]: input_userauth_request: invalid user root [preauth] Dec 25 18:59:09 host unix_chkpwd[13983]: password check failed for user (root) Dec 25 18:59:09 host sshd[13980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.76.27.3 user=root Dec 25 18:59:09 host sshd[13980]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 18:59:11 host sshd[13980]: Failed password for invalid user root from 103.76.27.3 port 36268 ssh2 Dec 25 18:59:11 host sshd[13980]: Received disconnect from 103.76.27.3 port 36268:11: Bye Bye [preauth] Dec 25 18:59:11 host sshd[13980]: Disconnected from 103.76.27.3 port 36268 [preauth] Dec 25 19:00:54 host sshd[14205]: User root from 89.252.131.62 not allowed because not listed in AllowUsers Dec 25 19:00:54 host sshd[14205]: input_userauth_request: invalid user root [preauth] Dec 25 19:00:54 host unix_chkpwd[14208]: password check failed for user (root) Dec 25 19:00:54 host sshd[14205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.252.131.62 user=root Dec 25 19:00:54 host sshd[14205]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 19:00:56 host sshd[14205]: Failed password for invalid user root from 89.252.131.62 port 48216 ssh2 Dec 25 19:01:41 host sshd[14352]: User root from 43.153.69.164 not allowed because not listed in AllowUsers Dec 25 19:01:41 host sshd[14352]: input_userauth_request: invalid user root [preauth] Dec 25 19:01:41 host unix_chkpwd[14355]: password check failed for user (root) Dec 25 19:01:41 host sshd[14352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.69.164 user=root Dec 25 19:01:41 host sshd[14352]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 19:01:43 host sshd[14352]: Failed password for invalid user root from 43.153.69.164 port 47006 ssh2 Dec 25 19:01:43 host sshd[14352]: Received disconnect from 43.153.69.164 port 47006:11: Bye Bye [preauth] Dec 25 19:01:43 host sshd[14352]: Disconnected from 43.153.69.164 port 47006 [preauth] Dec 25 19:02:07 host sshd[14522]: User root from 83.45.142.246 not allowed because not listed in AllowUsers Dec 25 19:02:07 host sshd[14522]: input_userauth_request: invalid user root [preauth] Dec 25 19:02:07 host unix_chkpwd[14524]: password check failed for user (root) Dec 25 19:02:07 host sshd[14522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.45.142.246 user=root Dec 25 19:02:07 host sshd[14522]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 19:02:09 host sshd[14522]: Failed password for invalid user root from 83.45.142.246 port 50424 ssh2 Dec 25 19:02:09 host sshd[14522]: Received disconnect from 83.45.142.246 port 50424:11: Bye Bye [preauth] Dec 25 19:02:09 host sshd[14522]: Disconnected from 83.45.142.246 port 50424 [preauth] Dec 25 19:03:12 host sshd[14637]: User root from 103.76.27.3 not allowed because not listed in AllowUsers Dec 25 19:03:12 host sshd[14637]: input_userauth_request: invalid user root [preauth] Dec 25 19:03:12 host unix_chkpwd[14640]: password check failed for user (root) Dec 25 19:03:12 host sshd[14637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.76.27.3 user=root Dec 25 19:03:12 host sshd[14637]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 19:03:14 host sshd[14637]: Failed password for invalid user root from 103.76.27.3 port 60580 ssh2 Dec 25 19:03:14 host sshd[14637]: Received disconnect from 103.76.27.3 port 60580:11: Bye Bye [preauth] Dec 25 19:03:14 host sshd[14637]: Disconnected from 103.76.27.3 port 60580 [preauth] Dec 25 19:04:27 host sshd[14811]: User root from 83.45.142.246 not allowed because not listed in AllowUsers Dec 25 19:04:27 host sshd[14811]: input_userauth_request: invalid user root [preauth] Dec 25 19:04:27 host unix_chkpwd[14814]: password check failed for user (root) Dec 25 19:04:27 host sshd[14811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.45.142.246 user=root Dec 25 19:04:27 host sshd[14811]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 19:04:29 host sshd[14811]: Failed password for invalid user root from 83.45.142.246 port 46168 ssh2 Dec 25 19:04:29 host sshd[14811]: Received disconnect from 83.45.142.246 port 46168:11: Bye Bye [preauth] Dec 25 19:04:29 host sshd[14811]: Disconnected from 83.45.142.246 port 46168 [preauth] Dec 25 19:07:12 host sshd[15278]: User root from 82.49.131.98 not allowed because not listed in AllowUsers Dec 25 19:07:12 host sshd[15278]: input_userauth_request: invalid user root [preauth] Dec 25 19:07:12 host unix_chkpwd[15289]: password check failed for user (root) Dec 25 19:07:12 host sshd[15278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.49.131.98 user=root Dec 25 19:07:12 host sshd[15278]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 19:07:15 host sshd[15278]: Failed password for invalid user root from 82.49.131.98 port 38974 ssh2 Dec 25 19:07:15 host sshd[15278]: Received disconnect from 82.49.131.98 port 38974:11: Bye Bye [preauth] Dec 25 19:07:15 host sshd[15278]: Disconnected from 82.49.131.98 port 38974 [preauth] Dec 25 19:15:20 host sshd[16335]: Invalid user user from 103.13.40.2 port 41310 Dec 25 19:15:20 host sshd[16335]: input_userauth_request: invalid user user [preauth] Dec 25 19:15:20 host sshd[16335]: pam_unix(sshd:auth): check pass; user unknown Dec 25 19:15:20 host sshd[16335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 25 19:15:21 host sshd[16335]: Failed password for invalid user user from 103.13.40.2 port 41310 ssh2 Dec 25 19:15:21 host sshd[16335]: Connection closed by 103.13.40.2 port 41310 [preauth] Dec 25 19:21:16 host sshd[17107]: Invalid user xwang from 106.10.122.53 port 53806 Dec 25 19:21:16 host sshd[17107]: input_userauth_request: invalid user xwang [preauth] Dec 25 19:21:16 host sshd[17107]: pam_unix(sshd:auth): check pass; user unknown Dec 25 19:21:16 host sshd[17107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 25 19:21:19 host sshd[17107]: Failed password for invalid user xwang from 106.10.122.53 port 53806 ssh2 Dec 25 19:21:19 host sshd[17107]: Connection closed by 106.10.122.53 port 53806 [preauth] Dec 25 19:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 19:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 19:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 19:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 19:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 19:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 19:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 19:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 19:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 19:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 25 19:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 19:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 19:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 25 19:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 19:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 19:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 25 19:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 19:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 19:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 25 19:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 19:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 19:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 25 19:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 19:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 19:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 25 19:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 19:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 19:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 25 19:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 19:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 19:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 25 19:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 19:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 19:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 19:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 19:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 19:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 25 19:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 19:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 19:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=phmetals user-2=kottayamcalldriv user-3=palco123 user-4=gifterman user-5=mrsclean user-6=wwwnexidigital user-7=wwwevmhonda user-8=bonifacegroup user-9=straightcurve user-10=wwwletsstalkfood user-11=shalinijames user-12=wwwtestugo user-13=vfmassets user-14=pmcresources user-15=wwwkmaorg user-16=disposeat user-17=remysagr user-18=woodpeck user-19=wwwkapin user-20=travelboniface user-21=ugotscom user-22=keralaholi user-23=wwwresourcehunte user-24=wwwrmswll user-25=wwwpmcresource user-26=a2zgroup user-27=dartsimp user-28=laundryboniface user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 25 19:21:46 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 25 19:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-t9zvWIFfQMQvlzuc.~ Dec 25 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-t9zvWIFfQMQvlzuc.~' Dec 25 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-t9zvWIFfQMQvlzuc.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 25 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 25 19:21:47 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 19:21:47 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 19:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 19:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 19:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 19:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 19:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 19:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 19:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 19:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 19:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 19:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 25 19:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 19:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 25 19:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 25 19:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 25 19:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 25 19:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 25 19:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 25 19:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 25 19:21:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 25 19:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 25 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 25 19:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 19:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 19:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 25 19:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 19:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 19:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 25 19:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 19:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 19:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 25 19:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 19:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 19:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 25 19:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 19:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 19:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 25 19:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 25 19:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 25 19:27:14 host sshd[18111]: User root from 208.48.164.189 not allowed because not listed in AllowUsers Dec 25 19:27:14 host sshd[18111]: input_userauth_request: invalid user root [preauth] Dec 25 19:27:14 host unix_chkpwd[18115]: password check failed for user (root) Dec 25 19:27:14 host sshd[18111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.48.164.189 user=root Dec 25 19:27:14 host sshd[18111]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 19:27:16 host sshd[18111]: Failed password for invalid user root from 208.48.164.189 port 59568 ssh2 Dec 25 19:27:17 host sshd[18111]: Received disconnect from 208.48.164.189 port 59568:11: Bye Bye [preauth] Dec 25 19:27:17 host sshd[18111]: Disconnected from 208.48.164.189 port 59568 [preauth] Dec 25 19:28:15 host sshd[18318]: User root from 172.247.111.252 not allowed because not listed in AllowUsers Dec 25 19:28:15 host sshd[18318]: input_userauth_request: invalid user root [preauth] Dec 25 19:28:15 host unix_chkpwd[18321]: password check failed for user (root) Dec 25 19:28:15 host sshd[18318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.247.111.252 user=root Dec 25 19:28:15 host sshd[18318]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 19:28:17 host sshd[18318]: Failed password for invalid user root from 172.247.111.252 port 53146 ssh2 Dec 25 19:28:18 host sshd[18318]: Received disconnect from 172.247.111.252 port 53146:11: Bye Bye [preauth] Dec 25 19:28:18 host sshd[18318]: Disconnected from 172.247.111.252 port 53146 [preauth] Dec 25 19:28:29 host sshd[18357]: User root from 36.95.110.35 not allowed because not listed in AllowUsers Dec 25 19:28:29 host sshd[18357]: input_userauth_request: invalid user root [preauth] Dec 25 19:28:29 host unix_chkpwd[18360]: password check failed for user (root) Dec 25 19:28:29 host sshd[18357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.95.110.35 user=root Dec 25 19:28:29 host sshd[18357]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 19:28:31 host sshd[18357]: Failed password for invalid user root from 36.95.110.35 port 58850 ssh2 Dec 25 19:28:31 host sshd[18357]: Received disconnect from 36.95.110.35 port 58850:11: Bye Bye [preauth] Dec 25 19:28:31 host sshd[18357]: Disconnected from 36.95.110.35 port 58850 [preauth] Dec 25 19:30:23 host sshd[18610]: User root from 208.48.164.189 not allowed because not listed in AllowUsers Dec 25 19:30:23 host sshd[18610]: input_userauth_request: invalid user root [preauth] Dec 25 19:30:23 host unix_chkpwd[18613]: password check failed for user (root) Dec 25 19:30:23 host sshd[18610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.48.164.189 user=root Dec 25 19:30:23 host sshd[18610]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 19:30:25 host sshd[18610]: Failed password for invalid user root from 208.48.164.189 port 49870 ssh2 Dec 25 19:30:25 host sshd[18610]: Received disconnect from 208.48.164.189 port 49870:11: Bye Bye [preauth] Dec 25 19:30:25 host sshd[18610]: Disconnected from 208.48.164.189 port 49870 [preauth] Dec 25 19:31:27 host sshd[18773]: User root from 36.95.110.35 not allowed because not listed in AllowUsers Dec 25 19:31:27 host sshd[18773]: input_userauth_request: invalid user root [preauth] Dec 25 19:31:27 host unix_chkpwd[18776]: password check failed for user (root) Dec 25 19:31:27 host sshd[18773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.95.110.35 user=root Dec 25 19:31:27 host sshd[18773]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 19:31:30 host sshd[18773]: Failed password for invalid user root from 36.95.110.35 port 60844 ssh2 Dec 25 19:31:30 host sshd[18773]: Received disconnect from 36.95.110.35 port 60844:11: Bye Bye [preauth] Dec 25 19:31:30 host sshd[18773]: Disconnected from 36.95.110.35 port 60844 [preauth] Dec 25 19:31:32 host sshd[18782]: User root from 172.247.111.252 not allowed because not listed in AllowUsers Dec 25 19:31:32 host sshd[18782]: input_userauth_request: invalid user root [preauth] Dec 25 19:31:32 host unix_chkpwd[18816]: password check failed for user (root) Dec 25 19:31:32 host sshd[18782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.247.111.252 user=root Dec 25 19:31:32 host sshd[18782]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 19:31:34 host sshd[18782]: Failed password for invalid user root from 172.247.111.252 port 33764 ssh2 Dec 25 19:31:34 host sshd[18782]: Received disconnect from 172.247.111.252 port 33764:11: Bye Bye [preauth] Dec 25 19:31:34 host sshd[18782]: Disconnected from 172.247.111.252 port 33764 [preauth] Dec 25 19:38:24 host sshd[19776]: Invalid user user1 from 84.110.99.202 port 34508 Dec 25 19:38:24 host sshd[19776]: input_userauth_request: invalid user user1 [preauth] Dec 25 19:38:25 host sshd[19776]: pam_unix(sshd:auth): check pass; user unknown Dec 25 19:38:25 host sshd[19776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.110.99.202 Dec 25 19:38:27 host sshd[19776]: Failed password for invalid user user1 from 84.110.99.202 port 34508 ssh2 Dec 25 19:38:27 host sshd[19776]: Connection closed by 84.110.99.202 port 34508 [preauth] Dec 25 19:50:04 host sshd[21681]: Invalid user guest from 31.41.244.124 port 16271 Dec 25 19:50:04 host sshd[21681]: input_userauth_request: invalid user guest [preauth] Dec 25 19:50:04 host sshd[21681]: pam_unix(sshd:auth): check pass; user unknown Dec 25 19:50:04 host sshd[21681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Dec 25 19:50:06 host sshd[21681]: Failed password for invalid user guest from 31.41.244.124 port 16271 ssh2 Dec 25 19:50:06 host sshd[21681]: Received disconnect from 31.41.244.124 port 16271:11: Client disconnecting normally [preauth] Dec 25 19:50:06 host sshd[21681]: Disconnected from 31.41.244.124 port 16271 [preauth] Dec 25 19:50:08 host sshd[21688]: Invalid user hacluster from 31.41.244.124 port 20051 Dec 25 19:50:08 host sshd[21688]: input_userauth_request: invalid user hacluster [preauth] Dec 25 19:50:08 host sshd[21688]: pam_unix(sshd:auth): check pass; user unknown Dec 25 19:50:08 host sshd[21688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Dec 25 19:50:09 host sshd[21688]: Failed password for invalid user hacluster from 31.41.244.124 port 20051 ssh2 Dec 25 19:50:09 host sshd[21688]: Received disconnect from 31.41.244.124 port 20051:11: Client disconnecting normally [preauth] Dec 25 19:50:09 host sshd[21688]: Disconnected from 31.41.244.124 port 20051 [preauth] Dec 25 19:50:10 host sshd[21696]: User root from 31.41.244.124 not allowed because not listed in AllowUsers Dec 25 19:50:10 host sshd[21696]: input_userauth_request: invalid user root [preauth] Dec 25 19:50:11 host unix_chkpwd[21699]: password check failed for user (root) Dec 25 19:50:11 host sshd[21696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 user=root Dec 25 19:50:11 host sshd[21696]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 19:50:13 host sshd[21696]: Failed password for invalid user root from 31.41.244.124 port 23188 ssh2 Dec 25 19:50:42 host sshd[21804]: User root from 154.209.5.251 not allowed because not listed in AllowUsers Dec 25 19:50:42 host sshd[21804]: input_userauth_request: invalid user root [preauth] Dec 25 19:50:42 host unix_chkpwd[21807]: password check failed for user (root) Dec 25 19:50:42 host sshd[21804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.209.5.251 user=root Dec 25 19:50:42 host sshd[21804]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 19:50:44 host sshd[21804]: Failed password for invalid user root from 154.209.5.251 port 49004 ssh2 Dec 25 19:50:44 host sshd[21804]: Received disconnect from 154.209.5.251 port 49004:11: Bye Bye [preauth] Dec 25 19:50:44 host sshd[21804]: Disconnected from 154.209.5.251 port 49004 [preauth] Dec 25 19:57:01 host sshd[22622]: User root from 154.209.5.251 not allowed because not listed in AllowUsers Dec 25 19:57:01 host sshd[22622]: input_userauth_request: invalid user root [preauth] Dec 25 19:57:02 host unix_chkpwd[22624]: password check failed for user (root) Dec 25 19:57:02 host sshd[22622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.209.5.251 user=root Dec 25 19:57:02 host sshd[22622]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 19:57:03 host sshd[22622]: Failed password for invalid user root from 154.209.5.251 port 52998 ssh2 Dec 25 19:57:04 host sshd[22622]: Received disconnect from 154.209.5.251 port 52998:11: Bye Bye [preauth] Dec 25 19:57:04 host sshd[22622]: Disconnected from 154.209.5.251 port 52998 [preauth] Dec 25 20:00:15 host sshd[23126]: Invalid user user1 from 134.122.90.159 port 34196 Dec 25 20:00:15 host sshd[23126]: input_userauth_request: invalid user user1 [preauth] Dec 25 20:00:16 host sshd[23126]: pam_unix(sshd:auth): check pass; user unknown Dec 25 20:00:16 host sshd[23126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.90.159 Dec 25 20:00:18 host sshd[23126]: Failed password for invalid user user1 from 134.122.90.159 port 34196 ssh2 Dec 25 20:00:19 host sshd[23126]: Connection closed by 134.122.90.159 port 34196 [preauth] Dec 25 20:03:27 host sshd[23618]: Invalid user wujun from 162.218.126.136 port 37440 Dec 25 20:03:27 host sshd[23618]: input_userauth_request: invalid user wujun [preauth] Dec 25 20:03:27 host sshd[23618]: pam_unix(sshd:auth): check pass; user unknown Dec 25 20:03:27 host sshd[23618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 25 20:03:28 host sshd[23621]: Invalid user cq from 45.93.201.90 port 38714 Dec 25 20:03:28 host sshd[23621]: input_userauth_request: invalid user cq [preauth] Dec 25 20:03:28 host sshd[23621]: pam_unix(sshd:auth): check pass; user unknown Dec 25 20:03:28 host sshd[23621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 25 20:03:29 host sshd[23618]: Failed password for invalid user wujun from 162.218.126.136 port 37440 ssh2 Dec 25 20:03:29 host sshd[23618]: Connection closed by 162.218.126.136 port 37440 [preauth] Dec 25 20:03:30 host sshd[23621]: Failed password for invalid user cq from 45.93.201.90 port 38714 ssh2 Dec 25 20:03:34 host sshd[23621]: pam_unix(sshd:auth): check pass; user unknown Dec 25 20:03:35 host sshd[23621]: Failed password for invalid user cq from 45.93.201.90 port 38714 ssh2 Dec 25 20:03:38 host sshd[23621]: pam_unix(sshd:auth): check pass; user unknown Dec 25 20:03:40 host sshd[23621]: Failed password for invalid user cq from 45.93.201.90 port 38714 ssh2 Dec 25 20:03:44 host sshd[23621]: Connection closed by 45.93.201.90 port 38714 [preauth] Dec 25 20:03:44 host sshd[23621]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 25 20:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 20:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 20:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 20:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 20:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 20:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 20:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 20:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 20:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 20:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 25 20:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 20:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 20:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 25 20:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 20:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 20:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 25 20:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 20:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 20:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 25 20:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 20:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 20:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 25 20:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 20:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 20:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 25 20:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 20:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 20:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 25 20:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 20:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 20:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 25 20:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 20:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 25 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 20:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkapin user-2=woodpeck user-3=wwwkmaorg user-4=disposeat user-5=remysagr user-6=pmcresources user-7=wwwtestugo user-8=shalinijames user-9=vfmassets user-10=wwwletsstalkfood user-11=straightcurve user-12=wwwevmhonda user-13=bonifacegroup user-14=mrsclean user-15=wwwnexidigital user-16=phmetals user-17=kottayamcalldriv user-18=gifterman user-19=palco123 user-20=cochintaxi user-21=wwwkaretakers user-22=laundryboniface user-23=dartsimp user-24=a2zgroup user-25=wwwpmcresource user-26=ugotscom user-27=wwwrmswll user-28=wwwresourcehunte user-29=keralaholi user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 25 20:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 25 20:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 20:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 20:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 20:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 20:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 20:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-At6YZNoSLO7YXiB8.~ Dec 25 20:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 20:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 20:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-At6YZNoSLO7YXiB8.~' Dec 25 20:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 20:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 20:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-At6YZNoSLO7YXiB8.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 20:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 20:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 20:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 25 20:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 20:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 20:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 25 20:21:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 20:21:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 25 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 25 20:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 25 20:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 25 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 25 20:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 25 20:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 25 20:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 25 20:21:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 25 20:21:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 25 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 25 20:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 20:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 25 20:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 20:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 25 20:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 20:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 20:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 25 20:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 20:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 20:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 25 20:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 20:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 20:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 25 20:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 25 20:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 25 20:25:35 host sshd[26752]: Did not receive identification string from 104.244.72.8 port 59926 Dec 25 20:26:35 host sshd[26871]: Invalid user 35.232.61.10 from 104.244.72.8 port 33900 Dec 25 20:26:35 host sshd[26871]: input_userauth_request: invalid user 35.232.61.10 [preauth] Dec 25 20:26:35 host sshd[26871]: pam_unix(sshd:auth): check pass; user unknown Dec 25 20:26:35 host sshd[26871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.72.8 Dec 25 20:26:37 host sshd[26871]: Failed password for invalid user 35.232.61.10 from 104.244.72.8 port 33900 ssh2 Dec 25 20:26:37 host sshd[26871]: packet_write_wait: Connection from 104.244.72.8 port 33900: Broken pipe [preauth] Dec 25 20:28:41 host sshd[27095]: Invalid user webwasb from 41.197.31.178 port 43670 Dec 25 20:28:41 host sshd[27095]: input_userauth_request: invalid user webwasb [preauth] Dec 25 20:28:41 host sshd[27095]: pam_unix(sshd:auth): check pass; user unknown Dec 25 20:28:41 host sshd[27095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 25 20:28:42 host sshd[27095]: Failed password for invalid user webwasb from 41.197.31.178 port 43670 ssh2 Dec 25 20:28:43 host sshd[27095]: Connection closed by 41.197.31.178 port 43670 [preauth] Dec 25 20:35:07 host sshd[28169]: Invalid user shaoruizhi from 92.46.108.20 port 51700 Dec 25 20:35:07 host sshd[28169]: input_userauth_request: invalid user shaoruizhi [preauth] Dec 25 20:35:07 host sshd[28169]: pam_unix(sshd:auth): check pass; user unknown Dec 25 20:35:07 host sshd[28169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 25 20:35:10 host sshd[28169]: Failed password for invalid user shaoruizhi from 92.46.108.20 port 51700 ssh2 Dec 25 20:35:10 host sshd[28169]: Connection closed by 92.46.108.20 port 51700 [preauth] Dec 25 20:46:27 host sshd[29800]: Invalid user songjiazhi from 103.13.40.2 port 53464 Dec 25 20:46:27 host sshd[29800]: input_userauth_request: invalid user songjiazhi [preauth] Dec 25 20:46:27 host sshd[29800]: pam_unix(sshd:auth): check pass; user unknown Dec 25 20:46:27 host sshd[29800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 25 20:46:29 host sshd[29800]: Failed password for invalid user songjiazhi from 103.13.40.2 port 53464 ssh2 Dec 25 20:46:29 host sshd[29800]: Connection closed by 103.13.40.2 port 53464 [preauth] Dec 25 20:54:15 host sshd[30913]: Invalid user jiayu from 106.10.122.53 port 58868 Dec 25 20:54:15 host sshd[30913]: input_userauth_request: invalid user jiayu [preauth] Dec 25 20:54:15 host sshd[30913]: pam_unix(sshd:auth): check pass; user unknown Dec 25 20:54:15 host sshd[30913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 25 20:54:17 host sshd[30913]: Failed password for invalid user jiayu from 106.10.122.53 port 58868 ssh2 Dec 25 20:54:17 host sshd[30913]: Connection closed by 106.10.122.53 port 58868 [preauth] Dec 25 20:57:48 host sshd[31323]: User root from 41.216.182.232 not allowed because not listed in AllowUsers Dec 25 20:57:48 host sshd[31323]: input_userauth_request: invalid user root [preauth] Dec 25 20:57:48 host unix_chkpwd[31332]: password check failed for user (root) Dec 25 20:57:48 host sshd[31323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.216.182.232 user=root Dec 25 20:57:48 host sshd[31323]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 20:57:50 host sshd[31337]: User root from 139.59.26.69 not allowed because not listed in AllowUsers Dec 25 20:57:50 host sshd[31337]: input_userauth_request: invalid user root [preauth] Dec 25 20:57:50 host unix_chkpwd[31339]: password check failed for user (root) Dec 25 20:57:50 host sshd[31337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.26.69 user=root Dec 25 20:57:50 host sshd[31337]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 20:57:50 host sshd[31323]: Failed password for invalid user root from 41.216.182.232 port 59946 ssh2 Dec 25 20:57:51 host sshd[31323]: Received disconnect from 41.216.182.232 port 59946:11: Bye Bye [preauth] Dec 25 20:57:51 host sshd[31323]: Disconnected from 41.216.182.232 port 59946 [preauth] Dec 25 20:57:52 host sshd[31337]: Failed password for invalid user root from 139.59.26.69 port 57282 ssh2 Dec 25 20:57:52 host sshd[31337]: Received disconnect from 139.59.26.69 port 57282:11: Bye Bye [preauth] Dec 25 20:57:52 host sshd[31337]: Disconnected from 139.59.26.69 port 57282 [preauth] Dec 25 20:59:51 host sshd[31699]: User root from 68.183.86.86 not allowed because not listed in AllowUsers Dec 25 20:59:51 host sshd[31699]: input_userauth_request: invalid user root [preauth] Dec 25 20:59:51 host unix_chkpwd[31701]: password check failed for user (root) Dec 25 20:59:51 host sshd[31699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.86.86 user=root Dec 25 20:59:51 host sshd[31699]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 20:59:54 host sshd[31699]: Failed password for invalid user root from 68.183.86.86 port 40664 ssh2 Dec 25 20:59:54 host sshd[31699]: Received disconnect from 68.183.86.86 port 40664:11: Bye Bye [preauth] Dec 25 20:59:54 host sshd[31699]: Disconnected from 68.183.86.86 port 40664 [preauth] Dec 25 21:00:29 host sshd[31803]: User root from 195.206.60.116 not allowed because not listed in AllowUsers Dec 25 21:00:29 host sshd[31803]: input_userauth_request: invalid user root [preauth] Dec 25 21:00:29 host unix_chkpwd[31806]: password check failed for user (root) Dec 25 21:00:29 host sshd[31803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.206.60.116 user=root Dec 25 21:00:29 host sshd[31803]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 21:00:30 host sshd[31803]: Failed password for invalid user root from 195.206.60.116 port 39582 ssh2 Dec 25 21:00:31 host sshd[31803]: Received disconnect from 195.206.60.116 port 39582:11: Bye Bye [preauth] Dec 25 21:00:31 host sshd[31803]: Disconnected from 195.206.60.116 port 39582 [preauth] Dec 25 21:01:21 host sshd[31921]: User root from 139.59.26.69 not allowed because not listed in AllowUsers Dec 25 21:01:21 host sshd[31921]: input_userauth_request: invalid user root [preauth] Dec 25 21:01:21 host unix_chkpwd[31923]: password check failed for user (root) Dec 25 21:01:21 host sshd[31921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.26.69 user=root Dec 25 21:01:21 host sshd[31921]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 21:01:24 host sshd[31921]: Failed password for invalid user root from 139.59.26.69 port 43112 ssh2 Dec 25 21:01:24 host sshd[31921]: Received disconnect from 139.59.26.69 port 43112:11: Bye Bye [preauth] Dec 25 21:01:24 host sshd[31921]: Disconnected from 139.59.26.69 port 43112 [preauth] Dec 25 21:01:26 host sshd[31981]: User root from 20.193.143.165 not allowed because not listed in AllowUsers Dec 25 21:01:26 host sshd[31981]: input_userauth_request: invalid user root [preauth] Dec 25 21:01:26 host unix_chkpwd[31983]: password check failed for user (root) Dec 25 21:01:26 host sshd[31981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.193.143.165 user=root Dec 25 21:01:26 host sshd[31981]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 21:01:28 host sshd[31981]: Failed password for invalid user root from 20.193.143.165 port 32900 ssh2 Dec 25 21:01:28 host sshd[31981]: Received disconnect from 20.193.143.165 port 32900:11: Bye Bye [preauth] Dec 25 21:01:28 host sshd[31981]: Disconnected from 20.193.143.165 port 32900 [preauth] Dec 25 21:01:31 host sshd[31988]: User root from 41.216.182.232 not allowed because not listed in AllowUsers Dec 25 21:01:31 host sshd[31988]: input_userauth_request: invalid user root [preauth] Dec 25 21:01:31 host unix_chkpwd[31991]: password check failed for user (root) Dec 25 21:01:31 host sshd[31988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.216.182.232 user=root Dec 25 21:01:31 host sshd[31988]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 21:01:33 host sshd[31988]: Failed password for invalid user root from 41.216.182.232 port 44772 ssh2 Dec 25 21:01:33 host sshd[31988]: Received disconnect from 41.216.182.232 port 44772:11: Bye Bye [preauth] Dec 25 21:01:33 host sshd[31988]: Disconnected from 41.216.182.232 port 44772 [preauth] Dec 25 21:01:37 host sshd[32036]: User root from 52.237.238.87 not allowed because not listed in AllowUsers Dec 25 21:01:37 host sshd[32036]: input_userauth_request: invalid user root [preauth] Dec 25 21:01:37 host unix_chkpwd[32039]: password check failed for user (root) Dec 25 21:01:37 host sshd[32036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.237.238.87 user=root Dec 25 21:01:37 host sshd[32036]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 21:01:39 host sshd[32036]: Failed password for invalid user root from 52.237.238.87 port 56478 ssh2 Dec 25 21:01:39 host sshd[32036]: Received disconnect from 52.237.238.87 port 56478:11: Bye Bye [preauth] Dec 25 21:01:39 host sshd[32036]: Disconnected from 52.237.238.87 port 56478 [preauth] Dec 25 21:01:40 host sshd[32044]: User root from 84.110.99.202 not allowed because not listed in AllowUsers Dec 25 21:01:40 host sshd[32044]: input_userauth_request: invalid user root [preauth] Dec 25 21:01:40 host unix_chkpwd[32049]: password check failed for user (root) Dec 25 21:01:40 host sshd[32044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.110.99.202 user=root Dec 25 21:01:40 host sshd[32044]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 21:01:42 host sshd[32044]: Failed password for invalid user root from 84.110.99.202 port 48884 ssh2 Dec 25 21:01:43 host sshd[32044]: Connection closed by 84.110.99.202 port 48884 [preauth] Dec 25 21:01:43 host sshd[32053]: User root from 68.183.86.86 not allowed because not listed in AllowUsers Dec 25 21:01:43 host sshd[32053]: input_userauth_request: invalid user root [preauth] Dec 25 21:01:43 host unix_chkpwd[32056]: password check failed for user (root) Dec 25 21:01:43 host sshd[32053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.86.86 user=root Dec 25 21:01:43 host sshd[32053]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 21:01:46 host sshd[32053]: Failed password for invalid user root from 68.183.86.86 port 58622 ssh2 Dec 25 21:01:46 host sshd[32053]: Received disconnect from 68.183.86.86 port 58622:11: Bye Bye [preauth] Dec 25 21:01:46 host sshd[32053]: Disconnected from 68.183.86.86 port 58622 [preauth] Dec 25 21:02:09 host sshd[32131]: User root from 195.206.60.116 not allowed because not listed in AllowUsers Dec 25 21:02:09 host sshd[32131]: input_userauth_request: invalid user root [preauth] Dec 25 21:02:09 host unix_chkpwd[32136]: password check failed for user (root) Dec 25 21:02:09 host sshd[32131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.206.60.116 user=root Dec 25 21:02:09 host sshd[32131]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 21:02:11 host sshd[32131]: Failed password for invalid user root from 195.206.60.116 port 40934 ssh2 Dec 25 21:02:11 host sshd[32131]: Received disconnect from 195.206.60.116 port 40934:11: Bye Bye [preauth] Dec 25 21:02:11 host sshd[32131]: Disconnected from 195.206.60.116 port 40934 [preauth] Dec 25 21:03:33 host sshd[32337]: User root from 148.102.49.125 not allowed because not listed in AllowUsers Dec 25 21:03:33 host sshd[32337]: input_userauth_request: invalid user root [preauth] Dec 25 21:03:33 host unix_chkpwd[32341]: password check failed for user (root) Dec 25 21:03:33 host sshd[32337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.102.49.125 user=root Dec 25 21:03:33 host sshd[32337]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 21:03:35 host sshd[32337]: Failed password for invalid user root from 148.102.49.125 port 52954 ssh2 Dec 25 21:03:36 host sshd[32337]: Received disconnect from 148.102.49.125 port 52954:11: Bye Bye [preauth] Dec 25 21:03:36 host sshd[32337]: Disconnected from 148.102.49.125 port 52954 [preauth] Dec 25 21:04:37 host sshd[32478]: User root from 52.237.238.87 not allowed because not listed in AllowUsers Dec 25 21:04:37 host sshd[32478]: input_userauth_request: invalid user root [preauth] Dec 25 21:04:37 host unix_chkpwd[32482]: password check failed for user (root) Dec 25 21:04:37 host sshd[32478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.237.238.87 user=root Dec 25 21:04:37 host sshd[32478]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 21:04:38 host sshd[32478]: Failed password for invalid user root from 52.237.238.87 port 38638 ssh2 Dec 25 21:04:39 host sshd[32478]: Received disconnect from 52.237.238.87 port 38638:11: Bye Bye [preauth] Dec 25 21:04:39 host sshd[32478]: Disconnected from 52.237.238.87 port 38638 [preauth] Dec 25 21:04:50 host sshd[32624]: User root from 20.193.143.165 not allowed because not listed in AllowUsers Dec 25 21:04:50 host sshd[32624]: input_userauth_request: invalid user root [preauth] Dec 25 21:04:50 host unix_chkpwd[32632]: password check failed for user (root) Dec 25 21:04:50 host sshd[32624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.193.143.165 user=root Dec 25 21:04:50 host sshd[32624]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 21:04:52 host sshd[32624]: Failed password for invalid user root from 20.193.143.165 port 34254 ssh2 Dec 25 21:04:53 host sshd[32624]: Received disconnect from 20.193.143.165 port 34254:11: Bye Bye [preauth] Dec 25 21:04:53 host sshd[32624]: Disconnected from 20.193.143.165 port 34254 [preauth] Dec 25 21:06:58 host sshd[422]: User root from 148.102.49.125 not allowed because not listed in AllowUsers Dec 25 21:06:58 host sshd[422]: input_userauth_request: invalid user root [preauth] Dec 25 21:06:58 host unix_chkpwd[427]: password check failed for user (root) Dec 25 21:06:58 host sshd[422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.102.49.125 user=root Dec 25 21:06:58 host sshd[422]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 21:07:00 host sshd[422]: Failed password for invalid user root from 148.102.49.125 port 45874 ssh2 Dec 25 21:16:44 host sshd[1651]: Invalid user admin from 162.218.126.136 port 56586 Dec 25 21:16:44 host sshd[1651]: input_userauth_request: invalid user admin [preauth] Dec 25 21:16:44 host sshd[1651]: pam_unix(sshd:auth): check pass; user unknown Dec 25 21:16:44 host sshd[1651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 25 21:16:46 host sshd[1651]: Failed password for invalid user admin from 162.218.126.136 port 56586 ssh2 Dec 25 21:16:46 host sshd[1651]: Connection closed by 162.218.126.136 port 56586 [preauth] Dec 25 21:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 21:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 21:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 21:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 21:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 21:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 21:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 21:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 21:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 21:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 25 21:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 21:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 21:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 25 21:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 21:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 21:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 25 21:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 21:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 21:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 25 21:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 21:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 21:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 25 21:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 21:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 21:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 25 21:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 21:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 21:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 25 21:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 21:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 21:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 25 21:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 21:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 21:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 21:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 21:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 21:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 25 21:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 21:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 21:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkmaorg user-2=disposeat user-3=remysagr user-4=woodpeck user-5=wwwkapin user-6=vfmassets user-7=shalinijames user-8=wwwtestugo user-9=pmcresources user-10=bonifacegroup user-11=wwwevmhonda user-12=wwwletsstalkfood user-13=straightcurve user-14=palco123 user-15=gifterman user-16=phmetals user-17=kottayamcalldriv user-18=mrsclean user-19=wwwnexidigital user-20=wwwkaretakers user-21=cochintaxi user-22=a2zgroup user-23=dartsimp user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=keralaholi user-28=wwwresourcehunte user-29=wwwrmswll user-30=ugotscom feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 25 21:21:46 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 25 21:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-6bUxQGYjJO1Jtegj.~ Dec 25 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-6bUxQGYjJO1Jtegj.~' Dec 25 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-6bUxQGYjJO1Jtegj.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 25 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 25 21:21:47 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 21:21:47 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 21:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 21:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 21:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 21:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 21:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 21:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 21:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 25 21:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 21:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 21:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 21:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 25 21:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 25 21:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 25 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 25 21:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 25 21:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 25 21:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 25 21:21:51 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 25 21:21:53 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 25 21:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 25 21:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 21:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 25 21:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 21:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 25 21:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 21:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 21:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 25 21:21:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 21:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 25 21:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 21:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 21:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 25 21:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 25 21:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 25 21:30:03 host sshd[3619]: Did not receive identification string from 46.101.97.107 port 61000 Dec 25 21:36:14 host sshd[4473]: Did not receive identification string from 104.244.72.8 port 51362 Dec 25 21:48:29 host sshd[6002]: Invalid user cr from 45.93.201.90 port 45598 Dec 25 21:48:29 host sshd[6002]: input_userauth_request: invalid user cr [preauth] Dec 25 21:48:29 host sshd[6002]: pam_unix(sshd:auth): check pass; user unknown Dec 25 21:48:29 host sshd[6002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 25 21:48:31 host sshd[6002]: Failed password for invalid user cr from 45.93.201.90 port 45598 ssh2 Dec 25 21:48:34 host sshd[6002]: pam_unix(sshd:auth): check pass; user unknown Dec 25 21:48:36 host sshd[6002]: Failed password for invalid user cr from 45.93.201.90 port 45598 ssh2 Dec 25 21:48:39 host sshd[6002]: pam_unix(sshd:auth): check pass; user unknown Dec 25 21:48:41 host sshd[6002]: Failed password for invalid user cr from 45.93.201.90 port 45598 ssh2 Dec 25 21:48:44 host sshd[6002]: Connection closed by 45.93.201.90 port 45598 [preauth] Dec 25 21:48:44 host sshd[6002]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 25 22:16:33 host sshd[9880]: Invalid user ns from 103.13.40.2 port 38868 Dec 25 22:16:33 host sshd[9880]: input_userauth_request: invalid user ns [preauth] Dec 25 22:16:33 host sshd[9880]: pam_unix(sshd:auth): check pass; user unknown Dec 25 22:16:33 host sshd[9880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 25 22:16:35 host sshd[9880]: Failed password for invalid user ns from 103.13.40.2 port 38868 ssh2 Dec 25 22:16:35 host sshd[9880]: Connection closed by 103.13.40.2 port 38868 [preauth] Dec 25 22:20:52 host sshd[10435]: Invalid user kelly from 92.46.108.20 port 57740 Dec 25 22:20:52 host sshd[10435]: input_userauth_request: invalid user kelly [preauth] Dec 25 22:20:53 host sshd[10435]: pam_unix(sshd:auth): check pass; user unknown Dec 25 22:20:53 host sshd[10435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 25 22:20:54 host sshd[10435]: Failed password for invalid user kelly from 92.46.108.20 port 57740 ssh2 Dec 25 22:20:54 host sshd[10435]: Connection closed by 92.46.108.20 port 57740 [preauth] Dec 25 22:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 22:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 22:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 22:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 22:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 22:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 22:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 22:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 22:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 22:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 25 22:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 22:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 22:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 25 22:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 22:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 22:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 25 22:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 22:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 22:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 25 22:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 22:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 22:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 25 22:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 22:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 22:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 25 22:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 22:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 22:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 25 22:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 22:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 22:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 25 22:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 22:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 22:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 22:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 22:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 22:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 25 22:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 22:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 22:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=remysagr user-2=disposeat user-3=wwwkmaorg user-4=wwwkapin user-5=woodpeck user-6=vfmassets user-7=wwwtestugo user-8=shalinijames user-9=pmcresources user-10=bonifacegroup user-11=wwwevmhonda user-12=straightcurve user-13=wwwletsstalkfood user-14=gifterman user-15=palco123 user-16=phmetals user-17=kottayamcalldriv user-18=mrsclean user-19=wwwnexidigital user-20=wwwkaretakers user-21=cochintaxi user-22=dartsimp user-23=a2zgroup user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=wwwrmswll user-28=wwwresourcehunte user-29=keralaholi user-30=ugotscom feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 25 22:21:46 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 25 22:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 22:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 22:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 22:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 22:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 22:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-DjaWwPNcjgdjzKHg.~ Dec 25 22:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 22:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 22:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-DjaWwPNcjgdjzKHg.~' Dec 25 22:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 22:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 22:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-DjaWwPNcjgdjzKHg.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 22:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 22:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 22:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 25 22:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 22:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 25 22:21:47 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 22:21:47 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 22:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 22:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 22:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 22:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 22:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 22:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 22:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 22:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 22:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 22:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 25 22:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 22:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 25 22:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 25 22:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 25 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 25 22:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 25 22:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 25 22:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 25 22:21:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 25 22:21:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 25 22:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 25 22:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 22:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 25 22:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 22:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 22:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 25 22:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 22:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 22:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 25 22:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 22:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 22:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 25 22:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 22:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 22:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 25 22:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 25 22:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 25 22:24:44 host sshd[11050]: Invalid user user1 from 84.110.99.202 port 60066 Dec 25 22:24:44 host sshd[11050]: input_userauth_request: invalid user user1 [preauth] Dec 25 22:24:44 host sshd[11050]: pam_unix(sshd:auth): check pass; user unknown Dec 25 22:24:44 host sshd[11050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.110.99.202 Dec 25 22:24:46 host sshd[11050]: Failed password for invalid user user1 from 84.110.99.202 port 60066 ssh2 Dec 25 22:24:46 host sshd[11050]: Connection closed by 84.110.99.202 port 60066 [preauth] Dec 25 22:27:01 host sshd[11441]: Invalid user admin from 106.10.122.53 port 50499 Dec 25 22:27:01 host sshd[11441]: input_userauth_request: invalid user admin [preauth] Dec 25 22:27:01 host sshd[11441]: pam_unix(sshd:auth): check pass; user unknown Dec 25 22:27:01 host sshd[11441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 25 22:27:02 host sshd[11441]: Failed password for invalid user admin from 106.10.122.53 port 50499 ssh2 Dec 25 22:27:03 host sshd[11441]: Connection closed by 106.10.122.53 port 50499 [preauth] Dec 25 22:28:43 host sshd[11663]: Invalid user user from 41.197.31.178 port 58072 Dec 25 22:28:43 host sshd[11663]: input_userauth_request: invalid user user [preauth] Dec 25 22:28:43 host sshd[11663]: pam_unix(sshd:auth): check pass; user unknown Dec 25 22:28:43 host sshd[11663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 25 22:28:45 host sshd[11663]: Failed password for invalid user user from 41.197.31.178 port 58072 ssh2 Dec 25 22:28:46 host sshd[11663]: Connection closed by 41.197.31.178 port 58072 [preauth] Dec 25 22:29:58 host sshd[11792]: Invalid user user1 from 162.218.126.136 port 36768 Dec 25 22:29:58 host sshd[11792]: input_userauth_request: invalid user user1 [preauth] Dec 25 22:29:59 host sshd[11792]: pam_unix(sshd:auth): check pass; user unknown Dec 25 22:29:59 host sshd[11792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 25 22:30:01 host sshd[11792]: Failed password for invalid user user1 from 162.218.126.136 port 36768 ssh2 Dec 25 22:30:01 host sshd[11792]: Connection closed by 162.218.126.136 port 36768 [preauth] Dec 25 22:50:28 host sshd[14514]: Connection closed by 167.94.138.60 port 33422 [preauth] Dec 25 23:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 23:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 23:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 23:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 23:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 23:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 23:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 23:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 23:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 23:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 25 23:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 23:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 23:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 25 23:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 23:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 23:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 25 23:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 23:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 23:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 25 23:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 23:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 23:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 25 23:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 23:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 23:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 25 23:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 23:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 23:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 25 23:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 23:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 23:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 25 23:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 23:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 23:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 23:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 23:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 23:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 25 23:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 23:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 23:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=shalinijames user-2=wwwtestugo user-3=vfmassets user-4=pmcresources user-5=remysagr user-6=disposeat user-7=wwwkmaorg user-8=woodpeck user-9=wwwkapin user-10=kottayamcalldriv user-11=phmetals user-12=palco123 user-13=gifterman user-14=wwwnexidigital user-15=mrsclean user-16=wwwevmhonda user-17=bonifacegroup user-18=straightcurve user-19=wwwletsstalkfood user-20=a2zgroup user-21=dartsimp user-22=laundryboniface user-23=wwwkaretakers user-24=cochintaxi user-25=travelboniface user-26=ugotscom user-27=wwwresourcehunte user-28=keralaholi user-29=wwwrmswll user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 25 23:21:46 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 25 23:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 23:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 23:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 23:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 23:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 23:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-tdQ8ddmKDensR9wK.~ Dec 25 23:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 23:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 23:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-tdQ8ddmKDensR9wK.~' Dec 25 23:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 23:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 23:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-tdQ8ddmKDensR9wK.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 25 23:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 23:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 23:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 25 23:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 23:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 25 23:21:47 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 23:21:47 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 23:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 25 23:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 23:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 23:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 25 23:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 23:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 23:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 25 23:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 23:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 23:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 25 23:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 23:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 25 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 25 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 25 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 25 23:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 25 23:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 25 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 25 23:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 25 23:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 25 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 25 23:21:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 25 23:21:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 25 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 25 23:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 23:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 25 23:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 23:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 25 23:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 25 23:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 25 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 25 23:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 23:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 25 23:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 25 23:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 25 23:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 25 23:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 25 23:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 25 23:33:35 host sshd[20581]: Invalid user cs from 45.93.201.90 port 45948 Dec 25 23:33:35 host sshd[20581]: input_userauth_request: invalid user cs [preauth] Dec 25 23:33:35 host sshd[20581]: pam_unix(sshd:auth): check pass; user unknown Dec 25 23:33:35 host sshd[20581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 25 23:33:37 host sshd[20581]: Failed password for invalid user cs from 45.93.201.90 port 45948 ssh2 Dec 25 23:33:40 host sshd[20581]: pam_unix(sshd:auth): check pass; user unknown Dec 25 23:33:41 host sshd[20581]: Failed password for invalid user cs from 45.93.201.90 port 45948 ssh2 Dec 25 23:33:45 host sshd[20581]: pam_unix(sshd:auth): check pass; user unknown Dec 25 23:33:46 host sshd[20581]: Failed password for invalid user cs from 45.93.201.90 port 45948 ssh2 Dec 25 23:33:49 host sshd[20581]: Connection closed by 45.93.201.90 port 45948 [preauth] Dec 25 23:33:49 host sshd[20581]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 25 23:43:20 host sshd[22033]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Dec 25 23:43:20 host sshd[22033]: input_userauth_request: invalid user root [preauth] Dec 25 23:43:21 host unix_chkpwd[22036]: password check failed for user (root) Dec 25 23:43:21 host sshd[22033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Dec 25 23:43:21 host sshd[22033]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 25 23:43:23 host sshd[22033]: Failed password for invalid user root from 162.218.126.136 port 43550 ssh2 Dec 25 23:43:23 host sshd[22033]: Connection closed by 162.218.126.136 port 43550 [preauth] Dec 25 23:46:24 host sshd[22424]: Invalid user user1 from 103.13.40.2 port 47268 Dec 25 23:46:24 host sshd[22424]: input_userauth_request: invalid user user1 [preauth] Dec 25 23:46:25 host sshd[22424]: pam_unix(sshd:auth): check pass; user unknown Dec 25 23:46:25 host sshd[22424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 25 23:46:27 host sshd[22424]: Failed password for invalid user user1 from 103.13.40.2 port 47268 ssh2 Dec 25 23:46:27 host sshd[22424]: Connection closed by 103.13.40.2 port 47268 [preauth] Dec 25 23:47:36 host sshd[22643]: Invalid user user01 from 84.110.99.202 port 46702 Dec 25 23:47:36 host sshd[22643]: input_userauth_request: invalid user user01 [preauth] Dec 25 23:47:36 host sshd[22643]: pam_unix(sshd:auth): check pass; user unknown Dec 25 23:47:36 host sshd[22643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.110.99.202 Dec 25 23:47:37 host sshd[22643]: Failed password for invalid user user01 from 84.110.99.202 port 46702 ssh2 Dec 25 23:47:37 host sshd[22643]: Connection closed by 84.110.99.202 port 46702 [preauth] Dec 25 23:59:48 host sshd[24108]: Invalid user user1 from 106.10.122.53 port 38796 Dec 25 23:59:48 host sshd[24108]: input_userauth_request: invalid user user1 [preauth] Dec 25 23:59:48 host sshd[24108]: pam_unix(sshd:auth): check pass; user unknown Dec 25 23:59:48 host sshd[24108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 25 23:59:51 host sshd[24108]: Failed password for invalid user user1 from 106.10.122.53 port 38796 ssh2 Dec 25 23:59:51 host sshd[24108]: Connection closed by 106.10.122.53 port 38796 [preauth] Dec 26 00:06:31 host sshd[25016]: User root from 92.46.108.20 not allowed because not listed in AllowUsers Dec 26 00:06:31 host sshd[25016]: input_userauth_request: invalid user root [preauth] Dec 26 00:06:32 host unix_chkpwd[25019]: password check failed for user (root) Dec 26 00:06:32 host sshd[25016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 user=root Dec 26 00:06:32 host sshd[25016]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 00:06:34 host sshd[25016]: Failed password for invalid user root from 92.46.108.20 port 58732 ssh2 Dec 26 00:06:34 host sshd[25016]: Connection closed by 92.46.108.20 port 58732 [preauth] Dec 26 00:13:37 host sshd[25895]: Invalid user user from 193.169.255.30 port 40628 Dec 26 00:13:37 host sshd[25895]: input_userauth_request: invalid user user [preauth] Dec 26 00:13:37 host sshd[25895]: pam_unix(sshd:auth): check pass; user unknown Dec 26 00:13:37 host sshd[25895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.169.255.30 Dec 26 00:13:40 host sshd[25895]: Failed password for invalid user user from 193.169.255.30 port 40628 ssh2 Dec 26 00:13:43 host sshd[25895]: pam_unix(sshd:auth): check pass; user unknown Dec 26 00:13:44 host sshd[25895]: Failed password for invalid user user from 193.169.255.30 port 40628 ssh2 Dec 26 00:13:48 host sshd[25895]: pam_unix(sshd:auth): check pass; user unknown Dec 26 00:13:50 host sshd[25895]: Failed password for invalid user user from 193.169.255.30 port 40628 ssh2 Dec 26 00:13:52 host sshd[25918]: Connection closed by 45.79.172.21 port 4202 [preauth] Dec 26 00:13:53 host sshd[25895]: pam_unix(sshd:auth): check pass; user unknown Dec 26 00:13:54 host sshd[25922]: Connection closed by 45.79.172.21 port 4210 [preauth] Dec 26 00:13:55 host sshd[25895]: Failed password for invalid user user from 193.169.255.30 port 40628 ssh2 Dec 26 00:13:56 host sshd[25926]: Connection closed by 45.79.172.21 port 4214 [preauth] Dec 26 00:13:58 host sshd[25895]: pam_unix(sshd:auth): check pass; user unknown Dec 26 00:14:00 host sshd[25895]: Failed password for invalid user user from 193.169.255.30 port 40628 ssh2 Dec 26 00:15:49 host sshd[26737]: Bad protocol version identification '\026\003\001\002' from 183.136.225.42 port 20085 Dec 26 00:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 00:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 00:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 00:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 00:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 00:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 00:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 00:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 00:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 00:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 26 00:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 00:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 00:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 26 00:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 00:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 00:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 26 00:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 00:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 00:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 26 00:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 00:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 00:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 26 00:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 00:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 00:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 26 00:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 00:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 00:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 26 00:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 00:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 00:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 26 00:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 00:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 26 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=bonifacegroup user-2=wwwevmhonda user-3=wwwletsstalkfood user-4=straightcurve user-5=palco123 user-6=gifterman user-7=phmetals user-8=kottayamcalldriv user-9=wwwnexidigital user-10=mrsclean user-11=disposeat user-12=wwwkmaorg user-13=remysagr user-14=wwwkapin user-15=woodpeck user-16=vfmassets user-17=shalinijames user-18=wwwtestugo user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=wwwresourcehunte user-23=keralaholi user-24=wwwrmswll user-25=ugotscom user-26=cochintaxi user-27=wwwkaretakers user-28=a2zgroup user-29=dartsimp user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 26 00:21:46 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 26 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-U38w7uIhYU5HugOv.~ Dec 26 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-U38w7uIhYU5HugOv.~' Dec 26 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-U38w7uIhYU5HugOv.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 26 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 00:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 26 00:21:47 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 00:21:47 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 26 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 00:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 00:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 26 00:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 26 00:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 26 00:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 26 00:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 00:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 00:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 26 00:22:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 00:22:06 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 00:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 26 00:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 00:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 00:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 26 00:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 00:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 00:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 26 00:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 00:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 00:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 26 00:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 00:22:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 00:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 26 00:22:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 00:22:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 00:22:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 26 00:22:19 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 00:22:20 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 00:23:34 host sshd[28612]: User root from 41.197.31.178 not allowed because not listed in AllowUsers Dec 26 00:23:34 host sshd[28612]: input_userauth_request: invalid user root [preauth] Dec 26 00:23:35 host unix_chkpwd[28617]: password check failed for user (root) Dec 26 00:23:35 host sshd[28612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 user=root Dec 26 00:23:35 host sshd[28612]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 00:23:36 host sshd[28612]: Failed password for invalid user root from 41.197.31.178 port 32930 ssh2 Dec 26 00:23:37 host sshd[28612]: Connection closed by 41.197.31.178 port 32930 [preauth] Dec 26 00:48:56 host sshd[32104]: User root from 137.184.7.174 not allowed because not listed in AllowUsers Dec 26 00:48:56 host sshd[32104]: input_userauth_request: invalid user root [preauth] Dec 26 00:48:57 host unix_chkpwd[32107]: password check failed for user (root) Dec 26 00:48:57 host sshd[32104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.7.174 user=root Dec 26 00:48:57 host sshd[32104]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 00:48:58 host sshd[32104]: Failed password for invalid user root from 137.184.7.174 port 34162 ssh2 Dec 26 00:48:58 host sshd[32104]: Received disconnect from 137.184.7.174 port 34162:11: Bye Bye [preauth] Dec 26 00:48:58 host sshd[32104]: Disconnected from 137.184.7.174 port 34162 [preauth] Dec 26 00:49:24 host sshd[32156]: User root from 34.89.123.20 not allowed because not listed in AllowUsers Dec 26 00:49:24 host sshd[32156]: input_userauth_request: invalid user root [preauth] Dec 26 00:49:24 host unix_chkpwd[32159]: password check failed for user (root) Dec 26 00:49:24 host sshd[32156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.89.123.20 user=root Dec 26 00:49:24 host sshd[32156]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 00:49:25 host sshd[32156]: Failed password for invalid user root from 34.89.123.20 port 35926 ssh2 Dec 26 00:49:26 host sshd[32156]: Received disconnect from 34.89.123.20 port 35926:11: Bye Bye [preauth] Dec 26 00:49:26 host sshd[32156]: Disconnected from 34.89.123.20 port 35926 [preauth] Dec 26 00:50:43 host sshd[32539]: User root from 206.189.185.80 not allowed because not listed in AllowUsers Dec 26 00:50:43 host sshd[32539]: input_userauth_request: invalid user root [preauth] Dec 26 00:50:43 host unix_chkpwd[32544]: password check failed for user (root) Dec 26 00:50:43 host sshd[32539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.185.80 user=root Dec 26 00:50:43 host sshd[32539]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 00:50:45 host sshd[32539]: Failed password for invalid user root from 206.189.185.80 port 55896 ssh2 Dec 26 00:50:45 host sshd[32539]: Received disconnect from 206.189.185.80 port 55896:11: Bye Bye [preauth] Dec 26 00:50:45 host sshd[32539]: Disconnected from 206.189.185.80 port 55896 [preauth] Dec 26 00:51:43 host sshd[32735]: User root from 103.181.142.170 not allowed because not listed in AllowUsers Dec 26 00:51:43 host sshd[32735]: input_userauth_request: invalid user root [preauth] Dec 26 00:51:43 host unix_chkpwd[32738]: password check failed for user (root) Dec 26 00:51:43 host sshd[32735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.181.142.170 user=root Dec 26 00:51:43 host sshd[32735]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 00:51:45 host sshd[32735]: Failed password for invalid user root from 103.181.142.170 port 33272 ssh2 Dec 26 00:51:45 host sshd[32735]: Received disconnect from 103.181.142.170 port 33272:11: Bye Bye [preauth] Dec 26 00:51:45 host sshd[32735]: Disconnected from 103.181.142.170 port 33272 [preauth] Dec 26 00:52:27 host sshd[371]: User root from 137.184.7.174 not allowed because not listed in AllowUsers Dec 26 00:52:27 host sshd[371]: input_userauth_request: invalid user root [preauth] Dec 26 00:52:27 host unix_chkpwd[374]: password check failed for user (root) Dec 26 00:52:27 host sshd[371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.7.174 user=root Dec 26 00:52:27 host sshd[371]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 00:52:29 host sshd[371]: Failed password for invalid user root from 137.184.7.174 port 34586 ssh2 Dec 26 00:52:29 host sshd[371]: Received disconnect from 137.184.7.174 port 34586:11: Bye Bye [preauth] Dec 26 00:52:29 host sshd[371]: Disconnected from 137.184.7.174 port 34586 [preauth] Dec 26 00:52:34 host sshd[424]: User root from 206.189.185.80 not allowed because not listed in AllowUsers Dec 26 00:52:34 host sshd[424]: input_userauth_request: invalid user root [preauth] Dec 26 00:52:34 host unix_chkpwd[430]: password check failed for user (root) Dec 26 00:52:34 host sshd[424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.185.80 user=root Dec 26 00:52:34 host sshd[424]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 00:52:36 host sshd[424]: Failed password for invalid user root from 206.189.185.80 port 33306 ssh2 Dec 26 00:53:14 host sshd[625]: User root from 34.89.123.20 not allowed because not listed in AllowUsers Dec 26 00:53:14 host sshd[625]: input_userauth_request: invalid user root [preauth] Dec 26 00:53:14 host unix_chkpwd[630]: password check failed for user (root) Dec 26 00:53:14 host sshd[625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.89.123.20 user=root Dec 26 00:53:14 host sshd[625]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 00:53:16 host sshd[625]: Failed password for invalid user root from 34.89.123.20 port 51758 ssh2 Dec 26 00:53:49 host sshd[756]: User root from 128.1.32.109 not allowed because not listed in AllowUsers Dec 26 00:53:49 host sshd[756]: input_userauth_request: invalid user root [preauth] Dec 26 00:53:49 host unix_chkpwd[761]: password check failed for user (root) Dec 26 00:53:49 host sshd[756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.1.32.109 user=root Dec 26 00:53:49 host sshd[756]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 00:53:51 host sshd[756]: Failed password for invalid user root from 128.1.32.109 port 53064 ssh2 Dec 26 00:53:51 host sshd[756]: Received disconnect from 128.1.32.109 port 53064:11: Bye Bye [preauth] Dec 26 00:53:51 host sshd[756]: Disconnected from 128.1.32.109 port 53064 [preauth] Dec 26 00:53:56 host sshd[782]: User root from 103.181.142.170 not allowed because not listed in AllowUsers Dec 26 00:53:56 host sshd[782]: input_userauth_request: invalid user root [preauth] Dec 26 00:53:56 host unix_chkpwd[785]: password check failed for user (root) Dec 26 00:53:56 host sshd[782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.181.142.170 user=root Dec 26 00:53:56 host sshd[782]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 00:53:59 host sshd[782]: Failed password for invalid user root from 103.181.142.170 port 35560 ssh2 Dec 26 00:53:59 host sshd[782]: Received disconnect from 103.181.142.170 port 35560:11: Bye Bye [preauth] Dec 26 00:53:59 host sshd[782]: Disconnected from 103.181.142.170 port 35560 [preauth] Dec 26 00:56:42 host sshd[1329]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Dec 26 00:56:42 host sshd[1329]: input_userauth_request: invalid user root [preauth] Dec 26 00:56:42 host unix_chkpwd[1332]: password check failed for user (root) Dec 26 00:56:42 host sshd[1329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Dec 26 00:56:42 host sshd[1329]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 00:56:44 host sshd[1329]: Failed password for invalid user root from 162.218.126.136 port 36680 ssh2 Dec 26 00:56:44 host sshd[1329]: Connection closed by 162.218.126.136 port 36680 [preauth] Dec 26 00:57:05 host sshd[1373]: User root from 128.1.32.109 not allowed because not listed in AllowUsers Dec 26 00:57:05 host sshd[1373]: input_userauth_request: invalid user root [preauth] Dec 26 00:57:05 host unix_chkpwd[1382]: password check failed for user (root) Dec 26 00:57:05 host sshd[1373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.1.32.109 user=root Dec 26 00:57:05 host sshd[1373]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 00:57:07 host sshd[1373]: Failed password for invalid user root from 128.1.32.109 port 55768 ssh2 Dec 26 00:57:07 host sshd[1373]: Received disconnect from 128.1.32.109 port 55768:11: Bye Bye [preauth] Dec 26 00:57:07 host sshd[1373]: Disconnected from 128.1.32.109 port 55768 [preauth] Dec 26 01:06:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 01:06:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 01:06:05 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 01:06:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean Mime list_redirects --output=json Dec 26 01:06:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 01:06:05 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 01:10:27 host sshd[3509]: Invalid user user from 84.110.99.202 port 59026 Dec 26 01:10:27 host sshd[3509]: input_userauth_request: invalid user user [preauth] Dec 26 01:10:27 host sshd[3509]: pam_unix(sshd:auth): check pass; user unknown Dec 26 01:10:27 host sshd[3509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.110.99.202 Dec 26 01:10:29 host sshd[3509]: Failed password for invalid user user from 84.110.99.202 port 59026 ssh2 Dec 26 01:10:29 host sshd[3509]: Connection closed by 84.110.99.202 port 59026 [preauth] Dec 26 01:16:25 host sshd[4280]: User root from 103.13.40.2 not allowed because not listed in AllowUsers Dec 26 01:16:25 host sshd[4280]: input_userauth_request: invalid user root [preauth] Dec 26 01:16:25 host unix_chkpwd[4282]: password check failed for user (root) Dec 26 01:16:25 host sshd[4280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 user=root Dec 26 01:16:25 host sshd[4280]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 01:16:27 host sshd[4280]: Failed password for invalid user root from 103.13.40.2 port 52302 ssh2 Dec 26 01:16:27 host sshd[4280]: Connection closed by 103.13.40.2 port 52302 [preauth] Dec 26 01:18:03 host sshd[4494]: Did not receive identification string from 104.244.72.8 port 59268 Dec 26 01:18:36 host sshd[4591]: Invalid user ct from 45.93.201.90 port 47432 Dec 26 01:18:36 host sshd[4591]: input_userauth_request: invalid user ct [preauth] Dec 26 01:18:36 host sshd[4591]: pam_unix(sshd:auth): check pass; user unknown Dec 26 01:18:36 host sshd[4591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 26 01:18:37 host sshd[4591]: Failed password for invalid user ct from 45.93.201.90 port 47432 ssh2 Dec 26 01:18:39 host sshd[4584]: Invalid user 67.205.144.117 from 104.244.72.8 port 37802 Dec 26 01:18:39 host sshd[4584]: input_userauth_request: invalid user 67.205.144.117 [preauth] Dec 26 01:18:39 host sshd[4584]: pam_unix(sshd:auth): check pass; user unknown Dec 26 01:18:39 host sshd[4584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.72.8 Dec 26 01:18:40 host sshd[4584]: Failed password for invalid user 67.205.144.117 from 104.244.72.8 port 37802 ssh2 Dec 26 01:18:40 host sshd[4591]: pam_unix(sshd:auth): check pass; user unknown Dec 26 01:18:41 host sshd[4584]: Received disconnect from 104.244.72.8 port 37802:11: Normal Shutdown, Thank you for playing [preauth] Dec 26 01:18:41 host sshd[4584]: Disconnected from 104.244.72.8 port 37802 [preauth] Dec 26 01:18:43 host sshd[4591]: Failed password for invalid user ct from 45.93.201.90 port 47432 ssh2 Dec 26 01:18:46 host sshd[4591]: pam_unix(sshd:auth): check pass; user unknown Dec 26 01:18:48 host sshd[4591]: Failed password for invalid user ct from 45.93.201.90 port 47432 ssh2 Dec 26 01:18:51 host sshd[4591]: Connection closed by 45.93.201.90 port 47432 [preauth] Dec 26 01:18:51 host sshd[4591]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 26 01:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 01:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 01:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 01:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 01:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 01:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 01:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 01:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 01:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 01:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 26 01:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 01:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 01:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 26 01:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 01:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 01:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 26 01:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 01:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 01:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 26 01:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 01:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 01:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 26 01:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 01:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 01:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 26 01:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 01:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 01:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 26 01:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 01:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 01:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 26 01:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 01:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 01:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 01:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 26 01:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 01:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 01:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=phmetals user-2=kottayamcalldriv user-3=gifterman user-4=palco123 user-5=wwwnexidigital user-6=mrsclean user-7=wwwevmhonda user-8=bonifacegroup user-9=wwwletsstalkfood user-10=straightcurve user-11=wwwtestugo user-12=shalinijames user-13=vfmassets user-14=pmcresources user-15=disposeat user-16=remysagr user-17=wwwkmaorg user-18=woodpeck user-19=wwwkapin user-20=travelboniface user-21=ugotscom user-22=wwwrmswll user-23=wwwresourcehunte user-24=keralaholi user-25=wwwpmcresource user-26=dartsimp user-27=a2zgroup user-28=laundryboniface user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 26 01:21:47 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 26 01:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 01:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 01:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 01:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 01:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 01:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Sw5fLQAaVwhFiLaP.~ Dec 26 01:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 01:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 01:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Sw5fLQAaVwhFiLaP.~' Dec 26 01:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 01:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 01:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Sw5fLQAaVwhFiLaP.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 01:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 01:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 01:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 26 01:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 01:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 01:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 26 01:21:47 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 01:21:47 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 26 01:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 01:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 01:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 26 01:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 26 01:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 26 01:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 26 01:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 01:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 26 01:21:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 01:21:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 26 01:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 01:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 01:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 26 01:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 01:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 01:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 26 01:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 01:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 01:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 26 01:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 01:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 26 01:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 01:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 01:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 26 01:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 01:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 01:30:55 host sshd[6576]: User root from 209.141.55.27 not allowed because not listed in AllowUsers Dec 26 01:30:55 host sshd[6576]: input_userauth_request: invalid user root [preauth] Dec 26 01:30:55 host unix_chkpwd[6580]: password check failed for user (root) Dec 26 01:30:55 host sshd[6576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.55.27 user=root Dec 26 01:30:55 host sshd[6576]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 01:30:57 host sshd[6576]: Failed password for invalid user root from 209.141.55.27 port 52658 ssh2 Dec 26 01:30:57 host sshd[6576]: Received disconnect from 209.141.55.27 port 52658:11: Normal Shutdown, Thank you for playing [preauth] Dec 26 01:30:57 host sshd[6576]: Disconnected from 209.141.55.27 port 52658 [preauth] Dec 26 01:32:31 host sshd[6768]: Invalid user admin from 106.10.122.53 port 60378 Dec 26 01:32:31 host sshd[6768]: input_userauth_request: invalid user admin [preauth] Dec 26 01:32:32 host sshd[6768]: pam_unix(sshd:auth): check pass; user unknown Dec 26 01:32:32 host sshd[6768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 26 01:32:34 host sshd[6768]: Failed password for invalid user admin from 106.10.122.53 port 60378 ssh2 Dec 26 01:32:34 host sshd[6768]: Connection closed by 106.10.122.53 port 60378 [preauth] Dec 26 01:46:08 host sshd[8911]: User root from 103.83.5.42 not allowed because not listed in AllowUsers Dec 26 01:46:08 host sshd[8911]: input_userauth_request: invalid user root [preauth] Dec 26 01:46:08 host unix_chkpwd[8916]: password check failed for user (root) Dec 26 01:46:08 host sshd[8911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.83.5.42 user=root Dec 26 01:46:08 host sshd[8911]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 01:46:10 host sshd[8911]: Failed password for invalid user root from 103.83.5.42 port 43862 ssh2 Dec 26 01:46:11 host sshd[8911]: Received disconnect from 103.83.5.42 port 43862:11: Bye Bye [preauth] Dec 26 01:46:11 host sshd[8911]: Disconnected from 103.83.5.42 port 43862 [preauth] Dec 26 01:47:03 host sshd[9115]: User root from 190.104.25.217 not allowed because not listed in AllowUsers Dec 26 01:47:03 host sshd[9115]: input_userauth_request: invalid user root [preauth] Dec 26 01:47:03 host unix_chkpwd[9122]: password check failed for user (root) Dec 26 01:47:03 host sshd[9115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.104.25.217 user=root Dec 26 01:47:03 host sshd[9115]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 01:47:06 host sshd[9115]: Failed password for invalid user root from 190.104.25.217 port 40816 ssh2 Dec 26 01:47:06 host sshd[9115]: Received disconnect from 190.104.25.217 port 40816:11: Bye Bye [preauth] Dec 26 01:47:06 host sshd[9115]: Disconnected from 190.104.25.217 port 40816 [preauth] Dec 26 01:47:47 host sshd[9197]: User root from 38.65.156.234 not allowed because not listed in AllowUsers Dec 26 01:47:47 host sshd[9197]: input_userauth_request: invalid user root [preauth] Dec 26 01:47:47 host unix_chkpwd[9200]: password check failed for user (root) Dec 26 01:47:47 host sshd[9197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.65.156.234 user=root Dec 26 01:47:47 host sshd[9197]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 01:47:49 host sshd[9197]: Failed password for invalid user root from 38.65.156.234 port 54806 ssh2 Dec 26 01:47:50 host sshd[9197]: Received disconnect from 38.65.156.234 port 54806:11: Bye Bye [preauth] Dec 26 01:47:50 host sshd[9197]: Disconnected from 38.65.156.234 port 54806 [preauth] Dec 26 01:48:59 host sshd[9317]: User root from 159.65.132.217 not allowed because not listed in AllowUsers Dec 26 01:48:59 host sshd[9317]: input_userauth_request: invalid user root [preauth] Dec 26 01:48:59 host unix_chkpwd[9319]: password check failed for user (root) Dec 26 01:48:59 host sshd[9317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.132.217 user=root Dec 26 01:48:59 host sshd[9317]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 01:49:01 host sshd[9317]: Failed password for invalid user root from 159.65.132.217 port 37196 ssh2 Dec 26 01:49:01 host sshd[9317]: Received disconnect from 159.65.132.217 port 37196:11: Bye Bye [preauth] Dec 26 01:49:01 host sshd[9317]: Disconnected from 159.65.132.217 port 37196 [preauth] Dec 26 01:49:45 host sshd[9400]: User root from 43.153.72.184 not allowed because not listed in AllowUsers Dec 26 01:49:45 host sshd[9400]: input_userauth_request: invalid user root [preauth] Dec 26 01:49:45 host unix_chkpwd[9403]: password check failed for user (root) Dec 26 01:49:45 host sshd[9400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.72.184 user=root Dec 26 01:49:45 host sshd[9400]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 01:49:48 host sshd[9400]: Failed password for invalid user root from 43.153.72.184 port 35498 ssh2 Dec 26 01:49:48 host sshd[9400]: Received disconnect from 43.153.72.184 port 35498:11: Bye Bye [preauth] Dec 26 01:49:48 host sshd[9400]: Disconnected from 43.153.72.184 port 35498 [preauth] Dec 26 01:49:57 host sshd[9414]: User root from 134.209.211.170 not allowed because not listed in AllowUsers Dec 26 01:49:57 host sshd[9414]: input_userauth_request: invalid user root [preauth] Dec 26 01:49:57 host unix_chkpwd[9419]: password check failed for user (root) Dec 26 01:49:57 host sshd[9414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.211.170 user=root Dec 26 01:49:57 host sshd[9414]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 01:50:00 host sshd[9414]: Failed password for invalid user root from 134.209.211.170 port 50296 ssh2 Dec 26 01:50:00 host sshd[9414]: Received disconnect from 134.209.211.170 port 50296:11: Bye Bye [preauth] Dec 26 01:50:00 host sshd[9414]: Disconnected from 134.209.211.170 port 50296 [preauth] Dec 26 01:50:21 host sshd[9484]: User root from 222.107.156.227 not allowed because not listed in AllowUsers Dec 26 01:50:21 host sshd[9484]: input_userauth_request: invalid user root [preauth] Dec 26 01:50:21 host unix_chkpwd[9489]: password check failed for user (root) Dec 26 01:50:21 host sshd[9484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.107.156.227 user=root Dec 26 01:50:21 host sshd[9484]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 01:50:24 host sshd[9484]: Failed password for invalid user root from 222.107.156.227 port 23038 ssh2 Dec 26 01:50:24 host sshd[9484]: Received disconnect from 222.107.156.227 port 23038:11: Bye Bye [preauth] Dec 26 01:50:24 host sshd[9484]: Disconnected from 222.107.156.227 port 23038 [preauth] Dec 26 01:50:47 host sshd[9548]: User root from 92.46.108.20 not allowed because not listed in AllowUsers Dec 26 01:50:47 host sshd[9548]: input_userauth_request: invalid user root [preauth] Dec 26 01:50:47 host unix_chkpwd[9551]: password check failed for user (root) Dec 26 01:50:47 host sshd[9548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 user=root Dec 26 01:50:47 host sshd[9548]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 01:50:49 host sshd[9548]: Failed password for invalid user root from 92.46.108.20 port 54040 ssh2 Dec 26 01:50:49 host sshd[9548]: Connection closed by 92.46.108.20 port 54040 [preauth] Dec 26 01:51:13 host sshd[9590]: User root from 43.153.72.184 not allowed because not listed in AllowUsers Dec 26 01:51:13 host sshd[9590]: input_userauth_request: invalid user root [preauth] Dec 26 01:51:13 host unix_chkpwd[9593]: password check failed for user (root) Dec 26 01:51:13 host sshd[9590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.72.184 user=root Dec 26 01:51:13 host sshd[9590]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 01:51:15 host sshd[9590]: Failed password for invalid user root from 43.153.72.184 port 45286 ssh2 Dec 26 01:51:15 host sshd[9590]: Received disconnect from 43.153.72.184 port 45286:11: Bye Bye [preauth] Dec 26 01:51:15 host sshd[9590]: Disconnected from 43.153.72.184 port 45286 [preauth] Dec 26 01:51:25 host sshd[9742]: User root from 134.209.211.170 not allowed because not listed in AllowUsers Dec 26 01:51:25 host sshd[9742]: input_userauth_request: invalid user root [preauth] Dec 26 01:51:25 host unix_chkpwd[9766]: password check failed for user (root) Dec 26 01:51:25 host sshd[9742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.211.170 user=root Dec 26 01:51:25 host sshd[9742]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 01:51:27 host sshd[9742]: Failed password for invalid user root from 134.209.211.170 port 48694 ssh2 Dec 26 01:52:12 host sshd[9865]: User root from 222.107.156.227 not allowed because not listed in AllowUsers Dec 26 01:52:12 host sshd[9865]: input_userauth_request: invalid user root [preauth] Dec 26 01:52:12 host unix_chkpwd[9871]: password check failed for user (root) Dec 26 01:52:12 host sshd[9865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.107.156.227 user=root Dec 26 01:52:12 host sshd[9865]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 01:52:14 host sshd[9865]: Failed password for invalid user root from 222.107.156.227 port 37094 ssh2 Dec 26 01:52:15 host sshd[9865]: Received disconnect from 222.107.156.227 port 37094:11: Bye Bye [preauth] Dec 26 01:52:15 host sshd[9865]: Disconnected from 222.107.156.227 port 37094 [preauth] Dec 26 01:52:30 host sshd[9952]: User root from 103.83.5.42 not allowed because not listed in AllowUsers Dec 26 01:52:30 host sshd[9952]: input_userauth_request: invalid user root [preauth] Dec 26 01:52:30 host unix_chkpwd[9955]: password check failed for user (root) Dec 26 01:52:30 host sshd[9952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.83.5.42 user=root Dec 26 01:52:30 host sshd[9952]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 01:52:32 host sshd[9952]: Failed password for invalid user root from 103.83.5.42 port 45704 ssh2 Dec 26 01:52:32 host sshd[9952]: Received disconnect from 103.83.5.42 port 45704:11: Bye Bye [preauth] Dec 26 01:52:32 host sshd[9952]: Disconnected from 103.83.5.42 port 45704 [preauth] Dec 26 01:53:01 host sshd[10035]: User root from 38.65.156.234 not allowed because not listed in AllowUsers Dec 26 01:53:01 host sshd[10035]: input_userauth_request: invalid user root [preauth] Dec 26 01:53:01 host unix_chkpwd[10049]: password check failed for user (root) Dec 26 01:53:01 host sshd[10035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.65.156.234 user=root Dec 26 01:53:01 host sshd[10035]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 01:53:03 host sshd[10035]: Failed password for invalid user root from 38.65.156.234 port 49890 ssh2 Dec 26 01:53:04 host sshd[10069]: User root from 190.104.25.217 not allowed because not listed in AllowUsers Dec 26 01:53:04 host sshd[10069]: input_userauth_request: invalid user root [preauth] Dec 26 01:53:04 host unix_chkpwd[10087]: password check failed for user (root) Dec 26 01:53:04 host sshd[10069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.104.25.217 user=root Dec 26 01:53:04 host sshd[10069]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 01:53:06 host sshd[10069]: Failed password for invalid user root from 190.104.25.217 port 38200 ssh2 Dec 26 01:53:06 host sshd[10069]: Received disconnect from 190.104.25.217 port 38200:11: Bye Bye [preauth] Dec 26 01:53:06 host sshd[10069]: Disconnected from 190.104.25.217 port 38200 [preauth] Dec 26 01:53:44 host sshd[10189]: User root from 159.65.132.217 not allowed because not listed in AllowUsers Dec 26 01:53:44 host sshd[10189]: input_userauth_request: invalid user root [preauth] Dec 26 01:53:44 host unix_chkpwd[10191]: password check failed for user (root) Dec 26 01:53:44 host sshd[10189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.132.217 user=root Dec 26 01:53:44 host sshd[10189]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 01:53:46 host sshd[10189]: Failed password for invalid user root from 159.65.132.217 port 52734 ssh2 Dec 26 01:53:46 host sshd[10189]: Received disconnect from 159.65.132.217 port 52734:11: Bye Bye [preauth] Dec 26 01:53:46 host sshd[10189]: Disconnected from 159.65.132.217 port 52734 [preauth] Dec 26 02:09:57 host sshd[12722]: Invalid user samba from 162.218.126.136 port 56426 Dec 26 02:09:57 host sshd[12722]: input_userauth_request: invalid user samba [preauth] Dec 26 02:09:57 host sshd[12722]: pam_unix(sshd:auth): check pass; user unknown Dec 26 02:09:57 host sshd[12722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 26 02:09:59 host sshd[12722]: Failed password for invalid user samba from 162.218.126.136 port 56426 ssh2 Dec 26 02:09:59 host sshd[12722]: Connection closed by 162.218.126.136 port 56426 [preauth] Dec 26 02:14:34 host sshd[13322]: User root from 54.38.146.63 not allowed because not listed in AllowUsers Dec 26 02:14:34 host sshd[13322]: input_userauth_request: invalid user root [preauth] Dec 26 02:14:34 host unix_chkpwd[13324]: password check failed for user (root) Dec 26 02:14:34 host sshd[13322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.146.63 user=root Dec 26 02:14:34 host sshd[13322]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 02:14:36 host sshd[13322]: Failed password for invalid user root from 54.38.146.63 port 59378 ssh2 Dec 26 02:14:37 host sshd[13322]: Received disconnect from 54.38.146.63 port 59378:11: Bye Bye [preauth] Dec 26 02:14:37 host sshd[13322]: Disconnected from 54.38.146.63 port 59378 [preauth] Dec 26 02:14:38 host sshd[13331]: User root from 128.199.197.21 not allowed because not listed in AllowUsers Dec 26 02:14:38 host sshd[13331]: input_userauth_request: invalid user root [preauth] Dec 26 02:14:38 host unix_chkpwd[13333]: password check failed for user (root) Dec 26 02:14:38 host sshd[13331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.197.21 user=root Dec 26 02:14:38 host sshd[13331]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 02:14:38 host sshd[13328]: User root from 112.186.86.93 not allowed because not listed in AllowUsers Dec 26 02:14:38 host sshd[13328]: input_userauth_request: invalid user root [preauth] Dec 26 02:14:38 host unix_chkpwd[13335]: password check failed for user (root) Dec 26 02:14:38 host sshd[13328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.186.86.93 user=root Dec 26 02:14:38 host sshd[13328]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 02:14:39 host sshd[13331]: Failed password for invalid user root from 128.199.197.21 port 50242 ssh2 Dec 26 02:14:39 host sshd[13331]: Received disconnect from 128.199.197.21 port 50242:11: Bye Bye [preauth] Dec 26 02:14:39 host sshd[13331]: Disconnected from 128.199.197.21 port 50242 [preauth] Dec 26 02:14:39 host sshd[13328]: Failed password for invalid user root from 112.186.86.93 port 33959 ssh2 Dec 26 02:14:40 host sshd[13328]: Received disconnect from 112.186.86.93 port 33959:11: Bye Bye [preauth] Dec 26 02:14:40 host sshd[13328]: Disconnected from 112.186.86.93 port 33959 [preauth] Dec 26 02:15:17 host sshd[13515]: User root from 67.164.27.145 not allowed because not listed in AllowUsers Dec 26 02:15:17 host sshd[13515]: input_userauth_request: invalid user root [preauth] Dec 26 02:15:17 host unix_chkpwd[13519]: password check failed for user (root) Dec 26 02:15:17 host sshd[13515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.164.27.145 user=root Dec 26 02:15:17 host sshd[13515]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 02:15:19 host sshd[13515]: Failed password for invalid user root from 67.164.27.145 port 49282 ssh2 Dec 26 02:15:19 host sshd[13515]: Received disconnect from 67.164.27.145 port 49282:11: Bye Bye [preauth] Dec 26 02:15:19 host sshd[13515]: Disconnected from 67.164.27.145 port 49282 [preauth] Dec 26 02:16:13 host sshd[13637]: User root from 184.168.123.187 not allowed because not listed in AllowUsers Dec 26 02:16:13 host sshd[13637]: input_userauth_request: invalid user root [preauth] Dec 26 02:16:13 host unix_chkpwd[13640]: password check failed for user (root) Dec 26 02:16:13 host sshd[13637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.168.123.187 user=root Dec 26 02:16:13 host sshd[13637]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 02:16:16 host sshd[13637]: Failed password for invalid user root from 184.168.123.187 port 42844 ssh2 Dec 26 02:16:16 host sshd[13637]: Received disconnect from 184.168.123.187 port 42844:11: Bye Bye [preauth] Dec 26 02:16:16 host sshd[13637]: Disconnected from 184.168.123.187 port 42844 [preauth] Dec 26 02:16:21 host sshd[13647]: Invalid user user from 41.197.31.178 port 47686 Dec 26 02:16:21 host sshd[13647]: input_userauth_request: invalid user user [preauth] Dec 26 02:16:22 host sshd[13647]: pam_unix(sshd:auth): check pass; user unknown Dec 26 02:16:22 host sshd[13647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 26 02:16:23 host sshd[13647]: Failed password for invalid user user from 41.197.31.178 port 47686 ssh2 Dec 26 02:16:23 host sshd[13647]: Connection closed by 41.197.31.178 port 47686 [preauth] Dec 26 02:17:14 host sshd[13756]: User root from 54.38.146.63 not allowed because not listed in AllowUsers Dec 26 02:17:14 host sshd[13756]: input_userauth_request: invalid user root [preauth] Dec 26 02:17:14 host unix_chkpwd[13759]: password check failed for user (root) Dec 26 02:17:14 host sshd[13756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.146.63 user=root Dec 26 02:17:14 host sshd[13756]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 02:17:17 host sshd[13756]: Failed password for invalid user root from 54.38.146.63 port 41952 ssh2 Dec 26 02:17:17 host sshd[13756]: Received disconnect from 54.38.146.63 port 41952:11: Bye Bye [preauth] Dec 26 02:17:17 host sshd[13756]: Disconnected from 54.38.146.63 port 41952 [preauth] Dec 26 02:17:30 host sshd[13827]: User root from 67.164.27.145 not allowed because not listed in AllowUsers Dec 26 02:17:30 host sshd[13827]: input_userauth_request: invalid user root [preauth] Dec 26 02:17:30 host unix_chkpwd[13831]: password check failed for user (root) Dec 26 02:17:30 host sshd[13827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.164.27.145 user=root Dec 26 02:17:30 host sshd[13827]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 02:17:31 host sshd[13827]: Failed password for invalid user root from 67.164.27.145 port 40064 ssh2 Dec 26 02:17:32 host sshd[13827]: Received disconnect from 67.164.27.145 port 40064:11: Bye Bye [preauth] Dec 26 02:17:32 host sshd[13827]: Disconnected from 67.164.27.145 port 40064 [preauth] Dec 26 02:18:06 host sshd[13926]: User root from 112.186.86.93 not allowed because not listed in AllowUsers Dec 26 02:18:06 host sshd[13926]: input_userauth_request: invalid user root [preauth] Dec 26 02:18:06 host unix_chkpwd[13930]: password check failed for user (root) Dec 26 02:18:06 host sshd[13926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.186.86.93 user=root Dec 26 02:18:06 host sshd[13926]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 02:18:09 host sshd[13926]: Failed password for invalid user root from 112.186.86.93 port 24084 ssh2 Dec 26 02:18:19 host sshd[13982]: User root from 184.168.123.187 not allowed because not listed in AllowUsers Dec 26 02:18:19 host sshd[13982]: input_userauth_request: invalid user root [preauth] Dec 26 02:18:20 host unix_chkpwd[13985]: password check failed for user (root) Dec 26 02:18:20 host sshd[13982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.168.123.187 user=root Dec 26 02:18:20 host sshd[13982]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 02:18:21 host sshd[13982]: Failed password for invalid user root from 184.168.123.187 port 46900 ssh2 Dec 26 02:18:21 host sshd[13982]: Received disconnect from 184.168.123.187 port 46900:11: Bye Bye [preauth] Dec 26 02:18:21 host sshd[13982]: Disconnected from 184.168.123.187 port 46900 [preauth] Dec 26 02:19:31 host sshd[14181]: User root from 128.199.197.21 not allowed because not listed in AllowUsers Dec 26 02:19:31 host sshd[14181]: input_userauth_request: invalid user root [preauth] Dec 26 02:19:32 host unix_chkpwd[14183]: password check failed for user (root) Dec 26 02:19:32 host sshd[14181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.197.21 user=root Dec 26 02:19:32 host sshd[14181]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 02:19:33 host sshd[14181]: Failed password for invalid user root from 128.199.197.21 port 37710 ssh2 Dec 26 02:20:10 host sshd[14399]: User root from 104.243.23.43 not allowed because not listed in AllowUsers Dec 26 02:20:10 host sshd[14399]: input_userauth_request: invalid user root [preauth] Dec 26 02:20:10 host unix_chkpwd[14402]: password check failed for user (root) Dec 26 02:20:10 host sshd[14399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.243.23.43 user=root Dec 26 02:20:10 host sshd[14399]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 02:20:12 host sshd[14399]: Failed password for invalid user root from 104.243.23.43 port 56358 ssh2 Dec 26 02:20:13 host sshd[14399]: Received disconnect from 104.243.23.43 port 56358:11: Bye Bye [preauth] Dec 26 02:20:13 host sshd[14399]: Disconnected from 104.243.23.43 port 56358 [preauth] Dec 26 02:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 02:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 02:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:21:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 02:21:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:21:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 26 02:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 26 02:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 26 02:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 26 02:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 26 02:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 26 02:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 26 02:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 26 02:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 02:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 26 02:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=wwwrmswll user-3=keralaholi user-4=wwwresourcehunte user-5=ugotscom user-6=travelboniface user-7=cochintaxi user-8=wwwkaretakers user-9=laundryboniface user-10=dartsimp user-11=a2zgroup user-12=straightcurve user-13=wwwletsstalkfood user-14=bonifacegroup user-15=wwwevmhonda user-16=wwwnexidigital user-17=mrsclean user-18=gifterman user-19=palco123 user-20=kottayamcalldriv user-21=phmetals user-22=woodpeck user-23=wwwkapin user-24=remysagr user-25=disposeat user-26=wwwkmaorg user-27=pmcresources user-28=vfmassets user-29=wwwtestugo user-30=shalinijames feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 26 02:21:47 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 26 02:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 02:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-BDutXLQ2QNZVsGZa.~ Dec 26 02:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-BDutXLQ2QNZVsGZa.~' Dec 26 02:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-BDutXLQ2QNZVsGZa.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 02:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 26 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 26 02:21:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:21:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 26 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 02:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 26 02:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 26 02:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 26 02:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 26 02:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 02:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 26 02:21:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 02:22:05 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 02:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 26 02:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 26 02:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 26 02:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:22:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:22:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 26 02:22:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:22:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:22:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 26 02:22:22 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:22:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:22:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 26 02:22:24 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 02:22:25 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 02:24:55 host sshd[15204]: User root from 104.243.23.43 not allowed because not listed in AllowUsers Dec 26 02:24:55 host sshd[15204]: input_userauth_request: invalid user root [preauth] Dec 26 02:24:55 host unix_chkpwd[15244]: password check failed for user (root) Dec 26 02:24:55 host sshd[15204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.243.23.43 user=root Dec 26 02:24:55 host sshd[15204]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 02:24:57 host sshd[15204]: Failed password for invalid user root from 104.243.23.43 port 46946 ssh2 Dec 26 02:24:57 host sshd[15204]: Received disconnect from 104.243.23.43 port 46946:11: Bye Bye [preauth] Dec 26 02:24:57 host sshd[15204]: Disconnected from 104.243.23.43 port 46946 [preauth] Dec 26 02:29:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 02:29:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:29:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:29:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 02:29:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:29:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:29:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 02:29:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:29:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:29:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 26 02:29:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:29:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:29:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 02:29:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:29:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:29:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=a2zgroup user-3=dartsimp user-4=wwwkaretakers user-5=cochintaxi user-6=keralaholi user-7=wwwresourcehunte user-8=wwwrmswll user-9=ugotscom user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=vfmassets user-14=shalinijames user-15=wwwtestugo user-16=woodpeck user-17=wwwkapin user-18=wwwkmaorg user-19=disposeat user-20=remysagr user-21=wwwnexidigital user-22=mrsclean user-23=palco123 user-24=gifterman user-25=phmetals user-26=kottayamcalldriv user-27=straightcurve user-28=wwwletsstalkfood user-29=bonifacegroup user-30=wwwevmhonda feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 26 02:29:45 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 26 02:29:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:29:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:29:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwevmhonda --output=json Dec 26 02:29:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:29:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:29:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color instance info --format=json --check-updates=true Dec 26 02:29:45 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 26 02:30:05 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 26 02:30:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 26 02:30:05 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 26 02:30:06 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 26 02:30:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 26 02:30:06 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 26 02:30:19 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 26 02:30:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 26 02:30:19 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 26 02:30:19 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 26 02:30:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwevmhonda LangPHP php_get_vhost_versions --output=json Dec 26 02:30:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:30:19 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:30:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 package_manager_get_package_info package-0=ea-php72 --output=json Dec 26 02:30:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:30:20 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:30:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color instance login-url --skip-plugins=false --format=json Dec 26 02:30:20 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 26 02:30:21 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 26 02:30:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwletsstalkfood --output=json Dec 26 02:30:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:30:21 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:30:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color instance info --format=json --check-updates=true Dec 26 02:30:21 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 02:30:37 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 02:30:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 26 02:30:37 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 02:30:39 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 02:30:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 26 02:30:39 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 02:30:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 02:30:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 26 02:30:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 02:30:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 02:30:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood LangPHP php_get_vhost_versions --output=json Dec 26 02:30:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:30:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:30:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color instance login-url --skip-plugins=false --format=json Dec 26 02:30:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 02:30:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 02:30:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DomainInfo single_domain_data domain=letsstalkfood.com return_https_redirect_status=1 --output=json Dec 26 02:30:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:30:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:30:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_vhost_ssl_components --output=json Dec 26 02:30:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:30:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:30:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_ssl_vhosts --output=json Dec 26 02:30:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:30:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:30:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood Mime list_redirects --output=json Dec 26 02:30:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:30:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:30:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 26 02:30:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 02:30:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 02:30:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 26 02:30:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 02:30:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 02:30:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 26 02:30:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 02:31:03 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 02:31:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 26 02:31:03 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 02:31:28 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 02:31:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/wp-config.php Dec 26 02:31:28 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 02:31:28 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 02:31:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:31:28 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 02:31:28 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 02:31:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/.maintenance Dec 26 02:31:28 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 02:31:28 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 02:31:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color db-prefix get Dec 26 02:31:28 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 02:31:28 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 02:31:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color db-prefix get Dec 26 02:31:28 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 02:31:29 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 02:31:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DirectoryPrivacy is_directory_protected dir=/home/wwwletsstalkfood/public_html --output=json Dec 26 02:31:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:31:29 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:31:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:31:29 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 02:31:29 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 02:31:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 26 02:31:29 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 02:31:30 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 02:31:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 26 02:31:30 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 02:31:30 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 02:31:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 26 02:31:30 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 02:31:32 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 02:31:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 26 02:31:32 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 02:31:32 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 02:31:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color admin-username is-secure Dec 26 02:31:32 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 02:31:33 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 02:31:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:31:33 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 02:31:33 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 02:31:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/wp-config.php Dec 26 02:31:33 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 02:31:33 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 02:31:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/stat -c %a /home/wwwletsstalkfood/public_html/wp-config.php Dec 26 02:31:33 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 02:31:33 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 02:31:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color pingbacks is_disabled Dec 26 02:31:33 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 02:31:34 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 02:31:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:31:34 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 02:31:34 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 02:31:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color security-keys are_keys_correct Dec 26 02:31:34 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 02:31:35 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 02:31:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=mrsclean --output=json Dec 26 02:31:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:31:35 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:31:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/backup --no-color instance info --format=json --check-updates=true Dec 26 02:31:35 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 26 02:31:35 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 26 02:31:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean DomainInfo single_domain_data domain=mrsclean.co.in return_https_redirect_status=1 --output=json Dec 26 02:31:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:31:35 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:31:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean Mime list_redirects --output=json Dec 26 02:31:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:31:35 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:31:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/public_html/backup/wp-includes/version.php Dec 26 02:31:35 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 26 02:31:35 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 26 02:31:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/public_html/backup/wp-includes/version.php Dec 26 02:31:35 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 26 02:31:35 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 26 02:31:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 26 02:31:36 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 26 02:31:36 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 26 02:31:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean LangPHP php_get_vhost_versions --output=json Dec 26 02:31:36 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:31:36 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:31:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 26 02:31:36 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:31:36 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:31:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/blog --no-color instance info --format=json --check-updates=true Dec 26 02:31:36 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 26 02:31:36 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 26 02:31:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/public_html/blog/wp-includes/version.php Dec 26 02:31:36 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 26 02:31:36 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 26 02:31:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/public_html/blog/wp-includes/version.php Dec 26 02:31:36 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 26 02:31:36 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 26 02:31:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 26 02:31:36 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 26 02:31:36 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 26 02:31:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=shalinijames --output=json Dec 26 02:31:36 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:31:36 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:31:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color instance info --format=json --check-updates=true Dec 26 02:31:36 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 02:31:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 02:31:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_plugins --format=json Dec 26 02:31:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 02:31:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 02:31:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_themes --format=json Dec 26 02:31:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 02:31:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 02:31:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 26 02:31:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 02:31:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 02:31:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames LangPHP php_get_vhost_versions --output=json Dec 26 02:31:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:31:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:31:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color instance login-url --skip-plugins=false --format=json Dec 26 02:31:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 02:31:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 02:31:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DomainInfo single_domain_data domain=shalinijames.com return_https_redirect_status=1 --output=json Dec 26 02:31:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:31:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:31:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames Mime list_redirects --output=json Dec 26 02:31:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:31:56 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:31:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 26 02:31:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 02:32:00 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 02:32:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_plugins --format=json Dec 26 02:32:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 02:32:01 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 02:32:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 26 02:32:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 02:32:25 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 02:32:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_themes --format=json Dec 26 02:32:25 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 02:32:25 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 02:32:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/wp-config.php Dec 26 02:32:25 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 02:32:25 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 02:32:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:32:25 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 02:32:26 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 02:32:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/.maintenance Dec 26 02:32:26 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 02:32:26 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 02:32:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color db-prefix get Dec 26 02:32:26 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 02:32:26 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 02:32:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DirectoryPrivacy is_directory_protected dir=/home/shalinijames/public_html --output=json Dec 26 02:32:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:32:26 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:32:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:32:26 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 02:32:27 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 02:32:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 26 02:32:27 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 02:32:27 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 02:32:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 26 02:32:27 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 02:32:28 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 02:32:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 26 02:32:28 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 02:32:28 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 02:32:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 26 02:32:28 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 02:32:29 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 02:32:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color admin-username is-secure Dec 26 02:32:29 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 02:32:29 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 02:32:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:32:29 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 02:32:29 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/wp-config.php Dec 26 02:32:30 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 02:32:30 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/stat -c %a /home/shalinijames/public_html/wp-config.php Dec 26 02:32:30 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 02:32:30 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color pingbacks is_disabled Dec 26 02:32:30 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 02:32:30 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:32:30 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 02:32:30 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color security-keys are_keys_correct Dec 26 02:32:30 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 02:32:31 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 02:32:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwtestugo --output=json Dec 26 02:32:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:32:31 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:32:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color instance info --format=json --check-updates=true Dec 26 02:32:31 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:32:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:32:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_plugins --format=json Dec 26 02:32:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:32:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:32:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_themes --format=json Dec 26 02:32:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:32:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:32:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 26 02:32:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:32:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:32:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo LangPHP php_get_vhost_versions --output=json Dec 26 02:32:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:32:58 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:32:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color instance login-url --skip-plugins=false --format=json Dec 26 02:32:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:32:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DomainInfo single_domain_data domain=testugo.in return_https_redirect_status=1 --output=json Dec 26 02:32:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:32:59 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo Mime list_redirects --output=json Dec 26 02:32:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:32:59 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 26 02:32:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:32:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_plugins --format=json Dec 26 02:33:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 26 02:33:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_themes --format=json Dec 26 02:33:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/wp-config.php Dec 26 02:33:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:33:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/.maintenance Dec 26 02:33:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color db-prefix get Dec 26 02:33:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt1 --output=json Dec 26 02:33:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:33:05 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:33:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:33:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 26 02:33:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 26 02:33:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 26 02:33:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 26 02:33:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color admin-username is-secure Dec 26 02:33:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:33:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/wp-config.php Dec 26 02:33:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/tt1/wp-config.php Dec 26 02:33:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color pingbacks is_disabled Dec 26 02:33:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:33:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color security-keys are_keys_correct Dec 26 02:33:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color instance info --format=json --check-updates=true Dec 26 02:33:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_plugins --format=json Dec 26 02:33:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_themes --format=json Dec 26 02:33:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 26 02:33:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color instance login-url --skip-plugins=false --format=json Dec 26 02:33:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 26 02:33:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_plugins --format=json Dec 26 02:33:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:18 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 26 02:33:18 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:19 host sshd[17497]: Invalid user user from 84.110.99.202 port 34236 Dec 26 02:33:19 host sshd[17497]: input_userauth_request: invalid user user [preauth] Dec 26 02:33:19 host sshd[17497]: pam_unix(sshd:auth): check pass; user unknown Dec 26 02:33:19 host sshd[17497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.110.99.202 Dec 26 02:33:21 host sshd[17497]: Failed password for invalid user user from 84.110.99.202 port 34236 ssh2 Dec 26 02:33:21 host sshd[17497]: Connection closed by 84.110.99.202 port 34236 [preauth] Dec 26 02:33:21 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_themes --format=json Dec 26 02:33:21 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/wp-config.php Dec 26 02:33:22 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:33:22 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/.maintenance Dec 26 02:33:22 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color db-prefix get Dec 26 02:33:22 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:23 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt --output=json Dec 26 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:33:23 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:23 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 26 02:33:23 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:24 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 26 02:33:24 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:24 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 26 02:33:24 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:24 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 26 02:33:24 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:25 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color admin-username is-secure Dec 26 02:33:25 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:25 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:33:25 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:26 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/wp-config.php Dec 26 02:33:26 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:26 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/tt/wp-config.php Dec 26 02:33:26 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:26 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color pingbacks is_disabled Dec 26 02:33:26 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:26 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:33:26 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:26 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color security-keys are_keys_correct Dec 26 02:33:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color instance info --format=json --check-updates=true Dec 26 02:33:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:32 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_plugins --format=json Dec 26 02:33:32 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:32 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_themes --format=json Dec 26 02:33:32 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:33 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 26 02:33:33 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:33 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color instance login-url --skip-plugins=false --format=json Dec 26 02:33:33 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:34 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 26 02:33:34 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:34 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_plugins --format=json Dec 26 02:33:34 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:35 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 26 02:33:35 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:38 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_themes --format=json Dec 26 02:33:38 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:39 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/wp-config.php Dec 26 02:33:39 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:39 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:33:39 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:39 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/.maintenance Dec 26 02:33:39 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:39 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color db-prefix get Dec 26 02:33:39 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:40 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/HYPE --output=json Dec 26 02:33:40 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:33:40 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:33:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:33:40 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:40 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 26 02:33:40 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:41 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 26 02:33:41 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:41 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 26 02:33:41 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:42 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 26 02:33:42 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:42 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color admin-username is-secure Dec 26 02:33:42 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:42 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:33:42 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:43 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/wp-config.php Dec 26 02:33:43 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:43 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/HYPE/wp-config.php Dec 26 02:33:43 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:43 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color pingbacks is_disabled Dec 26 02:33:43 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:43 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:33:43 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:44 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color security-keys are_keys_correct Dec 26 02:33:44 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:33:44 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:33:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=ugotscom --output=json Dec 26 02:33:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:33:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:33:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/boniface/blog --no-color instance info --format=json --check-updates=true Dec 26 02:33:44 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:33:45 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:33:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DomainInfo single_domain_data domain=ugotechnologies.com return_https_redirect_status=1 --output=json Dec 26 02:33:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:33:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:33:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom Mime list_redirects --output=json Dec 26 02:33:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:33:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:33:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/boniface/blog/wp-includes/version.php Dec 26 02:33:45 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:33:45 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:33:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/public_html/boniface/blog/wp-includes/version.php Dec 26 02:33:45 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:33:45 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:33:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 26 02:33:45 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:33:45 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:33:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom LangPHP php_get_vhost_versions --output=json Dec 26 02:33:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:33:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:33:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color instance info --format=json --check-updates=true Dec 26 02:33:45 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:33:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:33:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_plugins --format=json Dec 26 02:33:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:33:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:33:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_themes --format=json Dec 26 02:33:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:33:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:33:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 26 02:33:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:33:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:33:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color instance login-url --skip-plugins=false --format=json Dec 26 02:33:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:33:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:33:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 26 02:33:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:33:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:33:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_plugins --format=json Dec 26 02:33:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:33:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:33:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 26 02:33:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:33:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_themes --format=json Dec 26 02:34:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php Dec 26 02:34:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:34:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/.maintenance Dec 26 02:34:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color db-prefix get Dec 26 02:34:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --output=json Dec 26 02:34:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:34:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:34:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:34:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 26 02:34:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 26 02:34:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 26 02:34:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 26 02:34:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color admin-username is-secure Dec 26 02:34:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:34:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php Dec 26 02:34:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/stat -c %a /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php Dec 26 02:34:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color pingbacks is_disabled Dec 26 02:34:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:34:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color security-keys are_keys_correct Dec 26 02:34:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color instance info --format=json --check-updates=true Dec 26 02:34:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_plugins --format=json Dec 26 02:34:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_themes --format=json Dec 26 02:34:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 26 02:34:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color instance login-url --skip-plugins=false --format=json Dec 26 02:34:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 26 02:34:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_plugins --format=json Dec 26 02:34:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 26 02:34:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_themes --format=json Dec 26 02:34:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/wp-config.php Dec 26 02:34:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:34:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/.maintenance Dec 26 02:34:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color db-prefix get Dec 26 02:34:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/site --output=json Dec 26 02:34:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:34:14 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:34:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:34:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 26 02:34:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 26 02:34:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 26 02:34:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 26 02:34:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color admin-username is-secure Dec 26 02:34:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:34:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/wp-config.php Dec 26 02:34:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/stat -c %a /home/ugotscom/public_html/old/site/wp-config.php Dec 26 02:34:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color pingbacks is_disabled Dec 26 02:34:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:34:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color security-keys are_keys_correct Dec 26 02:34:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:34:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:34:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=woodpeck --output=json Dec 26 02:34:18 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:34:18 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:34:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/woodpeck/public_html/wp --no-color instance info --format=json --check-updates=true Dec 26 02:34:18 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 26 02:34:18 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 26 02:34:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck DomainInfo single_domain_data domain=woodpeckerindia.com return_https_redirect_status=1 --output=json Dec 26 02:34:18 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:34:19 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:34:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck Mime list_redirects --output=json Dec 26 02:34:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:34:19 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:34:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/public_html/wp/wp-includes/version.php Dec 26 02:34:19 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 26 02:34:19 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 26 02:34:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 26 02:34:19 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 26 02:34:19 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 26 02:34:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck LangPHP php_get_vhost_versions --output=json Dec 26 02:34:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:34:19 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:34:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=palco123 --output=json Dec 26 02:34:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:34:19 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:34:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color instance info --format=json --check-updates=true Dec 26 02:34:19 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 26 02:34:27 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 26 02:34:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 26 02:34:27 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 26 02:34:27 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 26 02:34:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 26 02:34:28 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 26 02:34:33 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 26 02:34:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 26 02:34:33 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 26 02:34:33 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 26 02:34:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 LangPHP php_get_vhost_versions --output=json Dec 26 02:34:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:34:33 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:34:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color instance login-url --skip-plugins=false --format=json Dec 26 02:34:33 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 26 02:34:34 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 26 02:34:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DomainInfo single_domain_data domain=panlys.com return_https_redirect_status=1 --output=json Dec 26 02:34:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:34:34 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:34:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 Mime list_redirects --output=json Dec 26 02:34:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:34:34 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:34:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 26 02:34:34 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 26 02:34:35 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 26 02:34:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 26 02:34:35 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 26 02:34:36 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 26 02:34:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 26 02:34:36 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 26 02:34:41 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 26 02:34:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 26 02:34:41 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 26 02:34:46 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 26 02:34:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/wp-config.php Dec 26 02:34:46 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 26 02:34:46 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 26 02:34:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:34:47 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 26 02:34:48 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 26 02:34:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/.maintenance Dec 26 02:34:48 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 26 02:34:48 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 26 02:34:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color db-prefix get Dec 26 02:34:48 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 26 02:34:48 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 26 02:34:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DirectoryPrivacy is_directory_protected dir=/home/palco123/public_html --output=json Dec 26 02:34:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:34:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:34:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:34:48 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 26 02:34:49 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 26 02:34:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color option get auto_update_core_major Dec 26 02:34:49 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 26 02:34:49 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 26 02:34:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 26 02:34:50 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 26 02:34:50 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 26 02:34:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 26 02:34:50 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 26 02:34:51 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 26 02:34:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color admin-username is-secure Dec 26 02:34:51 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 26 02:34:51 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 26 02:34:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:34:51 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 26 02:34:52 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 26 02:34:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/wp-config.php Dec 26 02:34:52 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 26 02:34:52 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 26 02:34:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/stat -c %a /home/palco123/public_html/wp-config.php Dec 26 02:34:52 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 26 02:34:52 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 26 02:34:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color pingbacks is_disabled Dec 26 02:34:52 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 26 02:34:52 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 26 02:34:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:34:52 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 26 02:34:53 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 26 02:34:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color security-keys are_keys_correct Dec 26 02:34:53 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 26 02:34:53 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 26 02:34:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwresourcehunte --output=json Dec 26 02:34:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:34:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:34:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color instance info --format=json --check-updates=true Dec 26 02:34:53 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 02:34:59 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 02:34:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_plugins --format=json Dec 26 02:34:59 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 02:35:00 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 02:35:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_themes --format=json Dec 26 02:35:00 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 02:35:00 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 02:35:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 26 02:35:00 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 02:35:00 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 02:35:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte LangPHP php_get_vhost_versions --output=json Dec 26 02:35:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:00 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color instance login-url --skip-plugins=false --format=json Dec 26 02:35:00 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 02:35:01 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 02:35:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DomainInfo single_domain_data domain=resourcehunters.com return_https_redirect_status=1 --output=json Dec 26 02:35:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte Mime list_redirects --output=json Dec 26 02:35:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 26 02:35:01 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 02:35:02 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 02:35:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_plugins --format=json Dec 26 02:35:02 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 02:35:02 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 02:35:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 26 02:35:02 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 02:35:02 host sshd[18617]: User root from 61.146.48.118 not allowed because not listed in AllowUsers Dec 26 02:35:02 host sshd[18617]: input_userauth_request: invalid user root [preauth] Dec 26 02:35:03 host unix_chkpwd[18718]: password check failed for user (root) Dec 26 02:35:03 host sshd[18617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.146.48.118 user=root Dec 26 02:35:03 host sshd[18617]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 02:35:05 host sshd[18617]: Failed password for invalid user root from 61.146.48.118 port 53035 ssh2 Dec 26 02:35:05 host unix_chkpwd[18725]: password check failed for user (root) Dec 26 02:35:05 host sshd[18617]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 02:35:07 host sshd[18617]: Failed password for invalid user root from 61.146.48.118 port 53035 ssh2 Dec 26 02:35:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 02:35:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_themes --format=json Dec 26 02:35:07 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 02:35:07 host unix_chkpwd[18735]: password check failed for user (root) Dec 26 02:35:07 host sshd[18617]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 02:35:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 02:35:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/wp-config.php Dec 26 02:35:07 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 02:35:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 02:35:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:35:07 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 02:35:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 02:35:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/.maintenance Dec 26 02:35:07 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 02:35:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 02:35:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color db-prefix get Dec 26 02:35:07 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 02:35:08 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 02:35:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DirectoryPrivacy is_directory_protected dir=/home/wwwresourcehunte/public_html --output=json Dec 26 02:35:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:08 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:35:08 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 02:35:08 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 02:35:09 host sshd[18617]: Failed password for invalid user root from 61.146.48.118 port 53035 ssh2 Dec 26 02:35:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 26 02:35:09 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 02:35:09 host unix_chkpwd[18790]: password check failed for user (root) Dec 26 02:35:09 host sshd[18617]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 02:35:09 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 02:35:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 26 02:35:09 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 02:35:09 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 02:35:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 26 02:35:09 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 02:35:10 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 02:35:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 26 02:35:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 02:35:10 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 02:35:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color admin-username is-secure Dec 26 02:35:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 02:35:10 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 02:35:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:35:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 02:35:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 02:35:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/wp-config.php Dec 26 02:35:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 02:35:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 02:35:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/stat -c %a /home/wwwresourcehunte/public_html/wp-config.php Dec 26 02:35:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 02:35:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 02:35:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color pingbacks is_disabled Dec 26 02:35:11 host sshd[18617]: Failed password for invalid user root from 61.146.48.118 port 53035 ssh2 Dec 26 02:35:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 02:35:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 02:35:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 26 02:35:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 02:35:11 host unix_chkpwd[18853]: password check failed for user (root) Dec 26 02:35:11 host sshd[18617]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 02:35:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 02:35:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color security-keys are_keys_correct Dec 26 02:35:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 02:35:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 02:35:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=laundryboniface WpToolkitNotification send_admin_auto_updates_notification available_updates_text= available_updates_list= installed_updates_text= installed_updates_list= 'failure_updates_text=Updates were not installed for the following items:<br/><br/>' 'failure_updates_list=1. Website "EVM Honda Cochin" (http://www.evmhonda.com): Failed to reset cache for the instance #1: Fatal error: Uncaught Error: Call to undefined function cardealer_is_wpml_active() in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php:1041#012Stack trace:#012#0 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-init.php(22): require_once()#012#1 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/cardealer-helper-library.php(183): Dec 26 02:35:12 host sudo: wp-toolkit : (command continued) require_once('"'"'/home/wwwevmhon...'"'"')#012#2 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(287): cdhl_include_admin_files('"'"''"'"')#012#3 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(311): WP_Hook->apply_filters(NULL, Array)#012#4 /home/wwwevmhonda/public_html/wp-includes/plugin.php(478): WP_Hook->do_action(Array)#012#5 /home/wwwevmhonda/public_html/wp-settings.php(546): do_action('"'"'init'"'"')#012#6 /usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/vendor/wp-cli/wp-cli/php/WP_CLI/Runner.php(1356): require('"'"'/home/wwwevmhon...'"'"')#012#7 /usr/local/cpanel/3rdparty/wp-toolkit/plib/ve in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php on line 1041#012Error: There has been a critical error on your website.Learn more about debugging in WordPress. There has been a critical error on your website.#012<br/><br/>2. Website Dec 26 02:35:12 host sudo: wp-toolkit : (command continued) "/home/mrsclean/public_html/backup" (http://mrsclean.co.in/backup): Failed to reset cache for the instance #5: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012<br/><br/>3. Website "/home/mrsclean/public_html/blog" (http://mrsclean.co.in/blog): Failed to reset cache for the instance #6: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012<br/><br/>4. Website "/home/ugotscom/public_html/boniface/blog" (http://ugotechnologies.com/boniface/blog): Failed to reset cache for the instance #13: Dec 26 02:35:12 host sudo: wp-toolkit : (command continued) Error: Error establishing a database connection.#012<br/><br/>5. Website "/home/woodpeck/public_html/wp" (http://woodpeckerindia.com/wp): Failed to reset cache for the instance #16: /bin/sh: line 0: cd: /home/woodpeck/public_html/wp: No such file or directory#012<br/><br/>' --output=json Dec 26 02:35:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:12 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color cli cache clear Dec 26 02:35:12 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 26 02:35:12 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 26 02:35:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color cli cache clear Dec 26 02:35:12 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 02:35:12 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 02:35:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/backup --no-color cli cache clear Dec 26 02:35:12 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 26 02:35:12 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 26 02:35:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/blog --no-color cli cache clear Dec 26 02:35:12 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 26 02:35:13 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 26 02:35:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color cli cache clear Dec 26 02:35:13 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 02:35:13 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 02:35:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color cli cache clear Dec 26 02:35:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:35:13 host sshd[18617]: Failed password for invalid user root from 61.146.48.118 port 53035 ssh2 Dec 26 02:35:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:35:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color cli cache clear Dec 26 02:35:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:35:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:35:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color cli cache clear Dec 26 02:35:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:35:13 host unix_chkpwd[18997]: password check failed for user (root) Dec 26 02:35:13 host sshd[18617]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 02:35:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:35:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/boniface/blog --no-color cli cache clear Dec 26 02:35:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:35:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:35:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color cli cache clear Dec 26 02:35:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:35:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:35:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color cli cache clear Dec 26 02:35:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:35:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:35:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/woodpeck/public_html/wp --no-color cli cache clear Dec 26 02:35:14 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 26 02:35:14 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 26 02:35:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color cli cache clear Dec 26 02:35:14 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 26 02:35:14 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 26 02:35:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color cli cache clear Dec 26 02:35:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 02:35:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 02:35:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 26 02:35:15 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 26 02:35:15 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 26 02:35:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 26 02:35:15 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 02:35:15 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 02:35:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 26 02:35:15 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 02:35:15 host sshd[18617]: Failed password for invalid user root from 61.146.48.118 port 53035 ssh2 Dec 26 02:35:15 host sshd[18617]: error: maximum authentication attempts exceeded for invalid user root from 61.146.48.118 port 53035 ssh2 [preauth] Dec 26 02:35:15 host sshd[18617]: Disconnecting: Too many authentication failures [preauth] Dec 26 02:35:15 host sshd[18617]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.146.48.118 user=root Dec 26 02:35:15 host sshd[18617]: PAM service(sshd) ignoring max retries; 6 > 3 Dec 26 02:35:16 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 02:35:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 26 02:35:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:35:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:35:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 26 02:35:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:35:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:35:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 26 02:35:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 02:35:18 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 02:35:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 26 02:35:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:35:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:35:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 26 02:35:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 02:35:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 02:35:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 26 02:35:18 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 26 02:35:19 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 26 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 26 02:35:19 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 02:35:19 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c httpd -v Dec 26 02:35:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:19 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Dec 26 02:35:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:19 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Dec 26 02:35:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:19 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Dec 26 02:35:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:19 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Dec 26 02:35:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:19 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Dec 26 02:35:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:19 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Dec 26 02:35:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:19 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Dec 26 02:35:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:19 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Dec 26 02:35:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:19 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/palco123/panlys.com/wp-toolkit.conf Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/palco123/panlys.com/wp-toolkit.conf Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:20 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Dec 26 02:35:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:21 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Dec 26 02:35:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:21 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Dec 26 02:35:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:21 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Dec 26 02:35:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:21 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:35:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Dec 26 02:35:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 02:35:21 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 02:40:54 host sshd[19986]: User root from 212.60.80.58 not allowed because not listed in AllowUsers Dec 26 02:40:54 host sshd[19986]: input_userauth_request: invalid user root [preauth] Dec 26 02:40:54 host unix_chkpwd[19990]: password check failed for user (root) Dec 26 02:40:54 host sshd[19986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.60.80.58 user=root Dec 26 02:40:54 host sshd[19986]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 02:40:55 host sshd[19986]: Failed password for invalid user root from 212.60.80.58 port 42506 ssh2 Dec 26 02:40:56 host sshd[19986]: Received disconnect from 212.60.80.58 port 42506:11: Bye Bye [preauth] Dec 26 02:40:56 host sshd[19986]: Disconnected from 212.60.80.58 port 42506 [preauth] Dec 26 02:41:49 host sshd[20176]: Connection closed by 192.241.197.61 port 58292 [preauth] Dec 26 02:44:58 host sshd[20534]: User root from 212.60.80.58 not allowed because not listed in AllowUsers Dec 26 02:44:58 host sshd[20534]: input_userauth_request: invalid user root [preauth] Dec 26 02:44:58 host unix_chkpwd[20537]: password check failed for user (root) Dec 26 02:44:58 host sshd[20534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.60.80.58 user=root Dec 26 02:44:58 host sshd[20534]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 02:45:00 host sshd[20534]: Failed password for invalid user root from 212.60.80.58 port 35593 ssh2 Dec 26 02:46:36 host sshd[20919]: Invalid user webapp from 103.13.40.2 port 39584 Dec 26 02:46:36 host sshd[20919]: input_userauth_request: invalid user webapp [preauth] Dec 26 02:46:36 host sshd[20919]: pam_unix(sshd:auth): check pass; user unknown Dec 26 02:46:36 host sshd[20919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 26 02:46:38 host sshd[20919]: Failed password for invalid user webapp from 103.13.40.2 port 39584 ssh2 Dec 26 02:46:38 host sshd[20919]: Connection closed by 103.13.40.2 port 39584 [preauth] Dec 26 02:49:45 host sshd[21293]: User root from 92.255.85.115 not allowed because not listed in AllowUsers Dec 26 02:49:45 host sshd[21293]: input_userauth_request: invalid user root [preauth] Dec 26 02:49:45 host unix_chkpwd[21296]: password check failed for user (root) Dec 26 02:49:45 host sshd[21293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115 user=root Dec 26 02:49:45 host sshd[21293]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 02:49:47 host sshd[21293]: Failed password for invalid user root from 92.255.85.115 port 12203 ssh2 Dec 26 02:49:47 host sshd[21293]: Connection reset by 92.255.85.115 port 12203 [preauth] Dec 26 02:54:04 host sshd[21795]: Connection reset by 177.59.40.113 port 50889 [preauth] Dec 26 03:04:56 host sshd[23341]: Invalid user cu from 45.93.201.90 port 48932 Dec 26 03:04:56 host sshd[23341]: input_userauth_request: invalid user cu [preauth] Dec 26 03:04:56 host sshd[23341]: pam_unix(sshd:auth): check pass; user unknown Dec 26 03:04:56 host sshd[23341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 26 03:04:58 host sshd[23341]: Failed password for invalid user cu from 45.93.201.90 port 48932 ssh2 Dec 26 03:05:01 host sshd[23341]: pam_unix(sshd:auth): check pass; user unknown Dec 26 03:05:04 host sshd[23341]: Failed password for invalid user cu from 45.93.201.90 port 48932 ssh2 Dec 26 03:05:07 host sshd[23341]: pam_unix(sshd:auth): check pass; user unknown Dec 26 03:05:09 host sshd[23341]: Failed password for invalid user cu from 45.93.201.90 port 48932 ssh2 Dec 26 03:05:12 host sshd[23341]: Connection closed by 45.93.201.90 port 48932 [preauth] Dec 26 03:05:12 host sshd[23341]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 26 03:05:38 host sshd[23450]: Invalid user ubuntu from 106.10.122.53 port 40920 Dec 26 03:05:38 host sshd[23450]: input_userauth_request: invalid user ubuntu [preauth] Dec 26 03:05:38 host sshd[23450]: pam_unix(sshd:auth): check pass; user unknown Dec 26 03:05:38 host sshd[23450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 26 03:05:40 host sshd[23450]: Failed password for invalid user ubuntu from 106.10.122.53 port 40920 ssh2 Dec 26 03:05:40 host sshd[23450]: Connection closed by 106.10.122.53 port 40920 [preauth] Dec 26 03:06:28 host sshd[23654]: User root from 92.255.85.115 not allowed because not listed in AllowUsers Dec 26 03:06:28 host sshd[23654]: input_userauth_request: invalid user root [preauth] Dec 26 03:06:28 host unix_chkpwd[23657]: password check failed for user (root) Dec 26 03:06:28 host sshd[23654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115 user=root Dec 26 03:06:28 host sshd[23654]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 03:06:30 host sshd[23654]: Failed password for invalid user root from 92.255.85.115 port 16898 ssh2 Dec 26 03:10:44 host sshd[24205]: Did not receive identification string from 27.71.231.21 port 41392 Dec 26 03:10:44 host sshd[24208]: Invalid user moxa from 27.71.231.21 port 41492 Dec 26 03:10:44 host sshd[24208]: input_userauth_request: invalid user moxa [preauth] Dec 26 03:10:44 host sshd[24207]: Invalid user postgres from 27.71.231.21 port 41744 Dec 26 03:10:44 host sshd[24207]: input_userauth_request: invalid user postgres [preauth] Dec 26 03:10:44 host sshd[24212]: Invalid user jenkins from 27.71.231.21 port 41668 Dec 26 03:10:44 host sshd[24212]: input_userauth_request: invalid user jenkins [preauth] Dec 26 03:10:44 host sshd[24214]: Invalid user emqx from 27.71.231.21 port 41430 Dec 26 03:10:44 host sshd[24214]: input_userauth_request: invalid user emqx [preauth] Dec 26 03:10:44 host sshd[24210]: User centos from 27.71.231.21 not allowed because not listed in AllowUsers Dec 26 03:10:44 host sshd[24210]: input_userauth_request: invalid user centos [preauth] Dec 26 03:10:44 host sshd[24209]: Invalid user dmdba from 27.71.231.21 port 41478 Dec 26 03:10:44 host sshd[24209]: input_userauth_request: invalid user dmdba [preauth] Dec 26 03:10:44 host sshd[24213]: Invalid user test from 27.71.231.21 port 41450 Dec 26 03:10:44 host sshd[24213]: input_userauth_request: invalid user test [preauth] Dec 26 03:10:44 host sshd[24217]: Invalid user ec2-user from 27.71.231.21 port 41588 Dec 26 03:10:44 host sshd[24217]: input_userauth_request: invalid user ec2-user [preauth] Dec 26 03:10:44 host sshd[24211]: Invalid user ansible from 27.71.231.21 port 41728 Dec 26 03:10:44 host sshd[24215]: User mail from 27.71.231.21 not allowed because not listed in AllowUsers Dec 26 03:10:44 host sshd[24211]: input_userauth_request: invalid user ansible [preauth] Dec 26 03:10:44 host sshd[24215]: input_userauth_request: invalid user mail [preauth] Dec 26 03:10:44 host sshd[24216]: Invalid user devops from 27.71.231.21 port 41506 Dec 26 03:10:44 host sshd[24216]: input_userauth_request: invalid user devops [preauth] Dec 26 03:10:44 host sshd[24218]: Invalid user jenkins from 27.71.231.21 port 41500 Dec 26 03:10:44 host sshd[24218]: input_userauth_request: invalid user jenkins [preauth] Dec 26 03:10:44 host sshd[24208]: pam_unix(sshd:auth): check pass; user unknown Dec 26 03:10:44 host sshd[24208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 26 03:10:44 host sshd[24207]: pam_unix(sshd:auth): check pass; user unknown Dec 26 03:10:44 host sshd[24207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 26 03:10:44 host sshd[24212]: pam_unix(sshd:auth): check pass; user unknown Dec 26 03:10:44 host sshd[24212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 26 03:10:44 host sshd[24214]: pam_unix(sshd:auth): check pass; user unknown Dec 26 03:10:44 host sshd[24214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 26 03:10:44 host sshd[24209]: pam_unix(sshd:auth): check pass; user unknown Dec 26 03:10:44 host sshd[24209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 26 03:10:44 host sshd[24213]: pam_unix(sshd:auth): check pass; user unknown Dec 26 03:10:44 host sshd[24213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 26 03:10:44 host sshd[24217]: pam_unix(sshd:auth): check pass; user unknown Dec 26 03:10:44 host sshd[24217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 26 03:10:44 host unix_chkpwd[24232]: password check failed for user (centos) Dec 26 03:10:44 host sshd[24211]: pam_unix(sshd:auth): check pass; user unknown Dec 26 03:10:44 host sshd[24211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 26 03:10:44 host sshd[24210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 user=centos Dec 26 03:10:44 host sshd[24216]: pam_unix(sshd:auth): check pass; user unknown Dec 26 03:10:44 host sshd[24216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 26 03:10:44 host unix_chkpwd[24233]: password check failed for user (mail) Dec 26 03:10:45 host sshd[24215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 user=mail Dec 26 03:10:45 host sshd[24215]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mail" Dec 26 03:10:45 host sshd[24218]: pam_unix(sshd:auth): check pass; user unknown Dec 26 03:10:45 host sshd[24218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 26 03:10:45 host sshd[24234]: Invalid user ubuntu from 27.71.231.21 port 41626 Dec 26 03:10:45 host sshd[24234]: input_userauth_request: invalid user ubuntu [preauth] Dec 26 03:10:45 host sshd[24235]: Invalid user openhabian from 27.71.231.21 port 41714 Dec 26 03:10:45 host sshd[24235]: input_userauth_request: invalid user openhabian [preauth] Dec 26 03:10:45 host sshd[24236]: Invalid user discord from 27.71.231.21 port 41590 Dec 26 03:10:45 host sshd[24236]: input_userauth_request: invalid user discord [preauth] Dec 26 03:10:45 host sshd[24234]: pam_unix(sshd:auth): check pass; user unknown Dec 26 03:10:45 host sshd[24234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 26 03:10:46 host sshd[24235]: pam_unix(sshd:auth): check pass; user unknown Dec 26 03:10:46 host sshd[24235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 26 03:10:46 host sshd[24236]: pam_unix(sshd:auth): check pass; user unknown Dec 26 03:10:46 host sshd[24236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 26 03:10:47 host sshd[24208]: Failed password for invalid user moxa from 27.71.231.21 port 41492 ssh2 Dec 26 03:10:47 host sshd[24207]: Failed password for invalid user postgres from 27.71.231.21 port 41744 ssh2 Dec 26 03:10:47 host sshd[24212]: Failed password for invalid user jenkins from 27.71.231.21 port 41668 ssh2 Dec 26 03:10:47 host sshd[24214]: Failed password for invalid user emqx from 27.71.231.21 port 41430 ssh2 Dec 26 03:10:47 host sshd[24209]: Failed password for invalid user dmdba from 27.71.231.21 port 41478 ssh2 Dec 26 03:10:47 host sshd[24213]: Failed password for invalid user test from 27.71.231.21 port 41450 ssh2 Dec 26 03:10:47 host sshd[24217]: Failed password for invalid user ec2-user from 27.71.231.21 port 41588 ssh2 Dec 26 03:10:47 host sshd[24211]: Failed password for invalid user ansible from 27.71.231.21 port 41728 ssh2 Dec 26 03:10:47 host sshd[24210]: Failed password for invalid user centos from 27.71.231.21 port 41756 ssh2 Dec 26 03:10:47 host sshd[24216]: Failed password for invalid user devops from 27.71.231.21 port 41506 ssh2 Dec 26 03:10:47 host sshd[24215]: Failed password for invalid user mail from 27.71.231.21 port 41730 ssh2 Dec 26 03:10:47 host sshd[24208]: Connection closed by 27.71.231.21 port 41492 [preauth] Dec 26 03:10:47 host sshd[24207]: Connection closed by 27.71.231.21 port 41744 [preauth] Dec 26 03:10:47 host sshd[24212]: Connection closed by 27.71.231.21 port 41668 [preauth] Dec 26 03:10:47 host sshd[24214]: Connection closed by 27.71.231.21 port 41430 [preauth] Dec 26 03:10:47 host sshd[24209]: Connection closed by 27.71.231.21 port 41478 [preauth] Dec 26 03:10:47 host sshd[24213]: Connection closed by 27.71.231.21 port 41450 [preauth] Dec 26 03:10:47 host sshd[24211]: Connection closed by 27.71.231.21 port 41728 [preauth] Dec 26 03:10:47 host sshd[24217]: Connection closed by 27.71.231.21 port 41588 [preauth] Dec 26 03:10:47 host sshd[24210]: Connection closed by 27.71.231.21 port 41756 [preauth] Dec 26 03:10:47 host sshd[24215]: Connection closed by 27.71.231.21 port 41730 [preauth] Dec 26 03:10:47 host sshd[24216]: Connection closed by 27.71.231.21 port 41506 [preauth] Dec 26 03:10:47 host sshd[24218]: Failed password for invalid user jenkins from 27.71.231.21 port 41500 ssh2 Dec 26 03:10:47 host sshd[24218]: Connection closed by 27.71.231.21 port 41500 [preauth] Dec 26 03:10:47 host sshd[24244]: Invalid user test from 27.71.231.21 port 41700 Dec 26 03:10:47 host sshd[24244]: input_userauth_request: invalid user test [preauth] Dec 26 03:10:48 host sshd[24247]: User centos from 27.71.231.21 not allowed because not listed in AllowUsers Dec 26 03:10:48 host sshd[24247]: input_userauth_request: invalid user centos [preauth] Dec 26 03:10:48 host sshd[24246]: Invalid user admin from 27.71.231.21 port 41528 Dec 26 03:10:48 host sshd[24246]: input_userauth_request: invalid user admin [preauth] Dec 26 03:10:48 host sshd[24246]: pam_unix(sshd:auth): check pass; user unknown Dec 26 03:10:48 host sshd[24246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 26 03:10:48 host unix_chkpwd[24266]: password check failed for user (centos) Dec 26 03:10:48 host sshd[24247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 user=centos Dec 26 03:10:48 host sshd[24249]: Invalid user admin from 27.71.231.21 port 41398 Dec 26 03:10:48 host sshd[24249]: input_userauth_request: invalid user admin [preauth] Dec 26 03:10:48 host sshd[24248]: User centos from 27.71.231.21 not allowed because not listed in AllowUsers Dec 26 03:10:48 host sshd[24248]: input_userauth_request: invalid user centos [preauth] Dec 26 03:10:48 host sshd[24252]: User centos from 27.71.231.21 not allowed because not listed in AllowUsers Dec 26 03:10:48 host sshd[24252]: input_userauth_request: invalid user centos [preauth] Dec 26 03:10:48 host sshd[24251]: Invalid user dmdba from 27.71.231.21 port 41610 Dec 26 03:10:48 host sshd[24251]: input_userauth_request: invalid user dmdba [preauth] Dec 26 03:10:48 host sshd[24250]: Invalid user www from 27.71.231.21 port 41468 Dec 26 03:10:48 host sshd[24250]: input_userauth_request: invalid user www [preauth] Dec 26 03:10:48 host sshd[24244]: pam_unix(sshd:auth): check pass; user unknown Dec 26 03:10:48 host sshd[24244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 26 03:10:48 host sshd[24253]: Invalid user hello from 27.71.231.21 port 41544 Dec 26 03:10:48 host sshd[24253]: input_userauth_request: invalid user hello [preauth] Dec 26 03:10:48 host sshd[24254]: Invalid user guest from 27.71.231.21 port 41562 Dec 26 03:10:48 host sshd[24254]: input_userauth_request: invalid user guest [preauth] Dec 26 03:10:48 host sshd[24255]: Invalid user admin from 27.71.231.21 port 41518 Dec 26 03:10:48 host sshd[24255]: input_userauth_request: invalid user admin [preauth] Dec 26 03:10:48 host sshd[24249]: pam_unix(sshd:auth): check pass; user unknown Dec 26 03:10:48 host sshd[24249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 26 03:10:48 host unix_chkpwd[24267]: password check failed for user (centos) Dec 26 03:10:48 host sshd[24248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 user=centos Dec 26 03:10:48 host sshd[24250]: pam_unix(sshd:auth): check pass; user unknown Dec 26 03:10:48 host sshd[24250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 26 03:10:48 host sshd[24251]: pam_unix(sshd:auth): check pass; user unknown Dec 26 03:10:48 host sshd[24251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 26 03:10:48 host unix_chkpwd[24268]: password check failed for user (centos) Dec 26 03:10:48 host sshd[24252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 user=centos Dec 26 03:10:48 host sshd[24253]: pam_unix(sshd:auth): check pass; user unknown Dec 26 03:10:48 host sshd[24253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 26 03:10:48 host sshd[24254]: pam_unix(sshd:auth): check pass; user unknown Dec 26 03:10:48 host sshd[24254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 26 03:10:48 host sshd[24255]: pam_unix(sshd:auth): check pass; user unknown Dec 26 03:10:48 host sshd[24255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 26 03:10:48 host sshd[24234]: Failed password for invalid user ubuntu from 27.71.231.21 port 41626 ssh2 Dec 26 03:10:48 host sshd[24235]: Failed password for invalid user openhabian from 27.71.231.21 port 41714 ssh2 Dec 26 03:10:48 host sshd[24236]: Failed password for invalid user discord from 27.71.231.21 port 41590 ssh2 Dec 26 03:10:48 host sshd[24234]: Connection closed by 27.71.231.21 port 41626 [preauth] Dec 26 03:10:48 host sshd[24235]: Connection closed by 27.71.231.21 port 41714 [preauth] Dec 26 03:10:48 host sshd[24236]: Connection closed by 27.71.231.21 port 41590 [preauth] Dec 26 03:10:49 host sshd[24246]: Failed password for invalid user admin from 27.71.231.21 port 41528 ssh2 Dec 26 03:10:49 host sshd[24247]: Failed password for invalid user centos from 27.71.231.21 port 41732 ssh2 Dec 26 03:10:49 host sshd[24246]: Connection closed by 27.71.231.21 port 41528 [preauth] Dec 26 03:10:49 host sshd[24247]: Connection closed by 27.71.231.21 port 41732 [preauth] Dec 26 03:10:50 host sshd[24244]: Failed password for invalid user test from 27.71.231.21 port 41700 ssh2 Dec 26 03:10:50 host sshd[24249]: Failed password for invalid user admin from 27.71.231.21 port 41398 ssh2 Dec 26 03:10:50 host sshd[24248]: Failed password for invalid user centos from 27.71.231.21 port 41414 ssh2 Dec 26 03:10:50 host sshd[24251]: Failed password for invalid user dmdba from 27.71.231.21 port 41610 ssh2 Dec 26 03:10:50 host sshd[24250]: Failed password for invalid user www from 27.71.231.21 port 41468 ssh2 Dec 26 03:10:50 host sshd[24252]: Failed password for invalid user centos from 27.71.231.21 port 41434 ssh2 Dec 26 03:10:50 host sshd[24253]: Failed password for invalid user hello from 27.71.231.21 port 41544 ssh2 Dec 26 03:10:50 host sshd[24254]: Failed password for invalid user guest from 27.71.231.21 port 41562 ssh2 Dec 26 03:10:50 host sshd[24255]: Failed password for invalid user admin from 27.71.231.21 port 41518 ssh2 Dec 26 03:20:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 03:20:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 03:20:02 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 03:20:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 03:20:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 03:20:02 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 03:20:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 03:20:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 03:20:02 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 03:20:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 26 03:20:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 03:20:02 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 03:20:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 26 03:20:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 03:20:02 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 03:20:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 26 03:20:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 03:20:02 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 03:20:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 26 03:20:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 03:20:02 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 03:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 03:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 03:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 03:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 03:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 03:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 03:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 03:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 03:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 03:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 26 03:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 03:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 03:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 26 03:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 03:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 03:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 26 03:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 03:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 03:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 26 03:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 03:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 03:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 26 03:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 03:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 03:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 26 03:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 03:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 03:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 26 03:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 03:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 03:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 26 03:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 03:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 26 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwevmhonda user-2=bonifacegroup user-3=straightcurve user-4=wwwletsstalkfood user-5=phmetals user-6=kottayamcalldriv user-7=palco123 user-8=gifterman user-9=mrsclean user-10=wwwnexidigital user-11=disposeat user-12=remysagr user-13=wwwkmaorg user-14=wwwkapin user-15=woodpeck user-16=shalinijames user-17=wwwtestugo user-18=vfmassets user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=ugotscom user-23=wwwresourcehunte user-24=keralaholi user-25=wwwrmswll user-26=wwwkaretakers user-27=cochintaxi user-28=a2zgroup user-29=dartsimp user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 26 03:21:46 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 26 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 03:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 03:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 03:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 03:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 03:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-T7Wg5r0MgEh0jF2i.~ Dec 26 03:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 03:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 03:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-T7Wg5r0MgEh0jF2i.~' Dec 26 03:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 03:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 03:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-T7Wg5r0MgEh0jF2i.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 03:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 03:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 03:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 26 03:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 03:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 03:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 26 03:21:47 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 03:21:47 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 03:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 03:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 03:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 03:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 03:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 03:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 03:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 03:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 03:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 03:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 26 03:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 03:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 26 03:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 26 03:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 26 03:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 26 03:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 03:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 26 03:21:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 03:21:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 26 03:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 03:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 26 03:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 03:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 03:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 26 03:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 03:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 26 03:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 03:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 03:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 26 03:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 03:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 03:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 26 03:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 03:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 03:22:20 host sshd[26212]: Did not receive identification string from 205.185.123.43 port 55998 Dec 26 03:23:06 host sshd[26312]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Dec 26 03:23:06 host sshd[26312]: input_userauth_request: invalid user root [preauth] Dec 26 03:23:06 host unix_chkpwd[26315]: password check failed for user (root) Dec 26 03:23:06 host sshd[26312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Dec 26 03:23:06 host sshd[26312]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 03:23:08 host sshd[26312]: Failed password for invalid user root from 162.218.126.136 port 55250 ssh2 Dec 26 03:23:08 host sshd[26312]: Connection closed by 162.218.126.136 port 55250 [preauth] Dec 26 03:28:49 host sshd[27134]: User root from 197.5.145.8 not allowed because not listed in AllowUsers Dec 26 03:28:49 host sshd[27134]: input_userauth_request: invalid user root [preauth] Dec 26 03:28:50 host unix_chkpwd[27137]: password check failed for user (root) Dec 26 03:28:50 host sshd[27134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.8 user=root Dec 26 03:28:50 host sshd[27134]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 03:28:51 host sshd[27134]: Failed password for invalid user root from 197.5.145.8 port 23101 ssh2 Dec 26 03:28:52 host sshd[27134]: Received disconnect from 197.5.145.8 port 23101:11: Bye Bye [preauth] Dec 26 03:28:52 host sshd[27134]: Disconnected from 197.5.145.8 port 23101 [preauth] Dec 26 03:29:12 host sshd[27189]: User root from 179.131.10.103 not allowed because not listed in AllowUsers Dec 26 03:29:12 host sshd[27189]: input_userauth_request: invalid user root [preauth] Dec 26 03:29:12 host unix_chkpwd[27195]: password check failed for user (root) Dec 26 03:29:12 host sshd[27189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.131.10.103 user=root Dec 26 03:29:12 host sshd[27189]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 03:29:15 host sshd[27189]: Failed password for invalid user root from 179.131.10.103 port 29076 ssh2 Dec 26 03:29:15 host sshd[27189]: Received disconnect from 179.131.10.103 port 29076:11: Bye Bye [preauth] Dec 26 03:29:15 host sshd[27189]: Disconnected from 179.131.10.103 port 29076 [preauth] Dec 26 03:29:34 host sshd[27253]: User root from 189.6.45.130 not allowed because not listed in AllowUsers Dec 26 03:29:34 host sshd[27253]: input_userauth_request: invalid user root [preauth] Dec 26 03:29:34 host unix_chkpwd[27257]: password check failed for user (root) Dec 26 03:29:34 host sshd[27253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.6.45.130 user=root Dec 26 03:29:34 host sshd[27253]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 03:29:36 host sshd[27253]: Failed password for invalid user root from 189.6.45.130 port 39830 ssh2 Dec 26 03:29:36 host sshd[27253]: Received disconnect from 189.6.45.130 port 39830:11: Bye Bye [preauth] Dec 26 03:29:36 host sshd[27253]: Disconnected from 189.6.45.130 port 39830 [preauth] Dec 26 03:30:04 host sshd[27321]: User root from 101.33.80.197 not allowed because not listed in AllowUsers Dec 26 03:30:04 host sshd[27321]: input_userauth_request: invalid user root [preauth] Dec 26 03:30:04 host unix_chkpwd[27324]: password check failed for user (root) Dec 26 03:30:04 host sshd[27321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.33.80.197 user=root Dec 26 03:30:04 host sshd[27321]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 03:30:06 host sshd[27321]: Failed password for invalid user root from 101.33.80.197 port 47198 ssh2 Dec 26 03:30:06 host sshd[27321]: Received disconnect from 101.33.80.197 port 47198:11: Bye Bye [preauth] Dec 26 03:30:06 host sshd[27321]: Disconnected from 101.33.80.197 port 47198 [preauth] Dec 26 03:30:26 host sshd[27390]: User root from 185.159.82.135 not allowed because not listed in AllowUsers Dec 26 03:30:26 host sshd[27390]: input_userauth_request: invalid user root [preauth] Dec 26 03:30:26 host unix_chkpwd[27392]: password check failed for user (root) Dec 26 03:30:26 host sshd[27390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.159.82.135 user=root Dec 26 03:30:26 host sshd[27390]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 03:30:28 host sshd[27390]: Failed password for invalid user root from 185.159.82.135 port 54768 ssh2 Dec 26 03:30:28 host sshd[27390]: Received disconnect from 185.159.82.135 port 54768:11: Bye Bye [preauth] Dec 26 03:30:28 host sshd[27390]: Disconnected from 185.159.82.135 port 54768 [preauth] Dec 26 03:31:01 host sshd[27438]: User root from 46.101.132.159 not allowed because not listed in AllowUsers Dec 26 03:31:01 host sshd[27438]: input_userauth_request: invalid user root [preauth] Dec 26 03:31:01 host unix_chkpwd[27451]: password check failed for user (root) Dec 26 03:31:01 host sshd[27438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.132.159 user=root Dec 26 03:31:01 host sshd[27438]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 03:31:02 host sshd[27438]: Failed password for invalid user root from 46.101.132.159 port 38672 ssh2 Dec 26 03:31:03 host sshd[27438]: Received disconnect from 46.101.132.159 port 38672:11: Bye Bye [preauth] Dec 26 03:31:03 host sshd[27438]: Disconnected from 46.101.132.159 port 38672 [preauth] Dec 26 03:31:11 host sshd[27467]: Invalid user user from 92.46.108.20 port 53426 Dec 26 03:31:11 host sshd[27467]: input_userauth_request: invalid user user [preauth] Dec 26 03:31:11 host sshd[27467]: pam_unix(sshd:auth): check pass; user unknown Dec 26 03:31:11 host sshd[27467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 26 03:31:14 host sshd[27467]: Failed password for invalid user user from 92.46.108.20 port 53426 ssh2 Dec 26 03:31:14 host sshd[27467]: Connection closed by 92.46.108.20 port 53426 [preauth] Dec 26 03:31:49 host sshd[27546]: User root from 177.102.140.51 not allowed because not listed in AllowUsers Dec 26 03:31:49 host sshd[27546]: input_userauth_request: invalid user root [preauth] Dec 26 03:31:49 host unix_chkpwd[27552]: password check failed for user (root) Dec 26 03:31:49 host sshd[27546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.102.140.51 user=root Dec 26 03:31:49 host sshd[27546]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 03:31:50 host sshd[27549]: User root from 43.153.71.33 not allowed because not listed in AllowUsers Dec 26 03:31:50 host sshd[27549]: input_userauth_request: invalid user root [preauth] Dec 26 03:31:50 host unix_chkpwd[27554]: password check failed for user (root) Dec 26 03:31:50 host sshd[27549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.71.33 user=root Dec 26 03:31:50 host sshd[27549]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 03:31:51 host sshd[27546]: Failed password for invalid user root from 177.102.140.51 port 55403 ssh2 Dec 26 03:31:51 host sshd[27546]: Received disconnect from 177.102.140.51 port 55403:11: Bye Bye [preauth] Dec 26 03:31:51 host sshd[27546]: Disconnected from 177.102.140.51 port 55403 [preauth] Dec 26 03:31:51 host sshd[27549]: Failed password for invalid user root from 43.153.71.33 port 33898 ssh2 Dec 26 03:31:51 host sshd[27549]: Received disconnect from 43.153.71.33 port 33898:11: Bye Bye [preauth] Dec 26 03:31:51 host sshd[27549]: Disconnected from 43.153.71.33 port 33898 [preauth] Dec 26 03:32:10 host sshd[27595]: User root from 165.227.167.225 not allowed because not listed in AllowUsers Dec 26 03:32:10 host sshd[27595]: input_userauth_request: invalid user root [preauth] Dec 26 03:32:10 host unix_chkpwd[27604]: password check failed for user (root) Dec 26 03:32:10 host sshd[27595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.167.225 user=root Dec 26 03:32:10 host sshd[27595]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 03:32:12 host sshd[27595]: Failed password for invalid user root from 165.227.167.225 port 44382 ssh2 Dec 26 03:32:12 host sshd[27595]: Received disconnect from 165.227.167.225 port 44382:11: Bye Bye [preauth] Dec 26 03:32:12 host sshd[27595]: Disconnected from 165.227.167.225 port 44382 [preauth] Dec 26 03:33:19 host sshd[27831]: User root from 5.196.68.38 not allowed because not listed in AllowUsers Dec 26 03:33:19 host sshd[27831]: input_userauth_request: invalid user root [preauth] Dec 26 03:33:19 host unix_chkpwd[27834]: password check failed for user (root) Dec 26 03:33:19 host sshd[27831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.68.38 user=root Dec 26 03:33:19 host sshd[27831]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 03:33:20 host sshd[27831]: Failed password for invalid user root from 5.196.68.38 port 48704 ssh2 Dec 26 03:33:21 host sshd[27831]: Received disconnect from 5.196.68.38 port 48704:11: Bye Bye [preauth] Dec 26 03:33:21 host sshd[27831]: Disconnected from 5.196.68.38 port 48704 [preauth] Dec 26 03:33:28 host sshd[27865]: User root from 46.101.132.159 not allowed because not listed in AllowUsers Dec 26 03:33:28 host sshd[27865]: input_userauth_request: invalid user root [preauth] Dec 26 03:33:28 host unix_chkpwd[27869]: password check failed for user (root) Dec 26 03:33:28 host sshd[27865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.132.159 user=root Dec 26 03:33:28 host sshd[27865]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 03:33:31 host sshd[27865]: Failed password for invalid user root from 46.101.132.159 port 41110 ssh2 Dec 26 03:33:43 host sshd[27917]: User root from 165.227.167.225 not allowed because not listed in AllowUsers Dec 26 03:33:43 host sshd[27917]: input_userauth_request: invalid user root [preauth] Dec 26 03:33:43 host unix_chkpwd[27921]: password check failed for user (root) Dec 26 03:33:43 host sshd[27917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.167.225 user=root Dec 26 03:33:43 host sshd[27917]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 03:33:44 host sshd[27917]: Failed password for invalid user root from 165.227.167.225 port 37708 ssh2 Dec 26 03:33:44 host sshd[27917]: Received disconnect from 165.227.167.225 port 37708:11: Bye Bye [preauth] Dec 26 03:33:44 host sshd[27917]: Disconnected from 165.227.167.225 port 37708 [preauth] Dec 26 03:34:11 host sshd[27999]: Invalid user postgres from 91.212.166.22 port 60190 Dec 26 03:34:11 host sshd[27999]: input_userauth_request: invalid user postgres [preauth] Dec 26 03:34:11 host sshd[27999]: pam_unix(sshd:auth): check pass; user unknown Dec 26 03:34:11 host sshd[27999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.212.166.22 Dec 26 03:34:13 host sshd[27999]: Failed password for invalid user postgres from 91.212.166.22 port 60190 ssh2 Dec 26 03:34:16 host sshd[27999]: pam_unix(sshd:auth): check pass; user unknown Dec 26 03:34:18 host sshd[27999]: Failed password for invalid user postgres from 91.212.166.22 port 60190 ssh2 Dec 26 03:34:21 host sshd[27999]: pam_unix(sshd:auth): check pass; user unknown Dec 26 03:34:23 host sshd[27999]: Failed password for invalid user postgres from 91.212.166.22 port 60190 ssh2 Dec 26 03:34:26 host sshd[27999]: pam_unix(sshd:auth): check pass; user unknown Dec 26 03:34:28 host sshd[27999]: Failed password for invalid user postgres from 91.212.166.22 port 60190 ssh2 Dec 26 03:34:36 host sshd[28089]: User root from 43.153.71.33 not allowed because not listed in AllowUsers Dec 26 03:34:36 host sshd[28089]: input_userauth_request: invalid user root [preauth] Dec 26 03:34:36 host unix_chkpwd[28093]: password check failed for user (root) Dec 26 03:34:36 host sshd[28089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.71.33 user=root Dec 26 03:34:36 host sshd[28089]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 03:34:38 host sshd[28089]: Failed password for invalid user root from 43.153.71.33 port 47050 ssh2 Dec 26 03:34:39 host sshd[28089]: Received disconnect from 43.153.71.33 port 47050:11: Bye Bye [preauth] Dec 26 03:34:39 host sshd[28089]: Disconnected from 43.153.71.33 port 47050 [preauth] Dec 26 03:35:25 host sshd[28250]: User root from 5.196.68.38 not allowed because not listed in AllowUsers Dec 26 03:35:25 host sshd[28250]: input_userauth_request: invalid user root [preauth] Dec 26 03:35:25 host unix_chkpwd[28255]: password check failed for user (root) Dec 26 03:35:25 host sshd[28250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.68.38 user=root Dec 26 03:35:25 host sshd[28250]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 03:35:27 host sshd[28253]: User root from 179.131.10.103 not allowed because not listed in AllowUsers Dec 26 03:35:27 host sshd[28253]: input_userauth_request: invalid user root [preauth] Dec 26 03:35:27 host unix_chkpwd[28258]: password check failed for user (root) Dec 26 03:35:27 host sshd[28253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.131.10.103 user=root Dec 26 03:35:27 host sshd[28253]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 03:35:27 host sshd[28250]: Failed password for invalid user root from 5.196.68.38 port 46038 ssh2 Dec 26 03:35:27 host sshd[28250]: Received disconnect from 5.196.68.38 port 46038:11: Bye Bye [preauth] Dec 26 03:35:27 host sshd[28250]: Disconnected from 5.196.68.38 port 46038 [preauth] Dec 26 03:35:28 host sshd[28253]: Failed password for invalid user root from 179.131.10.103 port 21000 ssh2 Dec 26 03:35:29 host sshd[28253]: Received disconnect from 179.131.10.103 port 21000:11: Bye Bye [preauth] Dec 26 03:35:29 host sshd[28253]: Disconnected from 179.131.10.103 port 21000 [preauth] Dec 26 03:35:31 host sshd[28261]: User root from 189.6.45.130 not allowed because not listed in AllowUsers Dec 26 03:35:31 host sshd[28261]: input_userauth_request: invalid user root [preauth] Dec 26 03:35:31 host unix_chkpwd[28322]: password check failed for user (root) Dec 26 03:35:31 host sshd[28261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.6.45.130 user=root Dec 26 03:35:31 host sshd[28261]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 03:35:33 host sshd[28261]: Failed password for invalid user root from 189.6.45.130 port 53331 ssh2 Dec 26 03:35:34 host sshd[28261]: Received disconnect from 189.6.45.130 port 53331:11: Bye Bye [preauth] Dec 26 03:35:34 host sshd[28261]: Disconnected from 189.6.45.130 port 53331 [preauth] Dec 26 03:35:53 host sshd[28375]: User root from 177.102.140.51 not allowed because not listed in AllowUsers Dec 26 03:35:53 host sshd[28375]: input_userauth_request: invalid user root [preauth] Dec 26 03:35:53 host unix_chkpwd[28379]: password check failed for user (root) Dec 26 03:35:53 host sshd[28375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.102.140.51 user=root Dec 26 03:35:53 host sshd[28375]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 03:35:55 host sshd[28375]: Failed password for invalid user root from 177.102.140.51 port 47602 ssh2 Dec 26 03:35:55 host sshd[28375]: Received disconnect from 177.102.140.51 port 47602:11: Bye Bye [preauth] Dec 26 03:35:55 host sshd[28375]: Disconnected from 177.102.140.51 port 47602 [preauth] Dec 26 03:36:13 host sshd[28450]: User root from 197.5.145.8 not allowed because not listed in AllowUsers Dec 26 03:36:13 host sshd[28450]: input_userauth_request: invalid user root [preauth] Dec 26 03:36:13 host unix_chkpwd[28454]: password check failed for user (root) Dec 26 03:36:13 host sshd[28450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.8 user=root Dec 26 03:36:13 host sshd[28450]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 03:36:15 host sshd[28450]: Failed password for invalid user root from 197.5.145.8 port 23102 ssh2 Dec 26 03:36:15 host sshd[28450]: Received disconnect from 197.5.145.8 port 23102:11: Bye Bye [preauth] Dec 26 03:36:15 host sshd[28450]: Disconnected from 197.5.145.8 port 23102 [preauth] Dec 26 03:36:19 host sshd[28490]: User root from 185.159.82.135 not allowed because not listed in AllowUsers Dec 26 03:36:19 host sshd[28490]: input_userauth_request: invalid user root [preauth] Dec 26 03:36:19 host unix_chkpwd[28492]: password check failed for user (root) Dec 26 03:36:19 host sshd[28490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.159.82.135 user=root Dec 26 03:36:19 host sshd[28490]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 03:36:20 host sshd[28490]: Failed password for invalid user root from 185.159.82.135 port 46222 ssh2 Dec 26 03:36:20 host sshd[28490]: Received disconnect from 185.159.82.135 port 46222:11: Bye Bye [preauth] Dec 26 03:36:20 host sshd[28490]: Disconnected from 185.159.82.135 port 46222 [preauth] Dec 26 03:50:23 host sshd[30665]: User root from 101.33.80.197 not allowed because not listed in AllowUsers Dec 26 03:50:23 host sshd[30665]: input_userauth_request: invalid user root [preauth] Dec 26 03:50:23 host unix_chkpwd[30675]: password check failed for user (root) Dec 26 03:50:23 host sshd[30665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.33.80.197 user=root Dec 26 03:50:23 host sshd[30665]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 03:50:25 host sshd[30665]: Failed password for invalid user root from 101.33.80.197 port 51056 ssh2 Dec 26 03:50:25 host sshd[30665]: Received disconnect from 101.33.80.197 port 51056:11: Bye Bye [preauth] Dec 26 03:50:25 host sshd[30665]: Disconnected from 101.33.80.197 port 51056 [preauth] Dec 26 03:56:22 host sshd[31698]: Invalid user user from 84.110.99.202 port 51656 Dec 26 03:56:22 host sshd[31698]: input_userauth_request: invalid user user [preauth] Dec 26 03:56:22 host sshd[31698]: pam_unix(sshd:auth): check pass; user unknown Dec 26 03:56:22 host sshd[31698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.110.99.202 Dec 26 03:56:24 host sshd[31698]: Failed password for invalid user user from 84.110.99.202 port 51656 ssh2 Dec 26 03:56:25 host sshd[31698]: Connection closed by 84.110.99.202 port 51656 [preauth] Dec 26 03:59:43 host sshd[32134]: User root from 66.249.155.244 not allowed because not listed in AllowUsers Dec 26 03:59:43 host sshd[32134]: input_userauth_request: invalid user root [preauth] Dec 26 03:59:43 host unix_chkpwd[32137]: password check failed for user (root) Dec 26 03:59:43 host sshd[32134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.249.155.244 user=root Dec 26 03:59:43 host sshd[32134]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 03:59:45 host sshd[32134]: Failed password for invalid user root from 66.249.155.244 port 56322 ssh2 Dec 26 03:59:45 host sshd[32134]: Received disconnect from 66.249.155.244 port 56322:11: Bye Bye [preauth] Dec 26 03:59:45 host sshd[32134]: Disconnected from 66.249.155.244 port 56322 [preauth] Dec 26 04:02:46 host sshd[32635]: User root from 66.249.155.244 not allowed because not listed in AllowUsers Dec 26 04:02:46 host sshd[32635]: input_userauth_request: invalid user root [preauth] Dec 26 04:02:46 host unix_chkpwd[32641]: password check failed for user (root) Dec 26 04:02:46 host sshd[32635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.249.155.244 user=root Dec 26 04:02:46 host sshd[32635]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 04:02:49 host sshd[32635]: Failed password for invalid user root from 66.249.155.244 port 40516 ssh2 Dec 26 04:02:49 host sshd[32635]: Received disconnect from 66.249.155.244 port 40516:11: Bye Bye [preauth] Dec 26 04:02:49 host sshd[32635]: Disconnected from 66.249.155.244 port 40516 [preauth] Dec 26 04:02:50 host sshd[32648]: Did not receive identification string from 205.185.123.43 port 56316 Dec 26 04:07:27 host sshd[1031]: User root from 41.197.31.178 not allowed because not listed in AllowUsers Dec 26 04:07:27 host sshd[1031]: input_userauth_request: invalid user root [preauth] Dec 26 04:07:28 host unix_chkpwd[1036]: password check failed for user (root) Dec 26 04:07:28 host sshd[1031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 user=root Dec 26 04:07:28 host sshd[1031]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 04:07:30 host sshd[1031]: Failed password for invalid user root from 41.197.31.178 port 35878 ssh2 Dec 26 04:07:30 host sshd[1031]: Connection closed by 41.197.31.178 port 35878 [preauth] Dec 26 04:17:17 host sshd[2609]: Invalid user oracle from 103.13.40.2 port 51996 Dec 26 04:17:17 host sshd[2609]: input_userauth_request: invalid user oracle [preauth] Dec 26 04:17:17 host sshd[2609]: pam_unix(sshd:auth): check pass; user unknown Dec 26 04:17:17 host sshd[2609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 26 04:17:19 host sshd[2609]: Failed password for invalid user oracle from 103.13.40.2 port 51996 ssh2 Dec 26 04:17:19 host sshd[2609]: Connection closed by 103.13.40.2 port 51996 [preauth] Dec 26 04:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 04:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 04:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 04:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 04:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 04:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 04:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 04:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 04:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 04:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 26 04:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 04:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 04:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 26 04:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 04:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 04:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 26 04:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 04:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 04:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 26 04:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 04:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 04:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 26 04:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 04:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 04:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 26 04:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 04:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 04:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 26 04:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 04:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 04:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 26 04:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 04:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 04:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 04:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 04:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 04:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 26 04:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 04:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 04:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=ugotscom user-2=wwwresourcehunte user-3=keralaholi user-4=wwwrmswll user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=a2zgroup user-9=dartsimp user-10=wwwkaretakers user-11=cochintaxi user-12=mrsclean user-13=wwwnexidigital user-14=kottayamcalldriv user-15=phmetals user-16=palco123 user-17=gifterman user-18=wwwletsstalkfood user-19=straightcurve user-20=wwwevmhonda user-21=bonifacegroup user-22=pmcresources user-23=shalinijames user-24=wwwtestugo user-25=vfmassets user-26=woodpeck user-27=wwwkapin user-28=disposeat user-29=wwwkmaorg user-30=remysagr feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 26 04:21:47 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 26 04:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 04:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 04:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 04:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 04:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 04:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-6k1lGknJHIMzzjBg.~ Dec 26 04:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 04:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 04:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-6k1lGknJHIMzzjBg.~' Dec 26 04:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 04:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 04:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-6k1lGknJHIMzzjBg.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 04:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 04:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 04:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 26 04:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 04:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 26 04:21:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 04:21:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 04:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 04:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 04:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 26 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 26 04:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 26 04:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 26 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 26 04:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 04:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 26 04:22:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 04:22:05 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 04:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 26 04:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 04:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 04:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 26 04:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 04:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 04:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 26 04:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 04:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 04:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 26 04:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 04:22:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 04:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 26 04:22:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 04:22:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 04:22:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 26 04:22:16 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 04:22:19 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 04:23:15 host sshd[3866]: User root from 50.229.145.242 not allowed because not listed in AllowUsers Dec 26 04:23:15 host sshd[3866]: input_userauth_request: invalid user root [preauth] Dec 26 04:23:15 host unix_chkpwd[3872]: password check failed for user (root) Dec 26 04:23:15 host sshd[3866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.229.145.242 user=root Dec 26 04:23:15 host sshd[3866]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 04:23:17 host sshd[3866]: Failed password for invalid user root from 50.229.145.242 port 37378 ssh2 Dec 26 04:23:17 host sshd[3866]: Received disconnect from 50.229.145.242 port 37378:11: Bye Bye [preauth] Dec 26 04:23:17 host sshd[3866]: Disconnected from 50.229.145.242 port 37378 [preauth] Dec 26 04:24:07 host sshd[3990]: Invalid user liwp from 134.122.90.159 port 48582 Dec 26 04:24:07 host sshd[3990]: input_userauth_request: invalid user liwp [preauth] Dec 26 04:24:08 host sshd[3990]: pam_unix(sshd:auth): check pass; user unknown Dec 26 04:24:08 host sshd[3990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.90.159 Dec 26 04:24:09 host sshd[3990]: Failed password for invalid user liwp from 134.122.90.159 port 48582 ssh2 Dec 26 04:24:10 host sshd[3990]: Connection closed by 134.122.90.159 port 48582 [preauth] Dec 26 04:25:16 host sshd[4274]: User root from 117.174.183.208 not allowed because not listed in AllowUsers Dec 26 04:25:16 host sshd[4274]: input_userauth_request: invalid user root [preauth] Dec 26 04:25:16 host unix_chkpwd[4279]: password check failed for user (root) Dec 26 04:25:16 host sshd[4274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.174.183.208 user=root Dec 26 04:25:16 host sshd[4274]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 04:25:19 host sshd[4274]: Failed password for invalid user root from 117.174.183.208 port 58390 ssh2 Dec 26 04:25:19 host sshd[4274]: Received disconnect from 117.174.183.208 port 58390:11: Bye Bye [preauth] Dec 26 04:25:19 host sshd[4274]: Disconnected from 117.174.183.208 port 58390 [preauth] Dec 26 04:25:34 host sshd[4343]: User root from 121.126.223.225 not allowed because not listed in AllowUsers Dec 26 04:25:34 host sshd[4343]: input_userauth_request: invalid user root [preauth] Dec 26 04:25:34 host unix_chkpwd[4347]: password check failed for user (root) Dec 26 04:25:34 host sshd[4343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.126.223.225 user=root Dec 26 04:25:34 host sshd[4343]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 04:25:36 host sshd[4343]: Failed password for invalid user root from 121.126.223.225 port 43136 ssh2 Dec 26 04:25:36 host sshd[4343]: Received disconnect from 121.126.223.225 port 43136:11: Bye Bye [preauth] Dec 26 04:25:36 host sshd[4343]: Disconnected from 121.126.223.225 port 43136 [preauth] Dec 26 04:26:39 host sshd[4505]: User root from 104.248.20.85 not allowed because not listed in AllowUsers Dec 26 04:26:39 host sshd[4505]: input_userauth_request: invalid user root [preauth] Dec 26 04:26:39 host unix_chkpwd[4508]: password check failed for user (root) Dec 26 04:26:39 host sshd[4505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.20.85 user=root Dec 26 04:26:39 host sshd[4505]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 04:26:41 host sshd[4505]: Failed password for invalid user root from 104.248.20.85 port 56612 ssh2 Dec 26 04:26:42 host sshd[4505]: Received disconnect from 104.248.20.85 port 56612:11: Bye Bye [preauth] Dec 26 04:26:42 host sshd[4505]: Disconnected from 104.248.20.85 port 56612 [preauth] Dec 26 04:28:28 host sshd[4920]: User root from 104.248.20.85 not allowed because not listed in AllowUsers Dec 26 04:28:28 host sshd[4920]: input_userauth_request: invalid user root [preauth] Dec 26 04:28:28 host unix_chkpwd[4929]: password check failed for user (root) Dec 26 04:28:28 host sshd[4920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.20.85 user=root Dec 26 04:28:28 host sshd[4920]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 04:28:31 host sshd[4920]: Failed password for invalid user root from 104.248.20.85 port 56710 ssh2 Dec 26 04:28:31 host sshd[4920]: Received disconnect from 104.248.20.85 port 56710:11: Bye Bye [preauth] Dec 26 04:28:31 host sshd[4920]: Disconnected from 104.248.20.85 port 56710 [preauth] Dec 26 04:28:55 host sshd[5001]: User root from 121.126.223.225 not allowed because not listed in AllowUsers Dec 26 04:28:55 host sshd[5001]: input_userauth_request: invalid user root [preauth] Dec 26 04:28:55 host unix_chkpwd[5005]: password check failed for user (root) Dec 26 04:28:55 host sshd[5001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.126.223.225 user=root Dec 26 04:28:55 host sshd[5001]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 04:28:56 host sshd[4990]: Connection closed by 50.229.145.242 port 59656 [preauth] Dec 26 04:28:56 host sshd[5001]: Failed password for invalid user root from 121.126.223.225 port 52054 ssh2 Dec 26 04:28:57 host sshd[5001]: Received disconnect from 121.126.223.225 port 52054:11: Bye Bye [preauth] Dec 26 04:28:57 host sshd[5001]: Disconnected from 121.126.223.225 port 52054 [preauth] Dec 26 04:30:22 host sshd[5083]: Connection closed by 117.174.183.208 port 39826 [preauth] Dec 26 04:31:46 host sshd[5500]: User root from 117.174.183.208 not allowed because not listed in AllowUsers Dec 26 04:31:46 host sshd[5500]: input_userauth_request: invalid user root [preauth] Dec 26 04:31:46 host unix_chkpwd[5505]: password check failed for user (root) Dec 26 04:31:46 host sshd[5500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.174.183.208 user=root Dec 26 04:31:46 host sshd[5500]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 04:31:49 host sshd[5500]: Failed password for invalid user root from 117.174.183.208 port 40974 ssh2 Dec 26 04:31:49 host sshd[5500]: Received disconnect from 117.174.183.208 port 40974:11: Bye Bye [preauth] Dec 26 04:31:49 host sshd[5500]: Disconnected from 117.174.183.208 port 40974 [preauth] Dec 26 04:32:09 host sshd[5678]: Invalid user from 64.62.197.160 port 17515 Dec 26 04:32:09 host sshd[5678]: input_userauth_request: invalid user [preauth] Dec 26 04:32:12 host sshd[5678]: Connection closed by 64.62.197.160 port 17515 [preauth] Dec 26 04:32:59 host sshd[5777]: User root from 50.229.145.242 not allowed because not listed in AllowUsers Dec 26 04:32:59 host sshd[5777]: input_userauth_request: invalid user root [preauth] Dec 26 04:32:59 host unix_chkpwd[5787]: password check failed for user (root) Dec 26 04:32:59 host sshd[5777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.229.145.242 user=root Dec 26 04:32:59 host sshd[5777]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 04:33:01 host sshd[5777]: Failed password for invalid user root from 50.229.145.242 port 33142 ssh2 Dec 26 04:36:31 host sshd[6360]: Invalid user postgres from 162.218.126.136 port 46078 Dec 26 04:36:31 host sshd[6360]: input_userauth_request: invalid user postgres [preauth] Dec 26 04:36:31 host sshd[6360]: pam_unix(sshd:auth): check pass; user unknown Dec 26 04:36:31 host sshd[6360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 26 04:36:33 host sshd[6360]: Failed password for invalid user postgres from 162.218.126.136 port 46078 ssh2 Dec 26 04:36:33 host sshd[6360]: Connection closed by 162.218.126.136 port 46078 [preauth] Dec 26 04:38:19 host sshd[6554]: Invalid user ftpuser from 106.10.122.53 port 40152 Dec 26 04:38:19 host sshd[6554]: input_userauth_request: invalid user ftpuser [preauth] Dec 26 04:38:19 host sshd[6554]: pam_unix(sshd:auth): check pass; user unknown Dec 26 04:38:19 host sshd[6554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 26 04:38:21 host sshd[6554]: Failed password for invalid user ftpuser from 106.10.122.53 port 40152 ssh2 Dec 26 04:38:21 host sshd[6554]: Connection closed by 106.10.122.53 port 40152 [preauth] Dec 26 04:44:13 host sshd[7499]: User root from 152.32.129.246 not allowed because not listed in AllowUsers Dec 26 04:44:13 host sshd[7499]: input_userauth_request: invalid user root [preauth] Dec 26 04:44:13 host unix_chkpwd[7502]: password check failed for user (root) Dec 26 04:44:13 host sshd[7499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.129.246 user=root Dec 26 04:44:13 host sshd[7499]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 04:44:15 host sshd[7499]: Failed password for invalid user root from 152.32.129.246 port 54322 ssh2 Dec 26 04:44:15 host sshd[7499]: Received disconnect from 152.32.129.246 port 54322:11: Bye Bye [preauth] Dec 26 04:44:15 host sshd[7499]: Disconnected from 152.32.129.246 port 54322 [preauth] Dec 26 04:44:55 host sshd[7571]: User root from 84.201.159.27 not allowed because not listed in AllowUsers Dec 26 04:44:55 host sshd[7571]: input_userauth_request: invalid user root [preauth] Dec 26 04:44:55 host unix_chkpwd[7574]: password check failed for user (root) Dec 26 04:44:55 host sshd[7571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.159.27 user=root Dec 26 04:44:55 host sshd[7571]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 04:44:57 host sshd[7571]: Failed password for invalid user root from 84.201.159.27 port 55648 ssh2 Dec 26 04:44:58 host sshd[7571]: Received disconnect from 84.201.159.27 port 55648:11: Bye Bye [preauth] Dec 26 04:44:58 host sshd[7571]: Disconnected from 84.201.159.27 port 55648 [preauth] Dec 26 04:45:39 host sshd[7703]: User root from 20.36.182.53 not allowed because not listed in AllowUsers Dec 26 04:45:39 host sshd[7703]: input_userauth_request: invalid user root [preauth] Dec 26 04:45:39 host unix_chkpwd[7706]: password check failed for user (root) Dec 26 04:45:39 host sshd[7703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.36.182.53 user=root Dec 26 04:45:39 host sshd[7703]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 04:45:41 host sshd[7703]: Failed password for invalid user root from 20.36.182.53 port 34940 ssh2 Dec 26 04:45:42 host sshd[7703]: Received disconnect from 20.36.182.53 port 34940:11: Bye Bye [preauth] Dec 26 04:45:42 host sshd[7703]: Disconnected from 20.36.182.53 port 34940 [preauth] Dec 26 04:47:59 host sshd[7998]: User root from 116.203.254.255 not allowed because not listed in AllowUsers Dec 26 04:47:59 host sshd[7998]: input_userauth_request: invalid user root [preauth] Dec 26 04:47:59 host unix_chkpwd[8001]: password check failed for user (root) Dec 26 04:47:59 host sshd[7998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.203.254.255 user=root Dec 26 04:47:59 host sshd[7998]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 04:48:01 host sshd[7998]: Failed password for invalid user root from 116.203.254.255 port 55274 ssh2 Dec 26 04:48:02 host sshd[7998]: Received disconnect from 116.203.254.255 port 55274:11: Bye Bye [preauth] Dec 26 04:48:02 host sshd[7998]: Disconnected from 116.203.254.255 port 55274 [preauth] Dec 26 04:48:59 host sshd[8124]: User root from 45.64.185.187 not allowed because not listed in AllowUsers Dec 26 04:48:59 host sshd[8124]: input_userauth_request: invalid user root [preauth] Dec 26 04:48:59 host unix_chkpwd[8131]: password check failed for user (root) Dec 26 04:48:59 host sshd[8124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.64.185.187 user=root Dec 26 04:48:59 host sshd[8124]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 04:49:00 host sshd[8124]: Failed password for invalid user root from 45.64.185.187 port 35194 ssh2 Dec 26 04:49:01 host sshd[8124]: Received disconnect from 45.64.185.187 port 35194:11: Bye Bye [preauth] Dec 26 04:49:01 host sshd[8124]: Disconnected from 45.64.185.187 port 35194 [preauth] Dec 26 04:49:04 host sshd[8163]: User root from 182.71.233.139 not allowed because not listed in AllowUsers Dec 26 04:49:04 host sshd[8163]: input_userauth_request: invalid user root [preauth] Dec 26 04:49:04 host unix_chkpwd[8165]: password check failed for user (root) Dec 26 04:49:04 host sshd[8163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.71.233.139 user=root Dec 26 04:49:04 host sshd[8163]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 04:49:06 host sshd[8163]: Failed password for invalid user root from 182.71.233.139 port 21399 ssh2 Dec 26 04:49:06 host sshd[8163]: Received disconnect from 182.71.233.139 port 21399:11: Bye Bye [preauth] Dec 26 04:49:06 host sshd[8163]: Disconnected from 182.71.233.139 port 21399 [preauth] Dec 26 04:49:48 host sshd[8263]: User root from 20.36.182.53 not allowed because not listed in AllowUsers Dec 26 04:49:48 host sshd[8263]: input_userauth_request: invalid user root [preauth] Dec 26 04:49:48 host unix_chkpwd[8269]: password check failed for user (root) Dec 26 04:49:48 host sshd[8263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.36.182.53 user=root Dec 26 04:49:48 host sshd[8263]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 04:49:50 host sshd[8263]: Failed password for invalid user root from 20.36.182.53 port 55926 ssh2 Dec 26 04:49:50 host sshd[8263]: Received disconnect from 20.36.182.53 port 55926:11: Bye Bye [preauth] Dec 26 04:49:50 host sshd[8263]: Disconnected from 20.36.182.53 port 55926 [preauth] Dec 26 04:49:56 host sshd[8374]: User root from 116.203.254.255 not allowed because not listed in AllowUsers Dec 26 04:49:56 host sshd[8374]: input_userauth_request: invalid user root [preauth] Dec 26 04:49:56 host unix_chkpwd[8376]: password check failed for user (root) Dec 26 04:49:56 host sshd[8374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.203.254.255 user=root Dec 26 04:49:56 host sshd[8374]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 04:49:58 host sshd[8374]: Failed password for invalid user root from 116.203.254.255 port 33024 ssh2 Dec 26 04:49:58 host sshd[8374]: Received disconnect from 116.203.254.255 port 33024:11: Bye Bye [preauth] Dec 26 04:49:58 host sshd[8374]: Disconnected from 116.203.254.255 port 33024 [preauth] Dec 26 04:50:28 host sshd[8546]: Invalid user cv from 45.93.201.90 port 50682 Dec 26 04:50:28 host sshd[8546]: input_userauth_request: invalid user cv [preauth] Dec 26 04:50:28 host sshd[8546]: pam_unix(sshd:auth): check pass; user unknown Dec 26 04:50:28 host sshd[8546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 26 04:50:30 host sshd[8546]: Failed password for invalid user cv from 45.93.201.90 port 50682 ssh2 Dec 26 04:50:32 host sshd[8554]: User root from 84.201.159.27 not allowed because not listed in AllowUsers Dec 26 04:50:32 host sshd[8554]: input_userauth_request: invalid user root [preauth] Dec 26 04:50:32 host unix_chkpwd[8557]: password check failed for user (root) Dec 26 04:50:32 host sshd[8554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.159.27 user=root Dec 26 04:50:32 host sshd[8554]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 04:50:33 host sshd[8546]: pam_unix(sshd:auth): check pass; user unknown Dec 26 04:50:34 host sshd[8554]: Failed password for invalid user root from 84.201.159.27 port 53672 ssh2 Dec 26 04:50:35 host sshd[8546]: Failed password for invalid user cv from 45.93.201.90 port 50682 ssh2 Dec 26 04:50:38 host sshd[8596]: User root from 152.32.129.246 not allowed because not listed in AllowUsers Dec 26 04:50:38 host sshd[8596]: input_userauth_request: invalid user root [preauth] Dec 26 04:50:38 host sshd[8546]: pam_unix(sshd:auth): check pass; user unknown Dec 26 04:50:38 host unix_chkpwd[8598]: password check failed for user (root) Dec 26 04:50:38 host sshd[8596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.129.246 user=root Dec 26 04:50:38 host sshd[8596]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 04:50:40 host sshd[8546]: Failed password for invalid user cv from 45.93.201.90 port 50682 ssh2 Dec 26 04:50:40 host sshd[8596]: Failed password for invalid user root from 152.32.129.246 port 56658 ssh2 Dec 26 04:50:40 host sshd[8596]: Received disconnect from 152.32.129.246 port 56658:11: Bye Bye [preauth] Dec 26 04:50:40 host sshd[8596]: Disconnected from 152.32.129.246 port 56658 [preauth] Dec 26 04:50:41 host sshd[8600]: User root from 40.69.41.41 not allowed because not listed in AllowUsers Dec 26 04:50:41 host sshd[8600]: input_userauth_request: invalid user root [preauth] Dec 26 04:50:41 host unix_chkpwd[8605]: password check failed for user (root) Dec 26 04:50:41 host sshd[8600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.69.41.41 user=root Dec 26 04:50:41 host sshd[8600]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 04:50:43 host sshd[8546]: Connection closed by 45.93.201.90 port 50682 [preauth] Dec 26 04:50:43 host sshd[8546]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 26 04:50:43 host sshd[8600]: Failed password for invalid user root from 40.69.41.41 port 39422 ssh2 Dec 26 04:50:43 host sshd[8600]: Received disconnect from 40.69.41.41 port 39422:11: Bye Bye [preauth] Dec 26 04:50:43 host sshd[8600]: Disconnected from 40.69.41.41 port 39422 [preauth] Dec 26 04:52:30 host sshd[8870]: User root from 182.71.233.139 not allowed because not listed in AllowUsers Dec 26 04:52:30 host sshd[8870]: input_userauth_request: invalid user root [preauth] Dec 26 04:52:30 host unix_chkpwd[8873]: password check failed for user (root) Dec 26 04:52:30 host sshd[8870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.71.233.139 user=root Dec 26 04:52:30 host sshd[8870]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 04:52:32 host sshd[8870]: Failed password for invalid user root from 182.71.233.139 port 52569 ssh2 Dec 26 04:52:32 host sshd[8870]: Received disconnect from 182.71.233.139 port 52569:11: Bye Bye [preauth] Dec 26 04:52:32 host sshd[8870]: Disconnected from 182.71.233.139 port 52569 [preauth] Dec 26 04:56:08 host sshd[9447]: User root from 40.69.41.41 not allowed because not listed in AllowUsers Dec 26 04:56:08 host sshd[9447]: input_userauth_request: invalid user root [preauth] Dec 26 04:56:08 host unix_chkpwd[9453]: password check failed for user (root) Dec 26 04:56:08 host sshd[9447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.69.41.41 user=root Dec 26 04:56:08 host sshd[9447]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 04:56:10 host sshd[9447]: Failed password for invalid user root from 40.69.41.41 port 56324 ssh2 Dec 26 04:56:10 host sshd[9447]: Received disconnect from 40.69.41.41 port 56324:11: Bye Bye [preauth] Dec 26 04:56:10 host sshd[9447]: Disconnected from 40.69.41.41 port 56324 [preauth] Dec 26 05:01:22 host sshd[10497]: User root from 45.64.185.187 not allowed because not listed in AllowUsers Dec 26 05:01:22 host sshd[10497]: input_userauth_request: invalid user root [preauth] Dec 26 05:01:22 host unix_chkpwd[10511]: password check failed for user (root) Dec 26 05:01:22 host sshd[10497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.64.185.187 user=root Dec 26 05:01:22 host sshd[10497]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:01:24 host sshd[10497]: Failed password for invalid user root from 45.64.185.187 port 55718 ssh2 Dec 26 05:01:24 host sshd[10497]: Received disconnect from 45.64.185.187 port 55718:11: Bye Bye [preauth] Dec 26 05:01:24 host sshd[10497]: Disconnected from 45.64.185.187 port 55718 [preauth] Dec 26 05:11:24 host sshd[12082]: Did not receive identification string from 103.108.112.10 port 52498 Dec 26 05:15:54 host sshd[12615]: Invalid user user1 from 92.46.108.20 port 45746 Dec 26 05:15:54 host sshd[12615]: input_userauth_request: invalid user user1 [preauth] Dec 26 05:15:54 host sshd[12615]: pam_unix(sshd:auth): check pass; user unknown Dec 26 05:15:54 host sshd[12615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 26 05:15:56 host sshd[12615]: Failed password for invalid user user1 from 92.46.108.20 port 45746 ssh2 Dec 26 05:15:57 host sshd[12615]: Connection closed by 92.46.108.20 port 45746 [preauth] Dec 26 05:19:54 host sshd[13209]: User root from 84.110.99.202 not allowed because not listed in AllowUsers Dec 26 05:19:54 host sshd[13209]: input_userauth_request: invalid user root [preauth] Dec 26 05:19:54 host unix_chkpwd[13214]: password check failed for user (root) Dec 26 05:19:54 host sshd[13209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.110.99.202 user=root Dec 26 05:19:54 host sshd[13209]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:19:56 host sshd[13209]: Failed password for invalid user root from 84.110.99.202 port 59846 ssh2 Dec 26 05:19:56 host sshd[13209]: Connection closed by 84.110.99.202 port 59846 [preauth] Dec 26 05:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 05:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 05:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 05:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 26 05:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 26 05:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 26 05:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 26 05:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 26 05:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 26 05:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 26 05:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 26 05:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 05:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 26 05:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=travelboniface user-2=ugotscom user-3=wwwresourcehunte user-4=keralaholi user-5=wwwrmswll user-6=wwwpmcresource user-7=a2zgroup user-8=dartsimp user-9=laundryboniface user-10=wwwkaretakers user-11=cochintaxi user-12=phmetals user-13=kottayamcalldriv user-14=palco123 user-15=gifterman user-16=mrsclean user-17=wwwnexidigital user-18=wwwevmhonda user-19=bonifacegroup user-20=wwwletsstalkfood user-21=straightcurve user-22=shalinijames user-23=wwwtestugo user-24=vfmassets user-25=pmcresources user-26=disposeat user-27=remysagr user-28=wwwkmaorg user-29=woodpeck user-30=wwwkapin feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 26 05:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 26 05:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 26 05:21:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 05:21:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=evmhonda.com --output=json Dec 26 05:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/test -e /home/wwwevmhonda/wordpress-backups Dec 26 05:21:48 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 26 05:21:48 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 26 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && find -H /home/wwwevmhonda/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 26 05:21:48 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 26 05:21:48 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 26 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=letsstalkfood.com --output=json Dec 26 05:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/wordpress-backups Dec 26 05:21:48 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 05:21:48 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && find -H /home/wwwletsstalkfood/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 26 05:21:48 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 05:21:48 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=mrsclean.co.in --output=json Dec 26 05:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Dec 26 05:21:48 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 26 05:21:48 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 26 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 26 05:21:48 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 26 05:21:48 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 26 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Dec 26 05:21:48 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 26 05:21:48 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 26 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 26 05:21:48 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 26 05:21:48 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 26 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=shalinijames.com --output=json Dec 26 05:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/wordpress-backups Dec 26 05:21:49 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 05:21:49 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && find -H /home/shalinijames/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 26 05:21:49 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 05:21:49 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=testugo.in --output=json Dec 26 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Dec 26 05:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 05:21:49 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 26 05:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 05:21:49 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Dec 26 05:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 05:21:49 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 26 05:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 05:21:49 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Dec 26 05:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 05:21:49 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 26 05:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 05:21:49 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=ugotechnologies.com --output=json Dec 26 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Dec 26 05:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 05:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 26 05:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 05:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Dec 26 05:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 05:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 26 05:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 05:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Dec 26 05:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 05:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 26 05:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 05:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=woodpeckerindia.com --output=json Dec 26 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/wordpress-backups Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 26 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && find -H /home/woodpeck/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 26 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=panlys.com --output=json Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/wordpress-backups Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 26 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && find -H /home/palco123/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 26 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=resourcehunters.com --output=json Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/wordpress-backups Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && find -H /home/wwwresourcehunte/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /var/cpanel/licenseid_credentials.json Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=travelboniface ; COMMAND=/bin/cat /home/travelboniface/.wp-toolkit-identifier Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session opened for user travelboniface by (uid=0) Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session closed for user travelboniface Dec 26 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/cat /home/wwwresourcehunte/.wp-toolkit-identifier Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 26 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 26 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-dSea0d87UIz8xrni.wp-toolkit-identifier Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 26 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-dSea0d87UIz8xrni.wp-toolkit-identifier Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 26 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwrmswll ; COMMAND=/bin/cat /home/wwwrmswll/.wp-toolkit-identifier Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwrmswll by (uid=0) Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwrmswll Dec 26 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwpmcresource ; COMMAND=/bin/cat /home/wwwpmcresource/.wp-toolkit-identifier Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwpmcresource by (uid=0) Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwpmcresource Dec 26 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=a2zgroup ; COMMAND=/bin/cat /home/a2zgroup/.wp-toolkit-identifier Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session opened for user a2zgroup by (uid=0) Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session closed for user a2zgroup Dec 26 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=dartsimp ; COMMAND=/bin/cat /home/dartsimp/.wp-toolkit-identifier Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session opened for user dartsimp by (uid=0) Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session closed for user dartsimp Dec 26 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=laundryboniface ; COMMAND=/bin/cat /home/laundryboniface/.wp-toolkit-identifier Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session opened for user laundryboniface by (uid=0) Dec 26 05:21:50 host sudo: pam_unix(sudo:session): session closed for user laundryboniface Dec 26 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkaretakers ; COMMAND=/bin/cat /home/wwwkaretakers/.wp-toolkit-identifier Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwkaretakers by (uid=0) Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwkaretakers Dec 26 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=cochintaxi ; COMMAND=/bin/cat /home/cochintaxi/.wp-toolkit-identifier Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session opened for user cochintaxi by (uid=0) Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session closed for user cochintaxi Dec 26 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=phmetals ; COMMAND=/bin/cat /home/phmetals/.wp-toolkit-identifier Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session opened for user phmetals by (uid=0) Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session closed for user phmetals Dec 26 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=kottayamcalldriv ; COMMAND=/bin/cat /home/kottayamcalldriv/.wp-toolkit-identifier Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session opened for user kottayamcalldriv by (uid=0) Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session closed for user kottayamcalldriv Dec 26 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/cat /home/palco123/.wp-toolkit-identifier Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 26 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=gifterman ; COMMAND=/bin/cat /home/gifterman/.wp-toolkit-identifier Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session opened for user gifterman by (uid=0) Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session closed for user gifterman Dec 26 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/.wp-toolkit-identifier Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 26 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwnexidigital ; COMMAND=/bin/cat /home/wwwnexidigital/.wp-toolkit-identifier Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwnexidigital by (uid=0) Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwnexidigital Dec 26 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/cat /home/wwwevmhonda/.wp-toolkit-identifier Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 26 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=bonifacegroup ; COMMAND=/bin/cat /home/bonifacegroup/.wp-toolkit-identifier Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session opened for user bonifacegroup by (uid=0) Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session closed for user bonifacegroup Dec 26 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/cat /home/wwwletsstalkfood/.wp-toolkit-identifier Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=straightcurve ; COMMAND=/bin/cat /home/straightcurve/.wp-toolkit-identifier Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session opened for user straightcurve by (uid=0) Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session closed for user straightcurve Dec 26 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/cat /home/shalinijames/.wp-toolkit-identifier Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/cat /home/wwwtestugo/.wp-toolkit-identifier Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=vfmassets ; COMMAND=/bin/cat /home/vfmassets/.wp-toolkit-identifier Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session opened for user vfmassets by (uid=0) Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session closed for user vfmassets Dec 26 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=pmcresources ; COMMAND=/bin/cat /home/pmcresources/.wp-toolkit-identifier Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session opened for user pmcresources by (uid=0) Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session closed for user pmcresources Dec 26 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=disposeat ; COMMAND=/bin/cat /home/disposeat/.wp-toolkit-identifier Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session opened for user disposeat by (uid=0) Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session closed for user disposeat Dec 26 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=remysagr ; COMMAND=/bin/cat /home/remysagr/.wp-toolkit-identifier Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session opened for user remysagr by (uid=0) Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session closed for user remysagr Dec 26 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkmaorg ; COMMAND=/bin/cat /home/wwwkmaorg/.wp-toolkit-identifier Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwkmaorg by (uid=0) Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwkmaorg Dec 26 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/cat /home/woodpeck/.wp-toolkit-identifier Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 26 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkapin ; COMMAND=/bin/cat /home/wwwkapin/.wp-toolkit-identifier Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwkapin by (uid=0) Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwkapin Dec 26 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 26 05:21:51 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 26 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Dec 26 05:21:52 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 26 05:21:52 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 26 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-lBnILXi0Yc6NUijN.wp-toolkit-identifier Dec 26 05:21:52 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 26 05:21:52 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 26 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-lBnILXi0Yc6NUijN.wp-toolkit-identifier Dec 26 05:21:52 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 26 05:21:52 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 26 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_shared_ip --output=json Dec 26 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_public_ip ip=167.71.234.10 --output=json Dec 26 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-jZy59Xtc5X9uD30H.~ Dec 26 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-jZy59Xtc5X9uD30H.~' Dec 26 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-jZy59Xtc5X9uD30H.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 26 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 26 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 26 05:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 26 05:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 26 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 26 05:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 05:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 26 05:22:05 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 05:22:07 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 05:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 26 05:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 05:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 05:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 26 05:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 05:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 05:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 26 05:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 05:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 05:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 26 05:22:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 05:22:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 05:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 26 05:22:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 05:22:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 05:22:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 26 05:22:18 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 05:22:19 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 05:22:45 host sshd[14113]: Did not receive identification string from 104.154.178.141 port 50888 Dec 26 05:23:12 host sshd[14264]: User root from 31.220.17.100 not allowed because not listed in AllowUsers Dec 26 05:23:12 host sshd[14264]: input_userauth_request: invalid user root [preauth] Dec 26 05:23:12 host unix_chkpwd[14268]: password check failed for user (root) Dec 26 05:23:12 host sshd[14264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.220.17.100 user=root Dec 26 05:23:12 host sshd[14264]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:23:14 host sshd[14264]: Failed password for invalid user root from 31.220.17.100 port 48212 ssh2 Dec 26 05:23:14 host sshd[14264]: Received disconnect from 31.220.17.100 port 48212:11: Bye Bye [preauth] Dec 26 05:23:14 host sshd[14264]: Disconnected from 31.220.17.100 port 48212 [preauth] Dec 26 05:23:19 host sshd[14282]: User root from 157.230.209.3 not allowed because not listed in AllowUsers Dec 26 05:23:19 host sshd[14282]: input_userauth_request: invalid user root [preauth] Dec 26 05:23:20 host unix_chkpwd[14285]: password check failed for user (root) Dec 26 05:23:20 host sshd[14282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.209.3 user=root Dec 26 05:23:20 host sshd[14282]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:23:21 host sshd[14282]: Failed password for invalid user root from 157.230.209.3 port 53744 ssh2 Dec 26 05:23:21 host sshd[14282]: Received disconnect from 157.230.209.3 port 53744:11: Bye Bye [preauth] Dec 26 05:23:21 host sshd[14282]: Disconnected from 157.230.209.3 port 53744 [preauth] Dec 26 05:23:45 host sshd[14340]: User root from 94.247.17.70 not allowed because not listed in AllowUsers Dec 26 05:23:45 host sshd[14340]: input_userauth_request: invalid user root [preauth] Dec 26 05:23:45 host unix_chkpwd[14347]: password check failed for user (root) Dec 26 05:23:45 host sshd[14340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.247.17.70 user=root Dec 26 05:23:45 host sshd[14340]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:23:47 host sshd[14340]: Failed password for invalid user root from 94.247.17.70 port 51370 ssh2 Dec 26 05:23:48 host sshd[14340]: Received disconnect from 94.247.17.70 port 51370:11: Bye Bye [preauth] Dec 26 05:23:48 host sshd[14340]: Disconnected from 94.247.17.70 port 51370 [preauth] Dec 26 05:24:48 host sshd[14468]: User root from 174.138.20.252 not allowed because not listed in AllowUsers Dec 26 05:24:48 host sshd[14468]: input_userauth_request: invalid user root [preauth] Dec 26 05:24:48 host unix_chkpwd[14470]: password check failed for user (root) Dec 26 05:24:48 host sshd[14468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.20.252 user=root Dec 26 05:24:48 host sshd[14468]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:24:50 host sshd[14468]: Failed password for invalid user root from 174.138.20.252 port 42794 ssh2 Dec 26 05:24:50 host sshd[14468]: Received disconnect from 174.138.20.252 port 42794:11: Bye Bye [preauth] Dec 26 05:24:50 host sshd[14468]: Disconnected from 174.138.20.252 port 42794 [preauth] Dec 26 05:24:58 host sshd[14488]: User root from 51.83.47.140 not allowed because not listed in AllowUsers Dec 26 05:24:58 host sshd[14488]: input_userauth_request: invalid user root [preauth] Dec 26 05:24:58 host unix_chkpwd[14490]: password check failed for user (root) Dec 26 05:24:58 host sshd[14488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.47.140 user=root Dec 26 05:24:58 host sshd[14488]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:25:00 host sshd[14488]: Failed password for invalid user root from 51.83.47.140 port 44738 ssh2 Dec 26 05:25:00 host sshd[14488]: Received disconnect from 51.83.47.140 port 44738:11: Bye Bye [preauth] Dec 26 05:25:00 host sshd[14488]: Disconnected from 51.83.47.140 port 44738 [preauth] Dec 26 05:25:13 host sshd[14527]: User root from 23.94.43.69 not allowed because not listed in AllowUsers Dec 26 05:25:13 host sshd[14527]: input_userauth_request: invalid user root [preauth] Dec 26 05:25:13 host unix_chkpwd[14530]: password check failed for user (root) Dec 26 05:25:13 host sshd[14527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.94.43.69 user=root Dec 26 05:25:13 host sshd[14527]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:25:15 host sshd[14527]: Failed password for invalid user root from 23.94.43.69 port 46218 ssh2 Dec 26 05:25:15 host sshd[14527]: Received disconnect from 23.94.43.69 port 46218:11: Bye Bye [preauth] Dec 26 05:25:15 host sshd[14527]: Disconnected from 23.94.43.69 port 46218 [preauth] Dec 26 05:25:20 host sshd[14547]: User root from 161.132.180.116 not allowed because not listed in AllowUsers Dec 26 05:25:20 host sshd[14547]: input_userauth_request: invalid user root [preauth] Dec 26 05:25:20 host unix_chkpwd[14552]: password check failed for user (root) Dec 26 05:25:20 host sshd[14547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.132.180.116 user=root Dec 26 05:25:20 host sshd[14547]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:25:21 host sshd[14547]: Failed password for invalid user root from 161.132.180.116 port 2845 ssh2 Dec 26 05:25:21 host sshd[14547]: Received disconnect from 161.132.180.116 port 2845:11: Bye Bye [preauth] Dec 26 05:25:21 host sshd[14547]: Disconnected from 161.132.180.116 port 2845 [preauth] Dec 26 05:25:23 host sshd[14556]: User root from 159.65.150.108 not allowed because not listed in AllowUsers Dec 26 05:25:23 host sshd[14556]: input_userauth_request: invalid user root [preauth] Dec 26 05:25:23 host unix_chkpwd[14559]: password check failed for user (root) Dec 26 05:25:23 host sshd[14556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.150.108 user=root Dec 26 05:25:23 host sshd[14556]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:25:26 host sshd[14556]: Failed password for invalid user root from 159.65.150.108 port 47836 ssh2 Dec 26 05:25:26 host sshd[14556]: Received disconnect from 159.65.150.108 port 47836:11: Bye Bye [preauth] Dec 26 05:25:26 host sshd[14556]: Disconnected from 159.65.150.108 port 47836 [preauth] Dec 26 05:25:39 host sshd[14605]: User root from 179.48.124.242 not allowed because not listed in AllowUsers Dec 26 05:25:39 host sshd[14605]: input_userauth_request: invalid user root [preauth] Dec 26 05:25:39 host unix_chkpwd[14610]: password check failed for user (root) Dec 26 05:25:39 host sshd[14605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.48.124.242 user=root Dec 26 05:25:39 host sshd[14605]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:25:41 host sshd[14605]: Failed password for invalid user root from 179.48.124.242 port 34268 ssh2 Dec 26 05:25:41 host sshd[14605]: Received disconnect from 179.48.124.242 port 34268:11: Bye Bye [preauth] Dec 26 05:25:41 host sshd[14605]: Disconnected from 179.48.124.242 port 34268 [preauth] Dec 26 05:26:49 host sshd[14758]: User root from 104.168.83.68 not allowed because not listed in AllowUsers Dec 26 05:26:49 host sshd[14758]: input_userauth_request: invalid user root [preauth] Dec 26 05:26:49 host unix_chkpwd[14762]: password check failed for user (root) Dec 26 05:26:49 host sshd[14758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.83.68 user=root Dec 26 05:26:49 host sshd[14758]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:26:51 host sshd[14758]: Failed password for invalid user root from 104.168.83.68 port 47854 ssh2 Dec 26 05:26:51 host sshd[14758]: Received disconnect from 104.168.83.68 port 47854:11: Bye Bye [preauth] Dec 26 05:26:51 host sshd[14758]: Disconnected from 104.168.83.68 port 47854 [preauth] Dec 26 05:26:51 host sshd[14764]: User root from 46.101.2.4 not allowed because not listed in AllowUsers Dec 26 05:26:51 host sshd[14764]: input_userauth_request: invalid user root [preauth] Dec 26 05:26:51 host unix_chkpwd[14769]: password check failed for user (root) Dec 26 05:26:51 host sshd[14764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.2.4 user=root Dec 26 05:26:51 host sshd[14764]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:26:51 host sshd[14767]: User root from 49.248.148.165 not allowed because not listed in AllowUsers Dec 26 05:26:51 host sshd[14767]: input_userauth_request: invalid user root [preauth] Dec 26 05:26:51 host unix_chkpwd[14770]: password check failed for user (root) Dec 26 05:26:51 host sshd[14767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.248.148.165 user=root Dec 26 05:26:51 host sshd[14767]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:26:53 host sshd[14764]: Failed password for invalid user root from 46.101.2.4 port 35030 ssh2 Dec 26 05:26:54 host sshd[14767]: Failed password for invalid user root from 49.248.148.165 port 11932 ssh2 Dec 26 05:26:54 host sshd[14767]: Received disconnect from 49.248.148.165 port 11932:11: Bye Bye [preauth] Dec 26 05:26:54 host sshd[14767]: Disconnected from 49.248.148.165 port 11932 [preauth] Dec 26 05:26:54 host sshd[14764]: Received disconnect from 46.101.2.4 port 35030:11: Bye Bye [preauth] Dec 26 05:26:54 host sshd[14764]: Disconnected from 46.101.2.4 port 35030 [preauth] Dec 26 05:27:27 host sshd[14841]: User root from 219.91.178.184 not allowed because not listed in AllowUsers Dec 26 05:27:27 host sshd[14841]: input_userauth_request: invalid user root [preauth] Dec 26 05:27:27 host unix_chkpwd[14843]: password check failed for user (root) Dec 26 05:27:27 host sshd[14841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.91.178.184 user=root Dec 26 05:27:27 host sshd[14841]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:27:29 host sshd[14841]: Failed password for invalid user root from 219.91.178.184 port 31274 ssh2 Dec 26 05:27:29 host sshd[14841]: Received disconnect from 219.91.178.184 port 31274:11: Bye Bye [preauth] Dec 26 05:27:29 host sshd[14841]: Disconnected from 219.91.178.184 port 31274 [preauth] Dec 26 05:28:18 host sshd[15041]: User root from 157.230.209.3 not allowed because not listed in AllowUsers Dec 26 05:28:18 host sshd[15041]: input_userauth_request: invalid user root [preauth] Dec 26 05:28:18 host unix_chkpwd[15044]: password check failed for user (root) Dec 26 05:28:18 host sshd[15041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.209.3 user=root Dec 26 05:28:18 host sshd[15041]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:28:21 host sshd[15041]: Failed password for invalid user root from 157.230.209.3 port 40718 ssh2 Dec 26 05:28:22 host sshd[15078]: User root from 31.220.17.100 not allowed because not listed in AllowUsers Dec 26 05:28:22 host sshd[15078]: input_userauth_request: invalid user root [preauth] Dec 26 05:28:22 host unix_chkpwd[15081]: password check failed for user (root) Dec 26 05:28:22 host sshd[15078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.220.17.100 user=root Dec 26 05:28:22 host sshd[15078]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:28:24 host sshd[15078]: Failed password for invalid user root from 31.220.17.100 port 42474 ssh2 Dec 26 05:28:25 host sshd[15078]: Received disconnect from 31.220.17.100 port 42474:11: Bye Bye [preauth] Dec 26 05:28:25 host sshd[15078]: Disconnected from 31.220.17.100 port 42474 [preauth] Dec 26 05:28:31 host sshd[15140]: User root from 51.83.47.140 not allowed because not listed in AllowUsers Dec 26 05:28:31 host sshd[15140]: input_userauth_request: invalid user root [preauth] Dec 26 05:28:31 host unix_chkpwd[15143]: password check failed for user (root) Dec 26 05:28:31 host sshd[15140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.47.140 user=root Dec 26 05:28:31 host sshd[15140]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:28:33 host sshd[15140]: Failed password for invalid user root from 51.83.47.140 port 33560 ssh2 Dec 26 05:28:33 host sshd[15140]: Received disconnect from 51.83.47.140 port 33560:11: Bye Bye [preauth] Dec 26 05:28:33 host sshd[15140]: Disconnected from 51.83.47.140 port 33560 [preauth] Dec 26 05:28:40 host sshd[15184]: User root from 94.247.17.70 not allowed because not listed in AllowUsers Dec 26 05:28:40 host sshd[15184]: input_userauth_request: invalid user root [preauth] Dec 26 05:28:40 host unix_chkpwd[15186]: password check failed for user (root) Dec 26 05:28:40 host sshd[15184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.247.17.70 user=root Dec 26 05:28:40 host sshd[15184]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:28:43 host sshd[15184]: Failed password for invalid user root from 94.247.17.70 port 37484 ssh2 Dec 26 05:28:43 host sshd[15184]: Received disconnect from 94.247.17.70 port 37484:11: Bye Bye [preauth] Dec 26 05:28:43 host sshd[15184]: Disconnected from 94.247.17.70 port 37484 [preauth] Dec 26 05:29:25 host sshd[15328]: User root from 174.138.20.252 not allowed because not listed in AllowUsers Dec 26 05:29:25 host sshd[15328]: input_userauth_request: invalid user root [preauth] Dec 26 05:29:25 host unix_chkpwd[15330]: password check failed for user (root) Dec 26 05:29:25 host sshd[15328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.20.252 user=root Dec 26 05:29:25 host sshd[15328]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:29:26 host sshd[15328]: Failed password for invalid user root from 174.138.20.252 port 36254 ssh2 Dec 26 05:29:27 host sshd[15328]: Received disconnect from 174.138.20.252 port 36254:11: Bye Bye [preauth] Dec 26 05:29:27 host sshd[15328]: Disconnected from 174.138.20.252 port 36254 [preauth] Dec 26 05:29:27 host sshd[15331]: User root from 179.48.124.242 not allowed because not listed in AllowUsers Dec 26 05:29:27 host sshd[15331]: input_userauth_request: invalid user root [preauth] Dec 26 05:29:27 host unix_chkpwd[15335]: password check failed for user (root) Dec 26 05:29:27 host sshd[15331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.48.124.242 user=root Dec 26 05:29:27 host sshd[15331]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:29:29 host sshd[15331]: Failed password for invalid user root from 179.48.124.242 port 43006 ssh2 Dec 26 05:29:29 host sshd[15331]: Received disconnect from 179.48.124.242 port 43006:11: Bye Bye [preauth] Dec 26 05:29:29 host sshd[15331]: Disconnected from 179.48.124.242 port 43006 [preauth] Dec 26 05:29:33 host sshd[15408]: User root from 23.94.43.69 not allowed because not listed in AllowUsers Dec 26 05:29:33 host sshd[15408]: input_userauth_request: invalid user root [preauth] Dec 26 05:29:33 host unix_chkpwd[15416]: password check failed for user (root) Dec 26 05:29:33 host sshd[15408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.94.43.69 user=root Dec 26 05:29:33 host sshd[15408]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:29:35 host sshd[15408]: Failed password for invalid user root from 23.94.43.69 port 37024 ssh2 Dec 26 05:29:39 host sshd[15458]: User root from 46.101.2.4 not allowed because not listed in AllowUsers Dec 26 05:29:39 host sshd[15458]: input_userauth_request: invalid user root [preauth] Dec 26 05:29:39 host unix_chkpwd[15461]: password check failed for user (root) Dec 26 05:29:39 host sshd[15458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.2.4 user=root Dec 26 05:29:39 host sshd[15458]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:29:41 host sshd[15458]: Failed password for invalid user root from 46.101.2.4 port 35544 ssh2 Dec 26 05:29:41 host sshd[15458]: Received disconnect from 46.101.2.4 port 35544:11: Bye Bye [preauth] Dec 26 05:29:41 host sshd[15458]: Disconnected from 46.101.2.4 port 35544 [preauth] Dec 26 05:29:45 host sshd[15501]: User root from 49.248.148.165 not allowed because not listed in AllowUsers Dec 26 05:29:45 host sshd[15501]: input_userauth_request: invalid user root [preauth] Dec 26 05:29:45 host unix_chkpwd[15503]: password check failed for user (root) Dec 26 05:29:45 host sshd[15501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.248.148.165 user=root Dec 26 05:29:45 host sshd[15501]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:29:46 host sshd[15512]: User root from 219.91.178.184 not allowed because not listed in AllowUsers Dec 26 05:29:46 host sshd[15512]: input_userauth_request: invalid user root [preauth] Dec 26 05:29:46 host unix_chkpwd[15514]: password check failed for user (root) Dec 26 05:29:46 host sshd[15512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.91.178.184 user=root Dec 26 05:29:46 host sshd[15512]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:29:47 host sshd[15501]: Failed password for invalid user root from 49.248.148.165 port 8806 ssh2 Dec 26 05:29:47 host sshd[15501]: Received disconnect from 49.248.148.165 port 8806:11: Bye Bye [preauth] Dec 26 05:29:47 host sshd[15501]: Disconnected from 49.248.148.165 port 8806 [preauth] Dec 26 05:29:48 host sshd[15512]: Failed password for invalid user root from 219.91.178.184 port 31646 ssh2 Dec 26 05:29:48 host sshd[15512]: Received disconnect from 219.91.178.184 port 31646:11: Bye Bye [preauth] Dec 26 05:29:48 host sshd[15512]: Disconnected from 219.91.178.184 port 31646 [preauth] Dec 26 05:29:56 host sshd[15613]: User root from 159.65.150.108 not allowed because not listed in AllowUsers Dec 26 05:29:56 host sshd[15613]: input_userauth_request: invalid user root [preauth] Dec 26 05:29:56 host unix_chkpwd[15615]: password check failed for user (root) Dec 26 05:29:56 host sshd[15613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.150.108 user=root Dec 26 05:29:56 host sshd[15613]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:29:58 host sshd[15613]: Failed password for invalid user root from 159.65.150.108 port 49670 ssh2 Dec 26 05:29:58 host sshd[15613]: Received disconnect from 159.65.150.108 port 49670:11: Bye Bye [preauth] Dec 26 05:29:58 host sshd[15613]: Disconnected from 159.65.150.108 port 49670 [preauth] Dec 26 05:30:09 host sshd[15702]: User root from 161.132.180.116 not allowed because not listed in AllowUsers Dec 26 05:30:09 host sshd[15702]: input_userauth_request: invalid user root [preauth] Dec 26 05:30:09 host unix_chkpwd[15707]: password check failed for user (root) Dec 26 05:30:09 host sshd[15702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.132.180.116 user=root Dec 26 05:30:09 host sshd[15702]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:30:11 host sshd[15702]: Failed password for invalid user root from 161.132.180.116 port 2846 ssh2 Dec 26 05:30:17 host sshd[15761]: User root from 104.168.83.68 not allowed because not listed in AllowUsers Dec 26 05:30:17 host sshd[15761]: input_userauth_request: invalid user root [preauth] Dec 26 05:30:17 host unix_chkpwd[15766]: password check failed for user (root) Dec 26 05:30:17 host sshd[15761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.83.68 user=root Dec 26 05:30:17 host sshd[15761]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:30:19 host sshd[15761]: Failed password for invalid user root from 104.168.83.68 port 45992 ssh2 Dec 26 05:30:19 host sshd[15761]: Received disconnect from 104.168.83.68 port 45992:11: Bye Bye [preauth] Dec 26 05:30:19 host sshd[15761]: Disconnected from 104.168.83.68 port 45992 [preauth] Dec 26 05:30:28 host sshd[15836]: User root from 1.234.80.51 not allowed because not listed in AllowUsers Dec 26 05:30:28 host sshd[15836]: input_userauth_request: invalid user root [preauth] Dec 26 05:30:28 host unix_chkpwd[15839]: password check failed for user (root) Dec 26 05:30:28 host sshd[15836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.234.80.51 user=root Dec 26 05:30:28 host sshd[15836]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:30:31 host sshd[15836]: Failed password for invalid user root from 1.234.80.51 port 39466 ssh2 Dec 26 05:30:31 host sshd[15836]: Received disconnect from 1.234.80.51 port 39466:11: Bye Bye [preauth] Dec 26 05:30:31 host sshd[15836]: Disconnected from 1.234.80.51 port 39466 [preauth] Dec 26 05:32:48 host sshd[16114]: User root from 43.153.83.173 not allowed because not listed in AllowUsers Dec 26 05:32:48 host sshd[16114]: input_userauth_request: invalid user root [preauth] Dec 26 05:32:48 host unix_chkpwd[16117]: password check failed for user (root) Dec 26 05:32:48 host sshd[16114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.83.173 user=root Dec 26 05:32:48 host sshd[16114]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:32:51 host sshd[16114]: Failed password for invalid user root from 43.153.83.173 port 55774 ssh2 Dec 26 05:32:51 host sshd[16114]: Received disconnect from 43.153.83.173 port 55774:11: Bye Bye [preauth] Dec 26 05:32:51 host sshd[16114]: Disconnected from 43.153.83.173 port 55774 [preauth] Dec 26 05:33:01 host sshd[16127]: User root from 1.234.80.51 not allowed because not listed in AllowUsers Dec 26 05:33:01 host sshd[16127]: input_userauth_request: invalid user root [preauth] Dec 26 05:33:02 host unix_chkpwd[16143]: password check failed for user (root) Dec 26 05:33:02 host sshd[16127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.234.80.51 user=root Dec 26 05:33:02 host sshd[16127]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:33:03 host sshd[16127]: Failed password for invalid user root from 1.234.80.51 port 40964 ssh2 Dec 26 05:33:03 host sshd[16127]: Received disconnect from 1.234.80.51 port 40964:11: Bye Bye [preauth] Dec 26 05:33:03 host sshd[16127]: Disconnected from 1.234.80.51 port 40964 [preauth] Dec 26 05:33:06 host sshd[16175]: User root from 112.220.127.114 not allowed because not listed in AllowUsers Dec 26 05:33:06 host sshd[16175]: input_userauth_request: invalid user root [preauth] Dec 26 05:33:06 host unix_chkpwd[16242]: password check failed for user (root) Dec 26 05:33:06 host sshd[16175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.220.127.114 user=root Dec 26 05:33:06 host sshd[16175]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:33:08 host sshd[16175]: Failed password for invalid user root from 112.220.127.114 port 60234 ssh2 Dec 26 05:33:08 host sshd[16175]: Received disconnect from 112.220.127.114 port 60234:11: Bye Bye [preauth] Dec 26 05:33:08 host sshd[16175]: Disconnected from 112.220.127.114 port 60234 [preauth] Dec 26 05:33:12 host sshd[16289]: User root from 141.98.112.13 not allowed because not listed in AllowUsers Dec 26 05:33:12 host sshd[16289]: input_userauth_request: invalid user root [preauth] Dec 26 05:33:12 host unix_chkpwd[16292]: password check failed for user (root) Dec 26 05:33:12 host sshd[16289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.112.13 user=root Dec 26 05:33:12 host sshd[16289]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:33:14 host sshd[16289]: Failed password for invalid user root from 141.98.112.13 port 44774 ssh2 Dec 26 05:33:15 host sshd[16289]: Received disconnect from 141.98.112.13 port 44774:11: Bye Bye [preauth] Dec 26 05:33:15 host sshd[16289]: Disconnected from 141.98.112.13 port 44774 [preauth] Dec 26 05:34:06 host sshd[16412]: User root from 206.189.130.255 not allowed because not listed in AllowUsers Dec 26 05:34:06 host sshd[16412]: input_userauth_request: invalid user root [preauth] Dec 26 05:34:06 host unix_chkpwd[16414]: password check failed for user (root) Dec 26 05:34:06 host sshd[16412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.130.255 user=root Dec 26 05:34:06 host sshd[16412]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:34:08 host sshd[16412]: Failed password for invalid user root from 206.189.130.255 port 38080 ssh2 Dec 26 05:34:08 host sshd[16412]: Received disconnect from 206.189.130.255 port 38080:11: Bye Bye [preauth] Dec 26 05:34:08 host sshd[16412]: Disconnected from 206.189.130.255 port 38080 [preauth] Dec 26 05:35:14 host sshd[16553]: User root from 207.178.145.171 not allowed because not listed in AllowUsers Dec 26 05:35:14 host sshd[16553]: input_userauth_request: invalid user root [preauth] Dec 26 05:35:14 host unix_chkpwd[16555]: password check failed for user (root) Dec 26 05:35:14 host sshd[16553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.178.145.171 user=root Dec 26 05:35:14 host sshd[16553]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:35:15 host sshd[16553]: Failed password for invalid user root from 207.178.145.171 port 31933 ssh2 Dec 26 05:35:16 host sshd[16553]: Received disconnect from 207.178.145.171 port 31933:11: Bye Bye [preauth] Dec 26 05:35:16 host sshd[16553]: Disconnected from 207.178.145.171 port 31933 [preauth] Dec 26 05:37:22 host sshd[16850]: User root from 46.107.211.87 not allowed because not listed in AllowUsers Dec 26 05:37:22 host sshd[16850]: input_userauth_request: invalid user root [preauth] Dec 26 05:37:22 host unix_chkpwd[16855]: password check failed for user (root) Dec 26 05:37:22 host sshd[16850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.107.211.87 user=root Dec 26 05:37:22 host sshd[16850]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:37:24 host sshd[16850]: Failed password for invalid user root from 46.107.211.87 port 36694 ssh2 Dec 26 05:37:24 host sshd[16850]: Received disconnect from 46.107.211.87 port 36694:11: Bye Bye [preauth] Dec 26 05:37:24 host sshd[16850]: Disconnected from 46.107.211.87 port 36694 [preauth] Dec 26 05:39:23 host sshd[17251]: User root from 112.220.127.114 not allowed because not listed in AllowUsers Dec 26 05:39:23 host sshd[17251]: input_userauth_request: invalid user root [preauth] Dec 26 05:39:23 host unix_chkpwd[17254]: password check failed for user (root) Dec 26 05:39:23 host sshd[17251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.220.127.114 user=root Dec 26 05:39:23 host sshd[17251]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:39:24 host sshd[17251]: Failed password for invalid user root from 112.220.127.114 port 33830 ssh2 Dec 26 05:39:25 host sshd[17251]: Received disconnect from 112.220.127.114 port 33830:11: Bye Bye [preauth] Dec 26 05:39:25 host sshd[17251]: Disconnected from 112.220.127.114 port 33830 [preauth] Dec 26 05:39:30 host sshd[17318]: User root from 206.189.130.255 not allowed because not listed in AllowUsers Dec 26 05:39:30 host sshd[17318]: input_userauth_request: invalid user root [preauth] Dec 26 05:39:30 host unix_chkpwd[17320]: password check failed for user (root) Dec 26 05:39:30 host sshd[17318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.130.255 user=root Dec 26 05:39:30 host sshd[17318]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:39:31 host sshd[17316]: User root from 46.107.211.87 not allowed because not listed in AllowUsers Dec 26 05:39:31 host sshd[17316]: input_userauth_request: invalid user root [preauth] Dec 26 05:39:31 host unix_chkpwd[17322]: password check failed for user (root) Dec 26 05:39:31 host sshd[17316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.107.211.87 user=root Dec 26 05:39:31 host sshd[17316]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:39:32 host sshd[17316]: Failed password for invalid user root from 46.107.211.87 port 39162 ssh2 Dec 26 05:39:32 host sshd[17318]: Failed password for invalid user root from 206.189.130.255 port 34216 ssh2 Dec 26 05:39:32 host sshd[17318]: Received disconnect from 206.189.130.255 port 34216:11: Bye Bye [preauth] Dec 26 05:39:32 host sshd[17318]: Disconnected from 206.189.130.255 port 34216 [preauth] Dec 26 05:39:32 host sshd[17316]: Received disconnect from 46.107.211.87 port 39162:11: Bye Bye [preauth] Dec 26 05:39:32 host sshd[17316]: Disconnected from 46.107.211.87 port 39162 [preauth] Dec 26 05:39:33 host sshd[17325]: User root from 43.153.83.173 not allowed because not listed in AllowUsers Dec 26 05:39:33 host sshd[17325]: input_userauth_request: invalid user root [preauth] Dec 26 05:39:33 host unix_chkpwd[17330]: password check failed for user (root) Dec 26 05:39:33 host sshd[17325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.83.173 user=root Dec 26 05:39:33 host sshd[17325]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:39:35 host sshd[17325]: Failed password for invalid user root from 43.153.83.173 port 52742 ssh2 Dec 26 05:39:35 host sshd[17325]: Received disconnect from 43.153.83.173 port 52742:11: Bye Bye [preauth] Dec 26 05:39:35 host sshd[17325]: Disconnected from 43.153.83.173 port 52742 [preauth] Dec 26 05:39:47 host sshd[17454]: User root from 141.98.112.13 not allowed because not listed in AllowUsers Dec 26 05:39:47 host sshd[17454]: input_userauth_request: invalid user root [preauth] Dec 26 05:39:47 host unix_chkpwd[17460]: password check failed for user (root) Dec 26 05:39:47 host sshd[17454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.112.13 user=root Dec 26 05:39:47 host sshd[17454]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 05:39:49 host sshd[17454]: Failed password for invalid user root from 141.98.112.13 port 47704 ssh2 Dec 26 05:39:49 host sshd[17454]: Received disconnect from 141.98.112.13 port 47704:11: Bye Bye [preauth] Dec 26 05:39:49 host sshd[17454]: Disconnected from 141.98.112.13 port 47704 [preauth] Dec 26 05:43:51 host sshd[18102]: Invalid user richard from 209.141.56.48 port 37194 Dec 26 05:43:51 host sshd[18102]: input_userauth_request: invalid user richard [preauth] Dec 26 05:43:51 host sshd[18102]: pam_unix(sshd:auth): check pass; user unknown Dec 26 05:43:51 host sshd[18102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Dec 26 05:43:53 host sshd[18102]: Failed password for invalid user richard from 209.141.56.48 port 37194 ssh2 Dec 26 05:43:54 host sshd[18102]: Connection closed by 209.141.56.48 port 37194 [preauth] Dec 26 05:48:36 host sshd[18888]: Invalid user user1 from 103.13.40.2 port 45678 Dec 26 05:48:36 host sshd[18888]: input_userauth_request: invalid user user1 [preauth] Dec 26 05:48:36 host sshd[18888]: pam_unix(sshd:auth): check pass; user unknown Dec 26 05:48:36 host sshd[18888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 26 05:48:38 host sshd[18888]: Failed password for invalid user user1 from 103.13.40.2 port 45678 ssh2 Dec 26 05:48:38 host sshd[18888]: Connection closed by 103.13.40.2 port 45678 [preauth] Dec 26 05:50:02 host sshd[19090]: Invalid user zhangzheng from 162.218.126.136 port 32998 Dec 26 05:50:02 host sshd[19090]: input_userauth_request: invalid user zhangzheng [preauth] Dec 26 05:50:02 host sshd[19090]: pam_unix(sshd:auth): check pass; user unknown Dec 26 05:50:02 host sshd[19090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 26 05:50:04 host sshd[19090]: Failed password for invalid user zhangzheng from 162.218.126.136 port 32998 ssh2 Dec 26 05:50:04 host sshd[19090]: Connection closed by 162.218.126.136 port 32998 [preauth] Dec 26 05:58:15 host sshd[20348]: Invalid user user1 from 41.197.31.178 port 52218 Dec 26 05:58:15 host sshd[20348]: input_userauth_request: invalid user user1 [preauth] Dec 26 05:58:16 host sshd[20348]: pam_unix(sshd:auth): check pass; user unknown Dec 26 05:58:16 host sshd[20348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 26 05:58:18 host sshd[20348]: Failed password for invalid user user1 from 41.197.31.178 port 52218 ssh2 Dec 26 05:58:18 host sshd[20348]: Connection closed by 41.197.31.178 port 52218 [preauth] Dec 26 06:04:01 host sshd[21159]: User root from 34.81.69.1 not allowed because not listed in AllowUsers Dec 26 06:04:01 host sshd[21159]: input_userauth_request: invalid user root [preauth] Dec 26 06:04:01 host unix_chkpwd[21162]: password check failed for user (root) Dec 26 06:04:01 host sshd[21159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.81.69.1 user=root Dec 26 06:04:01 host sshd[21159]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 06:04:03 host sshd[21159]: Failed password for invalid user root from 34.81.69.1 port 58314 ssh2 Dec 26 06:04:03 host sshd[21159]: Received disconnect from 34.81.69.1 port 58314:11: Bye Bye [preauth] Dec 26 06:04:03 host sshd[21159]: Disconnected from 34.81.69.1 port 58314 [preauth] Dec 26 06:04:31 host sshd[21228]: Did not receive identification string from 185.173.145.67 port 46102 Dec 26 06:04:46 host sshd[21254]: User root from 185.173.145.67 not allowed because not listed in AllowUsers Dec 26 06:04:46 host sshd[21254]: input_userauth_request: invalid user root [preauth] Dec 26 06:04:46 host unix_chkpwd[21258]: password check failed for user (root) Dec 26 06:04:46 host sshd[21254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.173.145.67 user=root Dec 26 06:04:46 host sshd[21254]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 06:04:49 host sshd[21254]: Failed password for invalid user root from 185.173.145.67 port 41364 ssh2 Dec 26 06:04:49 host sshd[21254]: Received disconnect from 185.173.145.67 port 41364:11: Normal Shutdown, Thank you for playing [preauth] Dec 26 06:04:49 host sshd[21254]: Disconnected from 185.173.145.67 port 41364 [preauth] Dec 26 06:04:59 host sshd[21275]: User root from 185.173.145.67 not allowed because not listed in AllowUsers Dec 26 06:04:59 host sshd[21275]: input_userauth_request: invalid user root [preauth] Dec 26 06:04:59 host unix_chkpwd[21278]: password check failed for user (root) Dec 26 06:04:59 host sshd[21275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.173.145.67 user=root Dec 26 06:04:59 host sshd[21275]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 06:05:01 host sshd[21275]: Failed password for invalid user root from 185.173.145.67 port 48366 ssh2 Dec 26 06:05:09 host sshd[21342]: User root from 191.239.251.46 not allowed because not listed in AllowUsers Dec 26 06:05:09 host sshd[21342]: input_userauth_request: invalid user root [preauth] Dec 26 06:05:09 host unix_chkpwd[21346]: password check failed for user (root) Dec 26 06:05:09 host sshd[21342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.239.251.46 user=root Dec 26 06:05:09 host sshd[21342]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 06:05:11 host sshd[21342]: Failed password for invalid user root from 191.239.251.46 port 59162 ssh2 Dec 26 06:05:11 host sshd[21342]: Received disconnect from 191.239.251.46 port 59162:11: Bye Bye [preauth] Dec 26 06:05:11 host sshd[21342]: Disconnected from 191.239.251.46 port 59162 [preauth] Dec 26 06:09:18 host sshd[21992]: User root from 34.81.69.1 not allowed because not listed in AllowUsers Dec 26 06:09:18 host sshd[21992]: input_userauth_request: invalid user root [preauth] Dec 26 06:09:18 host unix_chkpwd[21995]: password check failed for user (root) Dec 26 06:09:18 host sshd[21992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.81.69.1 user=root Dec 26 06:09:18 host sshd[21992]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 06:09:21 host sshd[21992]: Failed password for invalid user root from 34.81.69.1 port 57748 ssh2 Dec 26 06:09:21 host sshd[21992]: Received disconnect from 34.81.69.1 port 57748:11: Bye Bye [preauth] Dec 26 06:09:21 host sshd[21992]: Disconnected from 34.81.69.1 port 57748 [preauth] Dec 26 06:09:39 host sshd[22067]: User root from 191.239.251.46 not allowed because not listed in AllowUsers Dec 26 06:09:39 host sshd[22067]: input_userauth_request: invalid user root [preauth] Dec 26 06:09:39 host unix_chkpwd[22070]: password check failed for user (root) Dec 26 06:09:39 host sshd[22067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.239.251.46 user=root Dec 26 06:09:39 host sshd[22067]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 06:09:41 host sshd[22067]: Failed password for invalid user root from 191.239.251.46 port 52656 ssh2 Dec 26 06:11:30 host sshd[22345]: User root from 106.10.122.53 not allowed because not listed in AllowUsers Dec 26 06:11:30 host sshd[22345]: input_userauth_request: invalid user root [preauth] Dec 26 06:11:30 host unix_chkpwd[22348]: password check failed for user (root) Dec 26 06:11:30 host sshd[22345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 user=root Dec 26 06:11:30 host sshd[22345]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 06:11:32 host sshd[22345]: Failed password for invalid user root from 106.10.122.53 port 34934 ssh2 Dec 26 06:11:33 host sshd[22345]: Connection closed by 106.10.122.53 port 34934 [preauth] Dec 26 06:15:25 host sshd[23036]: Connection closed by 66.175.213.4 port 4632 [preauth] Dec 26 06:15:26 host sshd[23060]: Connection closed by 66.175.213.4 port 10346 [preauth] Dec 26 06:15:28 host sshd[23067]: Connection closed by 66.175.213.4 port 10358 [preauth] Dec 26 06:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 06:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 06:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 06:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 06:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 06:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 06:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 06:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 06:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 06:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 26 06:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 06:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 06:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 26 06:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 06:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 06:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 26 06:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 06:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 06:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 26 06:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 06:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 06:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 26 06:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 06:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 06:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 26 06:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 06:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 06:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 26 06:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 06:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 06:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 26 06:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 06:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 26 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=dartsimp user-3=a2zgroup user-4=wwwkaretakers user-5=cochintaxi user-6=wwwrmswll user-7=wwwresourcehunte user-8=keralaholi user-9=ugotscom user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=vfmassets user-14=wwwtestugo user-15=shalinijames user-16=woodpeck user-17=wwwkapin user-18=disposeat user-19=wwwkmaorg user-20=remysagr user-21=mrsclean user-22=wwwnexidigital user-23=gifterman user-24=palco123 user-25=phmetals user-26=kottayamcalldriv user-27=straightcurve user-28=wwwletsstalkfood user-29=bonifacegroup user-30=wwwevmhonda feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 26 06:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 26 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-v8RtX4fKYY55ygL5.~ Dec 26 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-v8RtX4fKYY55ygL5.~' Dec 26 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-v8RtX4fKYY55ygL5.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 26 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 26 06:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 06:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 06:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 06:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 06:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 06:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 06:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 06:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 26 06:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 06:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 06:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 06:21:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 26 06:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 26 06:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 26 06:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 26 06:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 06:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 26 06:21:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 06:22:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 06:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 26 06:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 06:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 06:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 26 06:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 06:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 06:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 26 06:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 06:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 06:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 26 06:22:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 06:22:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 06:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 26 06:22:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 06:22:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 06:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 26 06:22:17 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 06:22:18 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 06:31:45 host sshd[25521]: Invalid user richard from 209.141.56.48 port 57506 Dec 26 06:31:45 host sshd[25521]: input_userauth_request: invalid user richard [preauth] Dec 26 06:31:45 host sshd[25521]: pam_unix(sshd:auth): check pass; user unknown Dec 26 06:31:45 host sshd[25521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Dec 26 06:31:47 host sshd[25521]: Failed password for invalid user richard from 209.141.56.48 port 57506 ssh2 Dec 26 06:31:47 host sshd[25521]: Connection closed by 209.141.56.48 port 57506 [preauth] Dec 26 06:36:04 host sshd[26140]: Invalid user cw from 45.93.201.90 port 51174 Dec 26 06:36:04 host sshd[26140]: input_userauth_request: invalid user cw [preauth] Dec 26 06:36:04 host sshd[26140]: pam_unix(sshd:auth): check pass; user unknown Dec 26 06:36:04 host sshd[26140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 26 06:36:06 host sshd[26140]: Failed password for invalid user cw from 45.93.201.90 port 51174 ssh2 Dec 26 06:36:09 host sshd[26140]: pam_unix(sshd:auth): check pass; user unknown Dec 26 06:36:11 host sshd[26140]: Failed password for invalid user cw from 45.93.201.90 port 51174 ssh2 Dec 26 06:36:14 host sshd[26140]: pam_unix(sshd:auth): check pass; user unknown Dec 26 06:36:16 host sshd[26140]: Failed password for invalid user cw from 45.93.201.90 port 51174 ssh2 Dec 26 06:36:19 host sshd[26140]: Connection closed by 45.93.201.90 port 51174 [preauth] Dec 26 06:36:19 host sshd[26140]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 26 06:44:04 host sshd[27196]: Invalid user db2inst1 from 84.110.99.202 port 35742 Dec 26 06:44:04 host sshd[27196]: input_userauth_request: invalid user db2inst1 [preauth] Dec 26 06:44:04 host sshd[27196]: pam_unix(sshd:auth): check pass; user unknown Dec 26 06:44:04 host sshd[27196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.110.99.202 Dec 26 06:44:07 host sshd[27196]: Failed password for invalid user db2inst1 from 84.110.99.202 port 35742 ssh2 Dec 26 06:44:07 host sshd[27196]: Connection closed by 84.110.99.202 port 35742 [preauth] Dec 26 06:48:03 host sshd[27754]: ssh_dispatch_run_fatal: Connection from 69.112.204.55 port 47702: Connection corrupted [preauth] Dec 26 06:59:05 host sshd[29268]: User root from 92.46.108.20 not allowed because not listed in AllowUsers Dec 26 06:59:05 host sshd[29268]: input_userauth_request: invalid user root [preauth] Dec 26 06:59:05 host unix_chkpwd[29271]: password check failed for user (root) Dec 26 06:59:05 host sshd[29268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 user=root Dec 26 06:59:05 host sshd[29268]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 06:59:07 host sshd[29268]: Failed password for invalid user root from 92.46.108.20 port 56318 ssh2 Dec 26 06:59:08 host sshd[29268]: Connection closed by 92.46.108.20 port 56318 [preauth] Dec 26 07:01:41 host sshd[29749]: Invalid user richard from 209.141.56.48 port 54234 Dec 26 07:01:41 host sshd[29749]: input_userauth_request: invalid user richard [preauth] Dec 26 07:01:41 host sshd[29749]: pam_unix(sshd:auth): check pass; user unknown Dec 26 07:01:41 host sshd[29749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Dec 26 07:01:43 host sshd[29749]: Failed password for invalid user richard from 209.141.56.48 port 54234 ssh2 Dec 26 07:01:43 host sshd[29749]: Connection closed by 209.141.56.48 port 54234 [preauth] Dec 26 07:03:39 host sshd[30011]: Invalid user user from 162.218.126.136 port 34504 Dec 26 07:03:39 host sshd[30011]: input_userauth_request: invalid user user [preauth] Dec 26 07:03:40 host sshd[30011]: pam_unix(sshd:auth): check pass; user unknown Dec 26 07:03:40 host sshd[30011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 26 07:03:41 host sshd[30011]: Failed password for invalid user user from 162.218.126.136 port 34504 ssh2 Dec 26 07:03:41 host sshd[30011]: Connection closed by 162.218.126.136 port 34504 [preauth] Dec 26 07:05:23 host sshd[30317]: User root from 205.185.123.242 not allowed because not listed in AllowUsers Dec 26 07:05:23 host sshd[30317]: input_userauth_request: invalid user root [preauth] Dec 26 07:05:23 host unix_chkpwd[30323]: password check failed for user (root) Dec 26 07:05:23 host sshd[30317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.123.242 user=root Dec 26 07:05:23 host sshd[30317]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 07:05:26 host sshd[30317]: Failed password for invalid user root from 205.185.123.242 port 44306 ssh2 Dec 26 07:05:26 host sshd[30317]: Received disconnect from 205.185.123.242 port 44306:11: Bye Bye [preauth] Dec 26 07:05:26 host sshd[30317]: Disconnected from 205.185.123.242 port 44306 [preauth] Dec 26 07:05:57 host sshd[30378]: User root from 205.185.123.242 not allowed because not listed in AllowUsers Dec 26 07:05:57 host sshd[30378]: input_userauth_request: invalid user root [preauth] Dec 26 07:05:57 host unix_chkpwd[30381]: password check failed for user (root) Dec 26 07:05:57 host sshd[30378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.123.242 user=root Dec 26 07:05:57 host sshd[30378]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 07:05:58 host sshd[30378]: Failed password for invalid user root from 205.185.123.242 port 48700 ssh2 Dec 26 07:06:22 host sshd[30454]: User root from 165.227.114.124 not allowed because not listed in AllowUsers Dec 26 07:06:22 host sshd[30454]: input_userauth_request: invalid user root [preauth] Dec 26 07:06:22 host unix_chkpwd[30457]: password check failed for user (root) Dec 26 07:06:22 host sshd[30454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.114.124 user=root Dec 26 07:06:22 host sshd[30454]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 07:06:24 host sshd[30454]: Failed password for invalid user root from 165.227.114.124 port 36820 ssh2 Dec 26 07:06:24 host sshd[30454]: Received disconnect from 165.227.114.124 port 36820:11: Bye Bye [preauth] Dec 26 07:06:24 host sshd[30454]: Disconnected from 165.227.114.124 port 36820 [preauth] Dec 26 07:07:09 host sshd[30546]: User root from 192.3.134.93 not allowed because not listed in AllowUsers Dec 26 07:07:09 host sshd[30546]: input_userauth_request: invalid user root [preauth] Dec 26 07:07:09 host unix_chkpwd[30549]: password check failed for user (root) Dec 26 07:07:09 host sshd[30546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.134.93 user=root Dec 26 07:07:09 host sshd[30546]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 07:07:11 host sshd[30546]: Failed password for invalid user root from 192.3.134.93 port 39080 ssh2 Dec 26 07:07:11 host sshd[30546]: Received disconnect from 192.3.134.93 port 39080:11: Bye Bye [preauth] Dec 26 07:07:11 host sshd[30546]: Disconnected from 192.3.134.93 port 39080 [preauth] Dec 26 07:08:16 host sshd[30651]: User root from 45.221.46.201 not allowed because not listed in AllowUsers Dec 26 07:08:16 host sshd[30651]: input_userauth_request: invalid user root [preauth] Dec 26 07:08:16 host unix_chkpwd[30654]: password check failed for user (root) Dec 26 07:08:16 host sshd[30651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.221.46.201 user=root Dec 26 07:08:16 host sshd[30651]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 07:08:18 host sshd[30651]: Failed password for invalid user root from 45.221.46.201 port 48839 ssh2 Dec 26 07:08:18 host sshd[30651]: Received disconnect from 45.221.46.201 port 48839:11: Bye Bye [preauth] Dec 26 07:08:18 host sshd[30651]: Disconnected from 45.221.46.201 port 48839 [preauth] Dec 26 07:09:24 host sshd[30811]: User root from 98.142.141.184 not allowed because not listed in AllowUsers Dec 26 07:09:24 host sshd[30811]: input_userauth_request: invalid user root [preauth] Dec 26 07:09:24 host unix_chkpwd[30815]: password check failed for user (root) Dec 26 07:09:24 host sshd[30811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.142.141.184 user=root Dec 26 07:09:24 host sshd[30811]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 07:09:25 host sshd[30811]: Failed password for invalid user root from 98.142.141.184 port 35630 ssh2 Dec 26 07:09:26 host sshd[30811]: Received disconnect from 98.142.141.184 port 35630:11: Bye Bye [preauth] Dec 26 07:09:26 host sshd[30811]: Disconnected from 98.142.141.184 port 35630 [preauth] Dec 26 07:09:42 host sshd[30924]: User root from 43.135.156.177 not allowed because not listed in AllowUsers Dec 26 07:09:42 host sshd[30924]: input_userauth_request: invalid user root [preauth] Dec 26 07:09:43 host unix_chkpwd[30963]: password check failed for user (root) Dec 26 07:09:43 host sshd[30924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.135.156.177 user=root Dec 26 07:09:43 host sshd[30924]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 07:09:45 host sshd[30924]: Failed password for invalid user root from 43.135.156.177 port 55590 ssh2 Dec 26 07:09:45 host sshd[30924]: Received disconnect from 43.135.156.177 port 55590:11: Bye Bye [preauth] Dec 26 07:09:45 host sshd[30924]: Disconnected from 43.135.156.177 port 55590 [preauth] Dec 26 07:09:51 host sshd[30982]: User root from 78.196.138.44 not allowed because not listed in AllowUsers Dec 26 07:09:51 host sshd[30982]: input_userauth_request: invalid user root [preauth] Dec 26 07:09:51 host unix_chkpwd[30988]: password check failed for user (root) Dec 26 07:09:51 host sshd[30982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.196.138.44 user=root Dec 26 07:09:51 host sshd[30982]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 07:09:53 host sshd[30982]: Failed password for invalid user root from 78.196.138.44 port 58520 ssh2 Dec 26 07:09:53 host sshd[30982]: Received disconnect from 78.196.138.44 port 58520:11: Bye Bye [preauth] Dec 26 07:09:53 host sshd[30982]: Disconnected from 78.196.138.44 port 58520 [preauth] Dec 26 07:10:42 host sshd[31130]: User root from 103.245.195.219 not allowed because not listed in AllowUsers Dec 26 07:10:42 host sshd[31130]: input_userauth_request: invalid user root [preauth] Dec 26 07:10:42 host unix_chkpwd[31132]: password check failed for user (root) Dec 26 07:10:42 host sshd[31130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.245.195.219 user=root Dec 26 07:10:42 host sshd[31130]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 07:10:44 host sshd[31130]: Failed password for invalid user root from 103.245.195.219 port 35666 ssh2 Dec 26 07:10:44 host sshd[31130]: Received disconnect from 103.245.195.219 port 35666:11: Bye Bye [preauth] Dec 26 07:10:44 host sshd[31130]: Disconnected from 103.245.195.219 port 35666 [preauth] Dec 26 07:11:52 host sshd[31281]: User root from 78.196.138.44 not allowed because not listed in AllowUsers Dec 26 07:11:52 host sshd[31281]: input_userauth_request: invalid user root [preauth] Dec 26 07:11:52 host unix_chkpwd[31288]: password check failed for user (root) Dec 26 07:11:52 host sshd[31281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.196.138.44 user=root Dec 26 07:11:52 host sshd[31281]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 07:11:54 host sshd[31281]: Failed password for invalid user root from 78.196.138.44 port 36398 ssh2 Dec 26 07:12:12 host sshd[31362]: User root from 165.227.114.124 not allowed because not listed in AllowUsers Dec 26 07:12:12 host sshd[31362]: input_userauth_request: invalid user root [preauth] Dec 26 07:12:12 host unix_chkpwd[31367]: password check failed for user (root) Dec 26 07:12:12 host sshd[31362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.114.124 user=root Dec 26 07:12:12 host sshd[31362]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 07:12:14 host sshd[31362]: Failed password for invalid user root from 165.227.114.124 port 35660 ssh2 Dec 26 07:12:17 host sshd[31403]: User root from 98.142.141.184 not allowed because not listed in AllowUsers Dec 26 07:12:17 host sshd[31403]: input_userauth_request: invalid user root [preauth] Dec 26 07:12:17 host unix_chkpwd[31407]: password check failed for user (root) Dec 26 07:12:17 host sshd[31403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.142.141.184 user=root Dec 26 07:12:17 host sshd[31403]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 07:12:19 host sshd[31403]: Failed password for invalid user root from 98.142.141.184 port 48722 ssh2 Dec 26 07:13:06 host sshd[31558]: User root from 43.135.156.177 not allowed because not listed in AllowUsers Dec 26 07:13:06 host sshd[31558]: input_userauth_request: invalid user root [preauth] Dec 26 07:13:07 host unix_chkpwd[31562]: password check failed for user (root) Dec 26 07:13:07 host sshd[31558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.135.156.177 user=root Dec 26 07:13:07 host sshd[31558]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 07:13:09 host sshd[31558]: Failed password for invalid user root from 43.135.156.177 port 54094 ssh2 Dec 26 07:13:33 host sshd[31644]: User root from 103.245.195.219 not allowed because not listed in AllowUsers Dec 26 07:13:33 host sshd[31644]: input_userauth_request: invalid user root [preauth] Dec 26 07:13:33 host unix_chkpwd[31649]: password check failed for user (root) Dec 26 07:13:33 host sshd[31644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.245.195.219 user=root Dec 26 07:13:33 host sshd[31644]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 07:13:34 host sshd[31644]: Failed password for invalid user root from 103.245.195.219 port 41730 ssh2 Dec 26 07:13:34 host sshd[31644]: Received disconnect from 103.245.195.219 port 41730:11: Bye Bye [preauth] Dec 26 07:13:34 host sshd[31644]: Disconnected from 103.245.195.219 port 41730 [preauth] Dec 26 07:14:10 host sshd[31742]: User root from 45.221.46.201 not allowed because not listed in AllowUsers Dec 26 07:14:10 host sshd[31742]: input_userauth_request: invalid user root [preauth] Dec 26 07:14:10 host unix_chkpwd[31746]: password check failed for user (root) Dec 26 07:14:10 host sshd[31742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.221.46.201 user=root Dec 26 07:14:10 host sshd[31742]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 07:14:12 host sshd[31742]: Failed password for invalid user root from 45.221.46.201 port 57006 ssh2 Dec 26 07:14:12 host sshd[31742]: Received disconnect from 45.221.46.201 port 57006:11: Bye Bye [preauth] Dec 26 07:14:12 host sshd[31742]: Disconnected from 45.221.46.201 port 57006 [preauth] Dec 26 07:14:33 host sshd[31825]: User root from 192.3.134.93 not allowed because not listed in AllowUsers Dec 26 07:14:33 host sshd[31825]: input_userauth_request: invalid user root [preauth] Dec 26 07:14:33 host unix_chkpwd[31828]: password check failed for user (root) Dec 26 07:14:33 host sshd[31825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.134.93 user=root Dec 26 07:14:33 host sshd[31825]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 07:14:34 host sshd[31825]: Failed password for invalid user root from 192.3.134.93 port 59872 ssh2 Dec 26 07:14:35 host sshd[31825]: Received disconnect from 192.3.134.93 port 59872:11: Bye Bye [preauth] Dec 26 07:14:35 host sshd[31825]: Disconnected from 192.3.134.93 port 59872 [preauth] Dec 26 07:17:21 host sshd[32276]: User adm from 104.244.74.6 not allowed because not listed in AllowUsers Dec 26 07:17:21 host sshd[32276]: input_userauth_request: invalid user adm [preauth] Dec 26 07:17:21 host unix_chkpwd[32279]: password check failed for user (adm) Dec 26 07:17:21 host sshd[32276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 user=adm Dec 26 07:17:21 host sshd[32276]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "adm" Dec 26 07:17:23 host sshd[32276]: Failed password for invalid user adm from 104.244.74.6 port 59684 ssh2 Dec 26 07:17:23 host sshd[32276]: Connection closed by 104.244.74.6 port 59684 [preauth] Dec 26 07:19:42 host sshd[32582]: Invalid user yunwei from 103.13.40.2 port 40128 Dec 26 07:19:42 host sshd[32582]: input_userauth_request: invalid user yunwei [preauth] Dec 26 07:19:42 host sshd[32582]: pam_unix(sshd:auth): check pass; user unknown Dec 26 07:19:42 host sshd[32582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 26 07:19:44 host sshd[32582]: Failed password for invalid user yunwei from 103.13.40.2 port 40128 ssh2 Dec 26 07:19:44 host sshd[32582]: Connection closed by 103.13.40.2 port 40128 [preauth] Dec 26 07:21:14 host sshd[382]: User adm from 104.244.74.6 not allowed because not listed in AllowUsers Dec 26 07:21:14 host sshd[382]: input_userauth_request: invalid user adm [preauth] Dec 26 07:21:14 host unix_chkpwd[385]: password check failed for user (adm) Dec 26 07:21:14 host sshd[382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 user=adm Dec 26 07:21:14 host sshd[382]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "adm" Dec 26 07:21:16 host sshd[382]: Failed password for invalid user adm from 104.244.74.6 port 45016 ssh2 Dec 26 07:21:16 host sshd[382]: Connection closed by 104.244.74.6 port 45016 [preauth] Dec 26 07:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 07:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 07:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 07:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 07:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 07:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 07:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 07:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 07:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 07:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 26 07:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 07:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 07:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 26 07:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 07:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 07:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 26 07:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 07:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 07:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 26 07:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 07:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 07:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 26 07:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 07:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 07:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 26 07:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 07:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 07:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 26 07:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 07:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 07:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 26 07:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 07:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 07:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 07:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 07:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 07:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 26 07:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 07:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 07:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=vfmassets user-3=wwwtestugo user-4=shalinijames user-5=wwwkapin user-6=woodpeck user-7=wwwkmaorg user-8=disposeat user-9=remysagr user-10=wwwnexidigital user-11=mrsclean user-12=gifterman user-13=palco123 user-14=kottayamcalldriv user-15=phmetals user-16=wwwletsstalkfood user-17=straightcurve user-18=bonifacegroup user-19=wwwevmhonda user-20=laundryboniface user-21=dartsimp user-22=a2zgroup user-23=wwwkaretakers user-24=cochintaxi user-25=wwwrmswll user-26=keralaholi user-27=wwwresourcehunte user-28=ugotscom user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 26 07:21:47 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 26 07:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 07:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 07:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 07:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 07:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 07:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-gzkA4sCtzzLqnJSR.~ Dec 26 07:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 07:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 07:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-gzkA4sCtzzLqnJSR.~' Dec 26 07:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 07:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 07:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-gzkA4sCtzzLqnJSR.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 07:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 07:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 07:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 26 07:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 07:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 26 07:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 07:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 26 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 07:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 07:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 26 07:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 26 07:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 26 07:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 26 07:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 07:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 07:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 26 07:21:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 07:21:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 26 07:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 07:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 26 07:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 07:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 26 07:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 07:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 07:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 26 07:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 07:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 07:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 26 07:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 07:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 07:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 26 07:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 07:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 07:22:19 host sshd[782]: User root from 45.221.46.207 not allowed because not listed in AllowUsers Dec 26 07:22:19 host sshd[782]: input_userauth_request: invalid user root [preauth] Dec 26 07:22:19 host unix_chkpwd[790]: password check failed for user (root) Dec 26 07:22:19 host sshd[782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.221.46.207 user=root Dec 26 07:22:19 host sshd[782]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 07:22:21 host sshd[782]: Failed password for invalid user root from 45.221.46.207 port 34125 ssh2 Dec 26 07:22:22 host sshd[782]: Received disconnect from 45.221.46.207 port 34125:11: Bye Bye [preauth] Dec 26 07:22:22 host sshd[782]: Disconnected from 45.221.46.207 port 34125 [preauth] Dec 26 07:25:01 host sshd[1081]: User root from 45.221.46.207 not allowed because not listed in AllowUsers Dec 26 07:25:01 host sshd[1081]: input_userauth_request: invalid user root [preauth] Dec 26 07:25:01 host unix_chkpwd[1101]: password check failed for user (root) Dec 26 07:25:01 host sshd[1081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.221.46.207 user=root Dec 26 07:25:01 host sshd[1081]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 07:25:03 host sshd[1081]: Failed password for invalid user root from 45.221.46.207 port 54126 ssh2 Dec 26 07:33:53 host sshd[2566]: Connection closed by 41.23.68.84 port 34225 [preauth] Dec 26 07:36:56 host sshd[3156]: User root from 195.226.194.242 not allowed because not listed in AllowUsers Dec 26 07:36:56 host sshd[3156]: input_userauth_request: invalid user root [preauth] Dec 26 07:36:57 host unix_chkpwd[3159]: password check failed for user (root) Dec 26 07:36:57 host sshd[3156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 user=root Dec 26 07:36:57 host sshd[3156]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 07:36:58 host sshd[3156]: Failed password for invalid user root from 195.226.194.242 port 50622 ssh2 Dec 26 07:36:59 host sshd[3156]: Received disconnect from 195.226.194.242 port 50622:11: Bye Bye [preauth] Dec 26 07:36:59 host sshd[3156]: Disconnected from 195.226.194.242 port 50622 [preauth] Dec 26 07:44:17 host sshd[4209]: Invalid user user1 from 106.10.122.53 port 33402 Dec 26 07:44:17 host sshd[4209]: input_userauth_request: invalid user user1 [preauth] Dec 26 07:44:17 host sshd[4209]: pam_unix(sshd:auth): check pass; user unknown Dec 26 07:44:17 host sshd[4209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 26 07:44:20 host sshd[4209]: Failed password for invalid user user1 from 106.10.122.53 port 33402 ssh2 Dec 26 07:44:20 host sshd[4209]: Connection closed by 106.10.122.53 port 33402 [preauth] Dec 26 07:44:52 host sshd[4347]: User root from 45.221.46.203 not allowed because not listed in AllowUsers Dec 26 07:44:52 host sshd[4347]: input_userauth_request: invalid user root [preauth] Dec 26 07:44:52 host unix_chkpwd[4379]: password check failed for user (root) Dec 26 07:44:52 host sshd[4347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.221.46.203 user=root Dec 26 07:44:52 host sshd[4347]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 07:44:54 host sshd[4347]: Failed password for invalid user root from 45.221.46.203 port 36775 ssh2 Dec 26 07:44:54 host sshd[4347]: Received disconnect from 45.221.46.203 port 36775:11: Bye Bye [preauth] Dec 26 07:44:54 host sshd[4347]: Disconnected from 45.221.46.203 port 36775 [preauth] Dec 26 07:48:49 host sshd[5356]: Invalid user app from 41.197.31.178 port 40452 Dec 26 07:48:49 host sshd[5356]: input_userauth_request: invalid user app [preauth] Dec 26 07:48:49 host sshd[5356]: pam_unix(sshd:auth): check pass; user unknown Dec 26 07:48:49 host sshd[5356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 26 07:48:51 host sshd[5356]: Failed password for invalid user app from 41.197.31.178 port 40452 ssh2 Dec 26 07:48:51 host sshd[5356]: Connection closed by 41.197.31.178 port 40452 [preauth] Dec 26 07:55:53 host sshd[6666]: User root from 45.221.46.202 not allowed because not listed in AllowUsers Dec 26 07:55:53 host sshd[6666]: input_userauth_request: invalid user root [preauth] Dec 26 07:55:53 host unix_chkpwd[6672]: password check failed for user (root) Dec 26 07:55:53 host sshd[6666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.221.46.202 user=root Dec 26 07:55:53 host sshd[6666]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 07:55:55 host sshd[6666]: Failed password for invalid user root from 45.221.46.202 port 47533 ssh2 Dec 26 07:55:55 host sshd[6666]: Received disconnect from 45.221.46.202 port 47533:11: Bye Bye [preauth] Dec 26 07:55:55 host sshd[6666]: Disconnected from 45.221.46.202 port 47533 [preauth] Dec 26 07:58:52 host sshd[7026]: User root from 45.221.46.204 not allowed because not listed in AllowUsers Dec 26 07:58:52 host sshd[7026]: input_userauth_request: invalid user root [preauth] Dec 26 07:58:52 host unix_chkpwd[7030]: password check failed for user (root) Dec 26 07:58:52 host sshd[7026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.221.46.204 user=root Dec 26 07:58:52 host sshd[7026]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 07:58:54 host sshd[7026]: Failed password for invalid user root from 45.221.46.204 port 37153 ssh2 Dec 26 07:58:54 host sshd[7026]: Received disconnect from 45.221.46.204 port 37153:11: Bye Bye [preauth] Dec 26 07:58:54 host sshd[7026]: Disconnected from 45.221.46.204 port 37153 [preauth] Dec 26 07:59:51 host sshd[7169]: User root from 138.197.151.213 not allowed because not listed in AllowUsers Dec 26 07:59:51 host sshd[7169]: input_userauth_request: invalid user root [preauth] Dec 26 07:59:51 host unix_chkpwd[7172]: password check failed for user (root) Dec 26 07:59:51 host sshd[7169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.151.213 user=root Dec 26 07:59:51 host sshd[7169]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 07:59:51 host sshd[7175]: User root from 128.199.95.60 not allowed because not listed in AllowUsers Dec 26 07:59:51 host sshd[7175]: input_userauth_request: invalid user root [preauth] Dec 26 07:59:51 host unix_chkpwd[7177]: password check failed for user (root) Dec 26 07:59:51 host sshd[7175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.95.60 user=root Dec 26 07:59:51 host sshd[7175]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 07:59:52 host sshd[7169]: Failed password for invalid user root from 138.197.151.213 port 56210 ssh2 Dec 26 07:59:53 host sshd[7169]: Received disconnect from 138.197.151.213 port 56210:11: Bye Bye [preauth] Dec 26 07:59:53 host sshd[7169]: Disconnected from 138.197.151.213 port 56210 [preauth] Dec 26 07:59:53 host sshd[7175]: Failed password for invalid user root from 128.199.95.60 port 35016 ssh2 Dec 26 07:59:53 host sshd[7175]: Received disconnect from 128.199.95.60 port 35016:11: Bye Bye [preauth] Dec 26 07:59:53 host sshd[7175]: Disconnected from 128.199.95.60 port 35016 [preauth] Dec 26 08:02:04 host sshd[7686]: User root from 189.127.173.52 not allowed because not listed in AllowUsers Dec 26 08:02:04 host sshd[7686]: input_userauth_request: invalid user root [preauth] Dec 26 08:02:04 host unix_chkpwd[7691]: password check failed for user (root) Dec 26 08:02:04 host sshd[7686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.127.173.52 user=root Dec 26 08:02:04 host sshd[7686]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 08:02:07 host sshd[7686]: Failed password for invalid user root from 189.127.173.52 port 34816 ssh2 Dec 26 08:02:07 host sshd[7686]: Received disconnect from 189.127.173.52 port 34816:11: Bye Bye [preauth] Dec 26 08:02:07 host sshd[7686]: Disconnected from 189.127.173.52 port 34816 [preauth] Dec 26 08:02:36 host sshd[7775]: User root from 113.161.37.216 not allowed because not listed in AllowUsers Dec 26 08:02:36 host sshd[7775]: input_userauth_request: invalid user root [preauth] Dec 26 08:02:36 host unix_chkpwd[7778]: password check failed for user (root) Dec 26 08:02:36 host sshd[7775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.161.37.216 user=root Dec 26 08:02:36 host sshd[7775]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 08:02:38 host sshd[7775]: Failed password for invalid user root from 113.161.37.216 port 16597 ssh2 Dec 26 08:02:38 host sshd[7775]: Received disconnect from 113.161.37.216 port 16597:11: Bye Bye [preauth] Dec 26 08:02:38 host sshd[7775]: Disconnected from 113.161.37.216 port 16597 [preauth] Dec 26 08:04:09 host sshd[8013]: User root from 45.221.46.206 not allowed because not listed in AllowUsers Dec 26 08:04:09 host sshd[8013]: input_userauth_request: invalid user root [preauth] Dec 26 08:04:09 host unix_chkpwd[8021]: password check failed for user (root) Dec 26 08:04:09 host sshd[8013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.221.46.206 user=root Dec 26 08:04:09 host sshd[8013]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 08:04:11 host sshd[8013]: Failed password for invalid user root from 45.221.46.206 port 48786 ssh2 Dec 26 08:04:11 host sshd[8013]: Received disconnect from 45.221.46.206 port 48786:11: Bye Bye [preauth] Dec 26 08:04:11 host sshd[8013]: Disconnected from 45.221.46.206 port 48786 [preauth] Dec 26 08:04:15 host sshd[8039]: User root from 138.197.151.213 not allowed because not listed in AllowUsers Dec 26 08:04:15 host sshd[8039]: input_userauth_request: invalid user root [preauth] Dec 26 08:04:15 host unix_chkpwd[8046]: password check failed for user (root) Dec 26 08:04:15 host sshd[8039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.151.213 user=root Dec 26 08:04:15 host sshd[8039]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 08:04:17 host sshd[8039]: Failed password for invalid user root from 138.197.151.213 port 48112 ssh2 Dec 26 08:04:17 host sshd[8039]: Received disconnect from 138.197.151.213 port 48112:11: Bye Bye [preauth] Dec 26 08:04:17 host sshd[8039]: Disconnected from 138.197.151.213 port 48112 [preauth] Dec 26 08:04:42 host sshd[8147]: User root from 128.199.95.60 not allowed because not listed in AllowUsers Dec 26 08:04:42 host sshd[8147]: input_userauth_request: invalid user root [preauth] Dec 26 08:04:42 host unix_chkpwd[8150]: password check failed for user (root) Dec 26 08:04:42 host sshd[8147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.95.60 user=root Dec 26 08:04:42 host sshd[8147]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 08:04:45 host sshd[8147]: Failed password for invalid user root from 128.199.95.60 port 53934 ssh2 Dec 26 08:04:45 host sshd[8147]: Received disconnect from 128.199.95.60 port 53934:11: Bye Bye [preauth] Dec 26 08:04:45 host sshd[8147]: Disconnected from 128.199.95.60 port 53934 [preauth] Dec 26 08:05:25 host sshd[8403]: User root from 113.161.37.216 not allowed because not listed in AllowUsers Dec 26 08:05:25 host sshd[8403]: input_userauth_request: invalid user root [preauth] Dec 26 08:05:25 host unix_chkpwd[8425]: password check failed for user (root) Dec 26 08:05:25 host sshd[8403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.161.37.216 user=root Dec 26 08:05:25 host sshd[8403]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 08:05:26 host sshd[8403]: Failed password for invalid user root from 113.161.37.216 port 44521 ssh2 Dec 26 08:05:27 host sshd[8403]: Received disconnect from 113.161.37.216 port 44521:11: Bye Bye [preauth] Dec 26 08:05:27 host sshd[8403]: Disconnected from 113.161.37.216 port 44521 [preauth] Dec 26 08:05:32 host sshd[8443]: User root from 189.127.173.52 not allowed because not listed in AllowUsers Dec 26 08:05:32 host sshd[8443]: input_userauth_request: invalid user root [preauth] Dec 26 08:05:32 host unix_chkpwd[8471]: password check failed for user (root) Dec 26 08:05:32 host sshd[8443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.127.173.52 user=root Dec 26 08:05:32 host sshd[8443]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 08:05:33 host sshd[8443]: Failed password for invalid user root from 189.127.173.52 port 56934 ssh2 Dec 26 08:05:33 host sshd[8443]: Received disconnect from 189.127.173.52 port 56934:11: Bye Bye [preauth] Dec 26 08:05:33 host sshd[8443]: Disconnected from 189.127.173.52 port 56934 [preauth] Dec 26 08:07:07 host sshd[8758]: User root from 118.69.71.109 not allowed because not listed in AllowUsers Dec 26 08:07:07 host sshd[8758]: input_userauth_request: invalid user root [preauth] Dec 26 08:07:07 host unix_chkpwd[8762]: password check failed for user (root) Dec 26 08:07:07 host sshd[8758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.69.71.109 user=root Dec 26 08:07:07 host sshd[8758]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 08:07:09 host sshd[8758]: Failed password for invalid user root from 118.69.71.109 port 49895 ssh2 Dec 26 08:07:09 host sshd[8758]: Received disconnect from 118.69.71.109 port 49895:11: Bye Bye [preauth] Dec 26 08:07:09 host sshd[8758]: Disconnected from 118.69.71.109 port 49895 [preauth] Dec 26 08:08:15 host sshd[8896]: Invalid user chensong from 84.110.99.202 port 36762 Dec 26 08:08:15 host sshd[8896]: input_userauth_request: invalid user chensong [preauth] Dec 26 08:08:15 host sshd[8896]: pam_unix(sshd:auth): check pass; user unknown Dec 26 08:08:15 host sshd[8896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.110.99.202 Dec 26 08:08:17 host sshd[8896]: Failed password for invalid user chensong from 84.110.99.202 port 36762 ssh2 Dec 26 08:08:17 host sshd[8896]: Connection closed by 84.110.99.202 port 36762 [preauth] Dec 26 08:08:46 host sshd[8962]: User root from 118.69.71.109 not allowed because not listed in AllowUsers Dec 26 08:08:46 host sshd[8962]: input_userauth_request: invalid user root [preauth] Dec 26 08:08:46 host unix_chkpwd[8965]: password check failed for user (root) Dec 26 08:08:46 host sshd[8962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.69.71.109 user=root Dec 26 08:08:46 host sshd[8962]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 08:08:48 host sshd[8962]: Failed password for invalid user root from 118.69.71.109 port 21681 ssh2 Dec 26 08:08:48 host sshd[8962]: Received disconnect from 118.69.71.109 port 21681:11: Bye Bye [preauth] Dec 26 08:08:48 host sshd[8962]: Disconnected from 118.69.71.109 port 21681 [preauth] Dec 26 08:09:33 host sshd[9129]: Connection closed by 45.221.46.203 port 60840 [preauth] Dec 26 08:12:13 host sshd[9526]: User root from 45.221.46.204 not allowed because not listed in AllowUsers Dec 26 08:12:13 host sshd[9526]: input_userauth_request: invalid user root [preauth] Dec 26 08:12:13 host unix_chkpwd[9531]: password check failed for user (root) Dec 26 08:12:13 host sshd[9526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.221.46.204 user=root Dec 26 08:12:13 host sshd[9526]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 08:12:14 host sshd[9526]: Failed password for invalid user root from 45.221.46.204 port 54223 ssh2 Dec 26 08:12:15 host sshd[9526]: Received disconnect from 45.221.46.204 port 54223:11: Bye Bye [preauth] Dec 26 08:12:15 host sshd[9526]: Disconnected from 45.221.46.204 port 54223 [preauth] Dec 26 08:14:56 host sshd[9866]: User root from 45.221.46.202 not allowed because not listed in AllowUsers Dec 26 08:14:56 host sshd[9866]: input_userauth_request: invalid user root [preauth] Dec 26 08:14:56 host unix_chkpwd[9873]: password check failed for user (root) Dec 26 08:14:56 host sshd[9866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.221.46.202 user=root Dec 26 08:14:56 host sshd[9866]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 08:14:58 host sshd[9866]: Failed password for invalid user root from 45.221.46.202 port 46552 ssh2 Dec 26 08:14:58 host sshd[9866]: Received disconnect from 45.221.46.202 port 46552:11: Bye Bye [preauth] Dec 26 08:14:58 host sshd[9866]: Disconnected from 45.221.46.202 port 46552 [preauth] Dec 26 08:17:02 host sshd[10276]: Connection closed by 220.246.166.71 port 55932 [preauth] Dec 26 08:17:28 host sshd[10342]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Dec 26 08:17:28 host sshd[10342]: input_userauth_request: invalid user root [preauth] Dec 26 08:17:28 host unix_chkpwd[10345]: password check failed for user (root) Dec 26 08:17:28 host sshd[10342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Dec 26 08:17:28 host sshd[10342]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 08:17:30 host sshd[10342]: Failed password for invalid user root from 162.218.126.136 port 56104 ssh2 Dec 26 08:17:31 host sshd[10342]: Connection closed by 162.218.126.136 port 56104 [preauth] Dec 26 08:18:12 host sshd[10408]: Invalid user user from 195.226.194.242 port 34392 Dec 26 08:18:12 host sshd[10408]: input_userauth_request: invalid user user [preauth] Dec 26 08:18:12 host sshd[10408]: pam_unix(sshd:auth): check pass; user unknown Dec 26 08:18:12 host sshd[10408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 Dec 26 08:18:15 host sshd[10408]: Failed password for invalid user user from 195.226.194.242 port 34392 ssh2 Dec 26 08:18:15 host sshd[10408]: Received disconnect from 195.226.194.242 port 34392:11: Bye Bye [preauth] Dec 26 08:18:15 host sshd[10408]: Disconnected from 195.226.194.242 port 34392 [preauth] Dec 26 08:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 08:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 08:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 08:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 08:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 08:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 08:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 08:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 08:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 08:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 26 08:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 08:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 08:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 26 08:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 08:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 08:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 26 08:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 08:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 08:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 26 08:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 08:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 08:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 26 08:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 08:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 08:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 26 08:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 08:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 08:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 26 08:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 08:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 08:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 26 08:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 08:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 08:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 08:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 08:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 08:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 26 08:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 08:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 08:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=travelboniface user-2=wwwresourcehunte user-3=keralaholi user-4=wwwrmswll user-5=ugotscom user-6=wwwpmcresource user-7=a2zgroup user-8=dartsimp user-9=laundryboniface user-10=cochintaxi user-11=wwwkaretakers user-12=palco123 user-13=gifterman user-14=phmetals user-15=kottayamcalldriv user-16=mrsclean user-17=wwwnexidigital user-18=bonifacegroup user-19=wwwevmhonda user-20=straightcurve user-21=wwwletsstalkfood user-22=vfmassets user-23=shalinijames user-24=wwwtestugo user-25=pmcresources user-26=wwwkmaorg user-27=disposeat user-28=remysagr user-29=woodpeck user-30=wwwkapin feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 26 08:21:47 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 26 08:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 08:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 08:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 08:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 08:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 08:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-yMI48sMK1NBWRVyV.~ Dec 26 08:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 08:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 08:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-yMI48sMK1NBWRVyV.~' Dec 26 08:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 08:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 08:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-yMI48sMK1NBWRVyV.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 08:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 08:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 08:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 26 08:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 08:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 26 08:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 08:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 08:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 08:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 08:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 26 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 08:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 08:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 08:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 26 08:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 26 08:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 26 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 26 08:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 08:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 08:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 26 08:21:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 08:21:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 26 08:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 08:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 08:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 26 08:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 08:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 26 08:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 08:22:01 host sshd[11173]: Invalid user cx from 45.93.201.90 port 52450 Dec 26 08:22:01 host sshd[11173]: input_userauth_request: invalid user cx [preauth] Dec 26 08:22:01 host sshd[11173]: pam_unix(sshd:auth): check pass; user unknown Dec 26 08:22:01 host sshd[11173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 26 08:22:04 host sshd[11173]: Failed password for invalid user cx from 45.93.201.90 port 52450 ssh2 Dec 26 08:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 08:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 26 08:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 08:22:07 host sshd[11173]: pam_unix(sshd:auth): check pass; user unknown Dec 26 08:22:09 host sshd[11173]: Failed password for invalid user cx from 45.93.201.90 port 52450 ssh2 Dec 26 08:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 08:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 26 08:22:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 08:22:13 host sshd[11173]: pam_unix(sshd:auth): check pass; user unknown Dec 26 08:22:15 host sshd[11173]: Failed password for invalid user cx from 45.93.201.90 port 52450 ssh2 Dec 26 08:22:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 08:22:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 26 08:22:16 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 08:22:19 host sshd[11173]: Connection closed by 45.93.201.90 port 52450 [preauth] Dec 26 08:22:19 host sshd[11173]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 26 08:22:23 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 08:31:43 host sshd[12458]: User root from 45.221.46.205 not allowed because not listed in AllowUsers Dec 26 08:31:43 host sshd[12458]: input_userauth_request: invalid user root [preauth] Dec 26 08:31:43 host unix_chkpwd[12464]: password check failed for user (root) Dec 26 08:31:43 host sshd[12458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.221.46.205 user=root Dec 26 08:31:43 host sshd[12458]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 08:31:45 host sshd[12458]: Failed password for invalid user root from 45.221.46.205 port 47865 ssh2 Dec 26 08:31:45 host sshd[12458]: Received disconnect from 45.221.46.205 port 47865:11: Bye Bye [preauth] Dec 26 08:31:45 host sshd[12458]: Disconnected from 45.221.46.205 port 47865 [preauth] Dec 26 08:50:15 host sshd[15142]: Invalid user user1 from 92.46.108.20 port 56708 Dec 26 08:50:15 host sshd[15142]: input_userauth_request: invalid user user1 [preauth] Dec 26 08:50:15 host sshd[15142]: pam_unix(sshd:auth): check pass; user unknown Dec 26 08:50:15 host sshd[15142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 26 08:50:16 host sshd[15142]: Failed password for invalid user user1 from 92.46.108.20 port 56708 ssh2 Dec 26 08:50:17 host sshd[15142]: Connection closed by 92.46.108.20 port 56708 [preauth] Dec 26 08:50:32 host sshd[15203]: Invalid user zhangxuan from 103.13.40.2 port 41200 Dec 26 08:50:32 host sshd[15203]: input_userauth_request: invalid user zhangxuan [preauth] Dec 26 08:50:32 host sshd[15203]: pam_unix(sshd:auth): check pass; user unknown Dec 26 08:50:32 host sshd[15203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 26 08:50:34 host sshd[15203]: Failed password for invalid user zhangxuan from 103.13.40.2 port 41200 ssh2 Dec 26 08:50:34 host sshd[15203]: Connection closed by 103.13.40.2 port 41200 [preauth] Dec 26 09:00:00 host sshd[16411]: Invalid user richard from 209.141.56.48 port 53892 Dec 26 09:00:00 host sshd[16411]: input_userauth_request: invalid user richard [preauth] Dec 26 09:00:00 host sshd[16411]: pam_unix(sshd:auth): check pass; user unknown Dec 26 09:00:00 host sshd[16411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Dec 26 09:00:02 host sshd[16411]: Failed password for invalid user richard from 209.141.56.48 port 53892 ssh2 Dec 26 09:00:02 host sshd[16411]: Connection closed by 209.141.56.48 port 53892 [preauth] Dec 26 09:08:06 host sshd[17664]: User root from 128.199.7.94 not allowed because not listed in AllowUsers Dec 26 09:08:06 host sshd[17664]: input_userauth_request: invalid user root [preauth] Dec 26 09:08:06 host unix_chkpwd[17668]: password check failed for user (root) Dec 26 09:08:06 host sshd[17664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.7.94 user=root Dec 26 09:08:06 host sshd[17664]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 09:08:09 host sshd[17664]: Failed password for invalid user root from 128.199.7.94 port 58812 ssh2 Dec 26 09:08:09 host sshd[17664]: Received disconnect from 128.199.7.94 port 58812:11: Bye Bye [preauth] Dec 26 09:08:09 host sshd[17664]: Disconnected from 128.199.7.94 port 58812 [preauth] Dec 26 09:08:55 host sshd[17749]: User root from 198.50.235.42 not allowed because not listed in AllowUsers Dec 26 09:08:55 host sshd[17749]: input_userauth_request: invalid user root [preauth] Dec 26 09:08:55 host unix_chkpwd[17754]: password check failed for user (root) Dec 26 09:08:55 host sshd[17749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.50.235.42 user=root Dec 26 09:08:55 host sshd[17749]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 09:08:58 host sshd[17749]: Failed password for invalid user root from 198.50.235.42 port 58420 ssh2 Dec 26 09:08:58 host sshd[17749]: Received disconnect from 198.50.235.42 port 58420:11: Bye Bye [preauth] Dec 26 09:08:58 host sshd[17749]: Disconnected from 198.50.235.42 port 58420 [preauth] Dec 26 09:10:56 host sshd[18023]: User root from 128.199.7.94 not allowed because not listed in AllowUsers Dec 26 09:10:56 host sshd[18023]: input_userauth_request: invalid user root [preauth] Dec 26 09:10:56 host unix_chkpwd[18028]: password check failed for user (root) Dec 26 09:10:56 host sshd[18023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.7.94 user=root Dec 26 09:10:56 host sshd[18023]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 09:10:58 host sshd[18023]: Failed password for invalid user root from 128.199.7.94 port 50754 ssh2 Dec 26 09:11:08 host sshd[18026]: Connection closed by 117.186.96.54 port 3856 [preauth] Dec 26 09:11:14 host sshd[18105]: User root from 198.50.235.42 not allowed because not listed in AllowUsers Dec 26 09:11:14 host sshd[18105]: input_userauth_request: invalid user root [preauth] Dec 26 09:11:14 host unix_chkpwd[18111]: password check failed for user (root) Dec 26 09:11:14 host sshd[18105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.50.235.42 user=root Dec 26 09:11:14 host sshd[18105]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 09:11:17 host sshd[18105]: Failed password for invalid user root from 198.50.235.42 port 46691 ssh2 Dec 26 09:11:17 host sshd[18105]: Received disconnect from 198.50.235.42 port 46691:11: Bye Bye [preauth] Dec 26 09:11:17 host sshd[18105]: Disconnected from 198.50.235.42 port 46691 [preauth] Dec 26 09:16:53 host sshd[19237]: Invalid user emosfeedback from 106.10.122.53 port 46602 Dec 26 09:16:53 host sshd[19237]: input_userauth_request: invalid user emosfeedback [preauth] Dec 26 09:16:53 host sshd[19237]: pam_unix(sshd:auth): check pass; user unknown Dec 26 09:16:53 host sshd[19237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 26 09:16:55 host sshd[19237]: Failed password for invalid user emosfeedback from 106.10.122.53 port 46602 ssh2 Dec 26 09:16:55 host sshd[19237]: Connection closed by 106.10.122.53 port 46602 [preauth] Dec 26 09:19:33 host sshd[19801]: Invalid user ossuser from 195.226.194.142 port 39064 Dec 26 09:19:33 host sshd[19801]: input_userauth_request: invalid user ossuser [preauth] Dec 26 09:19:33 host sshd[19801]: pam_unix(sshd:auth): check pass; user unknown Dec 26 09:19:33 host sshd[19801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 Dec 26 09:19:35 host sshd[19801]: Failed password for invalid user ossuser from 195.226.194.142 port 39064 ssh2 Dec 26 09:19:35 host sshd[19801]: Received disconnect from 195.226.194.142 port 39064:11: Bye Bye [preauth] Dec 26 09:19:35 host sshd[19801]: Disconnected from 195.226.194.142 port 39064 [preauth] Dec 26 09:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 09:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 09:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 09:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 09:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 09:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 09:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 09:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 09:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 09:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 26 09:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 09:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 09:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 26 09:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 09:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 09:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 26 09:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 09:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 09:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 26 09:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 09:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 09:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 26 09:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 09:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 09:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 26 09:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 09:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 09:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 26 09:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 09:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 09:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 26 09:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 09:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 09:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 09:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 26 09:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 09:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 09:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=dartsimp user-2=a2zgroup user-3=laundryboniface user-4=cochintaxi user-5=wwwkaretakers user-6=travelboniface user-7=wwwrmswll user-8=wwwresourcehunte user-9=keralaholi user-10=ugotscom user-11=wwwpmcresource user-12=vfmassets user-13=wwwtestugo user-14=shalinijames user-15=pmcresources user-16=wwwkmaorg user-17=disposeat user-18=remysagr user-19=wwwkapin user-20=woodpeck user-21=gifterman user-22=palco123 user-23=kottayamcalldriv user-24=phmetals user-25=mrsclean user-26=wwwnexidigital user-27=bonifacegroup user-28=wwwevmhonda user-29=wwwletsstalkfood user-30=straightcurve feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 26 09:21:47 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 26 09:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 09:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 09:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 09:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 09:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 09:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-7QnsXWHleq2ZDrqy.~ Dec 26 09:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 09:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 09:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-7QnsXWHleq2ZDrqy.~' Dec 26 09:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 09:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 09:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-7QnsXWHleq2ZDrqy.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 09:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 09:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 09:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 26 09:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 09:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 09:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 26 09:21:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 09:21:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 09:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 09:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 09:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 09:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 09:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 09:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 09:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 09:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 09:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 09:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 26 09:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 26 09:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 26 09:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 26 09:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 26 09:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 09:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 26 09:21:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 09:21:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 26 09:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 09:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 26 09:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 09:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 09:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 26 09:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 09:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 09:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 26 09:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 09:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 09:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 26 09:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 09:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 09:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 26 09:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 09:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 09:30:57 host sshd[21796]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Dec 26 09:30:57 host sshd[21796]: input_userauth_request: invalid user root [preauth] Dec 26 09:30:57 host unix_chkpwd[21799]: password check failed for user (root) Dec 26 09:30:57 host sshd[21796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Dec 26 09:30:57 host sshd[21796]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 09:30:59 host sshd[21796]: Failed password for invalid user root from 162.218.126.136 port 37370 ssh2 Dec 26 09:30:59 host sshd[21796]: Connection closed by 162.218.126.136 port 37370 [preauth] Dec 26 09:31:19 host sshd[21863]: User root from 143.208.245.146 not allowed because not listed in AllowUsers Dec 26 09:31:19 host sshd[21863]: input_userauth_request: invalid user root [preauth] Dec 26 09:31:19 host unix_chkpwd[21867]: password check failed for user (root) Dec 26 09:31:19 host sshd[21863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.208.245.146 user=root Dec 26 09:31:19 host sshd[21863]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 09:31:20 host sshd[21863]: Failed password for invalid user root from 143.208.245.146 port 60738 ssh2 Dec 26 09:31:21 host sshd[21863]: Received disconnect from 143.208.245.146 port 60738:11: Bye Bye [preauth] Dec 26 09:31:21 host sshd[21863]: Disconnected from 143.208.245.146 port 60738 [preauth] Dec 26 09:31:48 host sshd[21930]: Invalid user user from 84.110.99.202 port 46956 Dec 26 09:31:48 host sshd[21930]: input_userauth_request: invalid user user [preauth] Dec 26 09:31:48 host sshd[21930]: pam_unix(sshd:auth): check pass; user unknown Dec 26 09:31:48 host sshd[21930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.110.99.202 Dec 26 09:31:50 host sshd[21930]: Failed password for invalid user user from 84.110.99.202 port 46956 ssh2 Dec 26 09:31:51 host sshd[21930]: Connection closed by 84.110.99.202 port 46956 [preauth] Dec 26 09:34:32 host sshd[22219]: User root from 143.208.245.146 not allowed because not listed in AllowUsers Dec 26 09:34:32 host sshd[22219]: input_userauth_request: invalid user root [preauth] Dec 26 09:34:32 host unix_chkpwd[22224]: password check failed for user (root) Dec 26 09:34:32 host sshd[22219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.208.245.146 user=root Dec 26 09:34:32 host sshd[22219]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 09:34:33 host sshd[22219]: Failed password for invalid user root from 143.208.245.146 port 42378 ssh2 Dec 26 09:34:33 host sshd[22219]: Received disconnect from 143.208.245.146 port 42378:11: Bye Bye [preauth] Dec 26 09:34:33 host sshd[22219]: Disconnected from 143.208.245.146 port 42378 [preauth] Dec 26 09:39:47 host sshd[23173]: Invalid user user from 41.197.31.178 port 34750 Dec 26 09:39:47 host sshd[23173]: input_userauth_request: invalid user user [preauth] Dec 26 09:39:48 host sshd[23173]: pam_unix(sshd:auth): check pass; user unknown Dec 26 09:39:48 host sshd[23173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 26 09:39:50 host sshd[23173]: Failed password for invalid user user from 41.197.31.178 port 34750 ssh2 Dec 26 09:39:50 host sshd[23173]: Connection closed by 41.197.31.178 port 34750 [preauth] Dec 26 09:48:46 host sshd[24586]: User root from 201.116.12.217 not allowed because not listed in AllowUsers Dec 26 09:48:46 host sshd[24586]: input_userauth_request: invalid user root [preauth] Dec 26 09:48:46 host unix_chkpwd[24592]: password check failed for user (root) Dec 26 09:48:46 host sshd[24586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.116.12.217 user=root Dec 26 09:48:46 host sshd[24586]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 09:48:48 host sshd[24586]: Failed password for invalid user root from 201.116.12.217 port 49989 ssh2 Dec 26 09:48:48 host sshd[24586]: Received disconnect from 201.116.12.217 port 49989:11: Bye Bye [preauth] Dec 26 09:48:48 host sshd[24586]: Disconnected from 201.116.12.217 port 49989 [preauth] Dec 26 09:51:07 host sshd[25009]: User root from 144.22.220.143 not allowed because not listed in AllowUsers Dec 26 09:51:07 host sshd[25009]: input_userauth_request: invalid user root [preauth] Dec 26 09:51:07 host unix_chkpwd[25014]: password check failed for user (root) Dec 26 09:51:07 host sshd[25009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.22.220.143 user=root Dec 26 09:51:07 host sshd[25009]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 09:51:09 host sshd[25009]: Failed password for invalid user root from 144.22.220.143 port 37928 ssh2 Dec 26 09:51:09 host sshd[25009]: Received disconnect from 144.22.220.143 port 37928:11: Bye Bye [preauth] Dec 26 09:51:09 host sshd[25009]: Disconnected from 144.22.220.143 port 37928 [preauth] Dec 26 09:51:30 host sshd[25076]: User root from 154.221.19.216 not allowed because not listed in AllowUsers Dec 26 09:51:30 host sshd[25076]: input_userauth_request: invalid user root [preauth] Dec 26 09:51:30 host unix_chkpwd[25078]: password check failed for user (root) Dec 26 09:51:30 host sshd[25076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.221.19.216 user=root Dec 26 09:51:30 host sshd[25076]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 09:51:32 host sshd[25076]: Failed password for invalid user root from 154.221.19.216 port 60932 ssh2 Dec 26 09:51:32 host sshd[25076]: Received disconnect from 154.221.19.216 port 60932:11: Bye Bye [preauth] Dec 26 09:51:32 host sshd[25076]: Disconnected from 154.221.19.216 port 60932 [preauth] Dec 26 09:53:08 host sshd[25319]: User root from 201.116.12.217 not allowed because not listed in AllowUsers Dec 26 09:53:08 host sshd[25319]: input_userauth_request: invalid user root [preauth] Dec 26 09:53:08 host unix_chkpwd[25322]: password check failed for user (root) Dec 26 09:53:08 host sshd[25319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.116.12.217 user=root Dec 26 09:53:08 host sshd[25319]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 09:53:11 host sshd[25319]: Failed password for invalid user root from 201.116.12.217 port 46680 ssh2 Dec 26 09:54:18 host sshd[25499]: User root from 154.221.19.216 not allowed because not listed in AllowUsers Dec 26 09:54:18 host sshd[25499]: input_userauth_request: invalid user root [preauth] Dec 26 09:54:18 host unix_chkpwd[25501]: password check failed for user (root) Dec 26 09:54:18 host sshd[25499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.221.19.216 user=root Dec 26 09:54:18 host sshd[25499]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 09:54:20 host sshd[25499]: Failed password for invalid user root from 154.221.19.216 port 40694 ssh2 Dec 26 10:08:25 host sshd[27462]: Invalid user cy from 45.93.201.90 port 51590 Dec 26 10:08:25 host sshd[27462]: input_userauth_request: invalid user cy [preauth] Dec 26 10:08:25 host sshd[27462]: pam_unix(sshd:auth): check pass; user unknown Dec 26 10:08:25 host sshd[27462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 26 10:08:27 host sshd[27462]: Failed password for invalid user cy from 45.93.201.90 port 51590 ssh2 Dec 26 10:08:30 host sshd[27462]: pam_unix(sshd:auth): check pass; user unknown Dec 26 10:08:32 host sshd[27462]: Failed password for invalid user cy from 45.93.201.90 port 51590 ssh2 Dec 26 10:08:35 host sshd[27462]: pam_unix(sshd:auth): check pass; user unknown Dec 26 10:08:38 host sshd[27462]: Failed password for invalid user cy from 45.93.201.90 port 51590 ssh2 Dec 26 10:08:41 host sshd[27462]: Connection closed by 45.93.201.90 port 51590 [preauth] Dec 26 10:08:41 host sshd[27462]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 26 10:09:21 host sshd[27600]: User root from 144.22.220.143 not allowed because not listed in AllowUsers Dec 26 10:09:21 host sshd[27600]: input_userauth_request: invalid user root [preauth] Dec 26 10:09:22 host unix_chkpwd[27611]: password check failed for user (root) Dec 26 10:09:22 host sshd[27600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.22.220.143 user=root Dec 26 10:09:22 host sshd[27600]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 10:09:23 host sshd[27600]: Failed password for invalid user root from 144.22.220.143 port 35996 ssh2 Dec 26 10:09:24 host sshd[27600]: Received disconnect from 144.22.220.143 port 35996:11: Bye Bye [preauth] Dec 26 10:09:24 host sshd[27600]: Disconnected from 144.22.220.143 port 35996 [preauth] Dec 26 10:20:39 host sshd[29350]: Invalid user user from 103.13.40.2 port 51322 Dec 26 10:20:39 host sshd[29350]: input_userauth_request: invalid user user [preauth] Dec 26 10:20:39 host sshd[29350]: pam_unix(sshd:auth): check pass; user unknown Dec 26 10:20:39 host sshd[29350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 26 10:20:40 host sshd[29350]: Failed password for invalid user user from 103.13.40.2 port 51322 ssh2 Dec 26 10:20:40 host sshd[29350]: Connection closed by 103.13.40.2 port 51322 [preauth] Dec 26 10:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 10:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 10:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 10:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 10:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 10:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 10:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 10:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 10:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 10:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 26 10:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 10:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 10:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 26 10:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 10:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 10:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 26 10:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 10:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 10:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 26 10:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 10:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 10:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 26 10:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 10:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 10:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 26 10:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 10:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 10:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 26 10:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 10:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 10:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 26 10:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 10:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 10:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 10:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 10:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 10:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 26 10:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 10:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 10:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=keralaholi user-4=wwwresourcehunte user-5=wwwrmswll user-6=ugotscom user-7=cochintaxi user-8=wwwkaretakers user-9=a2zgroup user-10=dartsimp user-11=laundryboniface user-12=bonifacegroup user-13=wwwevmhonda user-14=wwwletsstalkfood user-15=straightcurve user-16=palco123 user-17=gifterman user-18=phmetals user-19=kottayamcalldriv user-20=mrsclean user-21=wwwnexidigital user-22=remysagr user-23=disposeat user-24=wwwkmaorg user-25=woodpeck user-26=wwwkapin user-27=vfmassets user-28=shalinijames user-29=wwwtestugo user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 26 10:21:47 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 26 10:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 10:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 10:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 10:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 10:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PVEbxogTcXSMsKKs.~ Dec 26 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PVEbxogTcXSMsKKs.~' Dec 26 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PVEbxogTcXSMsKKs.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 26 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 26 10:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 10:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 10:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 10:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 10:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 10:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 10:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 10:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 10:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 10:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 10:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 10:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 26 10:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 10:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 10:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 10:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 10:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 10:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 26 10:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 26 10:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 26 10:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 26 10:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 10:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 10:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 26 10:21:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 10:21:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 10:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 26 10:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 10:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 10:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 26 10:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 10:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 10:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 26 10:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 10:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 10:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 26 10:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 10:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 10:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 26 10:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 10:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 10:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 26 10:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 10:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 10:27:36 host sshd[30692]: Bad protocol version identification 'GET / HTTP/1.1' from 116.128.230.184 port 51668 Dec 26 10:27:37 host sshd[30696]: User root from 116.128.230.184 not allowed because not listed in AllowUsers Dec 26 10:27:37 host sshd[30696]: input_userauth_request: invalid user root [preauth] Dec 26 10:27:37 host unix_chkpwd[30699]: password check failed for user (root) Dec 26 10:27:37 host sshd[30696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.128.230.184 user=root Dec 26 10:27:37 host sshd[30696]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 10:27:39 host sshd[30696]: Failed password for invalid user root from 116.128.230.184 port 51822 ssh2 Dec 26 10:27:39 host sshd[30696]: Connection closed by 116.128.230.184 port 51822 [preauth] Dec 26 10:27:41 host sshd[30702]: User root from 116.128.230.184 not allowed because not listed in AllowUsers Dec 26 10:27:41 host sshd[30702]: input_userauth_request: invalid user root [preauth] Dec 26 10:27:41 host unix_chkpwd[30709]: password check failed for user (root) Dec 26 10:27:41 host sshd[30702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.128.230.184 user=root Dec 26 10:27:41 host sshd[30702]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 10:27:43 host sshd[30702]: Failed password for invalid user root from 116.128.230.184 port 53080 ssh2 Dec 26 10:27:43 host sshd[30702]: Connection closed by 116.128.230.184 port 53080 [preauth] Dec 26 10:27:47 host sshd[30712]: User root from 116.128.230.184 not allowed because not listed in AllowUsers Dec 26 10:27:47 host sshd[30712]: input_userauth_request: invalid user root [preauth] Dec 26 10:40:33 host sshd[32513]: User root from 195.226.194.142 not allowed because not listed in AllowUsers Dec 26 10:40:33 host sshd[32513]: input_userauth_request: invalid user root [preauth] Dec 26 10:40:33 host unix_chkpwd[32516]: password check failed for user (root) Dec 26 10:40:33 host sshd[32513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 user=root Dec 26 10:40:33 host sshd[32513]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 10:40:36 host sshd[32513]: Failed password for invalid user root from 195.226.194.142 port 52310 ssh2 Dec 26 10:40:36 host sshd[32513]: Received disconnect from 195.226.194.142 port 52310:11: Bye Bye [preauth] Dec 26 10:40:36 host sshd[32513]: Disconnected from 195.226.194.142 port 52310 [preauth] Dec 26 10:44:03 host sshd[557]: Invalid user user from 162.218.126.136 port 58890 Dec 26 10:44:03 host sshd[557]: input_userauth_request: invalid user user [preauth] Dec 26 10:44:03 host sshd[557]: pam_unix(sshd:auth): check pass; user unknown Dec 26 10:44:03 host sshd[557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 26 10:44:06 host sshd[557]: Failed password for invalid user user from 162.218.126.136 port 58890 ssh2 Dec 26 10:44:06 host sshd[557]: Connection closed by 162.218.126.136 port 58890 [preauth] Dec 26 10:48:58 host sshd[1337]: Invalid user user from 106.10.122.53 port 34636 Dec 26 10:48:58 host sshd[1337]: input_userauth_request: invalid user user [preauth] Dec 26 10:48:58 host sshd[1337]: pam_unix(sshd:auth): check pass; user unknown Dec 26 10:48:58 host sshd[1337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 26 10:48:59 host sshd[1337]: Failed password for invalid user user from 106.10.122.53 port 34636 ssh2 Dec 26 10:49:00 host sshd[1337]: Connection closed by 106.10.122.53 port 34636 [preauth] Dec 26 10:49:09 host sshd[1376]: Invalid user user from 92.46.108.20 port 40708 Dec 26 10:49:09 host sshd[1376]: input_userauth_request: invalid user user [preauth] Dec 26 10:49:10 host sshd[1376]: pam_unix(sshd:auth): check pass; user unknown Dec 26 10:49:10 host sshd[1376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 26 10:49:11 host sshd[1376]: Failed password for invalid user user from 92.46.108.20 port 40708 ssh2 Dec 26 10:49:12 host sshd[1376]: Connection closed by 92.46.108.20 port 40708 [preauth] Dec 26 11:00:28 host sshd[2993]: Did not receive identification string from 87.236.176.217 port 44867 Dec 26 11:00:29 host sshd[3010]: Connection closed by 87.236.176.217 port 57479 [preauth] Dec 26 11:19:24 host sshd[5758]: User root from 209.141.55.27 not allowed because not listed in AllowUsers Dec 26 11:19:24 host sshd[5758]: input_userauth_request: invalid user root [preauth] Dec 26 11:19:24 host unix_chkpwd[5761]: password check failed for user (root) Dec 26 11:19:24 host sshd[5758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.55.27 user=root Dec 26 11:19:24 host sshd[5758]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 11:19:26 host sshd[5758]: Failed password for invalid user root from 209.141.55.27 port 49216 ssh2 Dec 26 11:19:26 host sshd[5758]: Received disconnect from 209.141.55.27 port 49216:11: Normal Shutdown, Thank you for playing [preauth] Dec 26 11:19:26 host sshd[5758]: Disconnected from 209.141.55.27 port 49216 [preauth] Dec 26 11:21:23 host sshd[6065]: Invalid user teste from 195.226.194.142 port 63142 Dec 26 11:21:23 host sshd[6065]: input_userauth_request: invalid user teste [preauth] Dec 26 11:21:23 host sshd[6065]: pam_unix(sshd:auth): check pass; user unknown Dec 26 11:21:23 host sshd[6065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 Dec 26 11:21:25 host sshd[6065]: Failed password for invalid user teste from 195.226.194.142 port 63142 ssh2 Dec 26 11:21:25 host sshd[6065]: Received disconnect from 195.226.194.142 port 63142:11: Bye Bye [preauth] Dec 26 11:21:25 host sshd[6065]: Disconnected from 195.226.194.142 port 63142 [preauth] Dec 26 11:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 11:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 11:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 11:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 11:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 11:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 11:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 11:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 11:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 11:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 26 11:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 11:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 11:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 26 11:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 11:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 11:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 26 11:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 11:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 11:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 26 11:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 11:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 11:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 26 11:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 11:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 11:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 26 11:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 11:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 11:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 26 11:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 11:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 11:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 26 11:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 11:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 11:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 11:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 11:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 11:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 26 11:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 11:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 11:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=a2zgroup user-4=dartsimp user-5=laundryboniface user-6=wwwpmcresource user-7=travelboniface user-8=keralaholi user-9=wwwresourcehunte user-10=wwwrmswll user-11=ugotscom user-12=wwwkmaorg user-13=disposeat user-14=remysagr user-15=wwwkapin user-16=woodpeck user-17=vfmassets user-18=shalinijames user-19=wwwtestugo user-20=pmcresources user-21=bonifacegroup user-22=wwwevmhonda user-23=wwwletsstalkfood user-24=straightcurve user-25=palco123 user-26=gifterman user-27=phmetals user-28=kottayamcalldriv user-29=wwwnexidigital user-30=mrsclean feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 26 11:21:47 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 26 11:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 11:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 11:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 11:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-jWvZ9rDO1xD5FmgR.~ Dec 26 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-jWvZ9rDO1xD5FmgR.~' Dec 26 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-jWvZ9rDO1xD5FmgR.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 26 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 26 11:21:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 11:21:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 26 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 11:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 11:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 11:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 11:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 26 11:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 26 11:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 26 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 26 11:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 11:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 26 11:21:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 11:21:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 11:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 26 11:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 11:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 11:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 26 11:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 11:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 11:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 26 11:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 11:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 11:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 26 11:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 11:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 11:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 26 11:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 11:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 11:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 26 11:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 11:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 11:24:39 host sshd[6659]: User root from 179.189.19.64 not allowed because not listed in AllowUsers Dec 26 11:24:39 host sshd[6659]: input_userauth_request: invalid user root [preauth] Dec 26 11:24:39 host unix_chkpwd[6662]: password check failed for user (root) Dec 26 11:24:39 host sshd[6659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.189.19.64 user=root Dec 26 11:24:39 host sshd[6659]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 11:24:41 host sshd[6659]: Failed password for invalid user root from 179.189.19.64 port 50169 ssh2 Dec 26 11:24:41 host sshd[6659]: Received disconnect from 179.189.19.64 port 50169:11: Bye Bye [preauth] Dec 26 11:24:41 host sshd[6659]: Disconnected from 179.189.19.64 port 50169 [preauth] Dec 26 11:25:25 host sshd[6734]: User root from 164.90.184.46 not allowed because not listed in AllowUsers Dec 26 11:25:25 host sshd[6734]: input_userauth_request: invalid user root [preauth] Dec 26 11:25:25 host unix_chkpwd[6759]: password check failed for user (root) Dec 26 11:25:25 host sshd[6734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.90.184.46 user=root Dec 26 11:25:25 host sshd[6734]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 11:25:27 host sshd[6734]: Failed password for invalid user root from 164.90.184.46 port 50098 ssh2 Dec 26 11:25:27 host sshd[6734]: Received disconnect from 164.90.184.46 port 50098:11: Bye Bye [preauth] Dec 26 11:25:27 host sshd[6734]: Disconnected from 164.90.184.46 port 50098 [preauth] Dec 26 11:29:55 host sshd[7691]: User root from 41.197.31.178 not allowed because not listed in AllowUsers Dec 26 11:29:55 host sshd[7691]: input_userauth_request: invalid user root [preauth] Dec 26 11:29:55 host unix_chkpwd[7695]: password check failed for user (root) Dec 26 11:29:55 host sshd[7691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 user=root Dec 26 11:29:55 host sshd[7691]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 11:29:57 host sshd[7691]: Failed password for invalid user root from 41.197.31.178 port 33302 ssh2 Dec 26 11:29:57 host sshd[7691]: Connection closed by 41.197.31.178 port 33302 [preauth] Dec 26 11:30:24 host sshd[7780]: User root from 179.189.19.64 not allowed because not listed in AllowUsers Dec 26 11:30:24 host sshd[7780]: input_userauth_request: invalid user root [preauth] Dec 26 11:30:24 host unix_chkpwd[7787]: password check failed for user (root) Dec 26 11:30:24 host sshd[7780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.189.19.64 user=root Dec 26 11:30:24 host sshd[7780]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 11:30:25 host sshd[7780]: Failed password for invalid user root from 179.189.19.64 port 51319 ssh2 Dec 26 11:30:26 host sshd[7780]: Received disconnect from 179.189.19.64 port 51319:11: Bye Bye [preauth] Dec 26 11:30:26 host sshd[7780]: Disconnected from 179.189.19.64 port 51319 [preauth] Dec 26 11:30:47 host sshd[7992]: User root from 164.90.184.46 not allowed because not listed in AllowUsers Dec 26 11:30:47 host sshd[7992]: input_userauth_request: invalid user root [preauth] Dec 26 11:30:47 host unix_chkpwd[7996]: password check failed for user (root) Dec 26 11:30:47 host sshd[7992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.90.184.46 user=root Dec 26 11:30:47 host sshd[7992]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 11:30:49 host sshd[7992]: Failed password for invalid user root from 164.90.184.46 port 57778 ssh2 Dec 26 11:36:58 host sshd[9089]: Invalid user charles from 209.141.56.48 port 37338 Dec 26 11:36:58 host sshd[9089]: input_userauth_request: invalid user charles [preauth] Dec 26 11:36:58 host sshd[9089]: pam_unix(sshd:auth): check pass; user unknown Dec 26 11:36:58 host sshd[9089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Dec 26 11:37:00 host sshd[9089]: Failed password for invalid user charles from 209.141.56.48 port 37338 ssh2 Dec 26 11:37:00 host sshd[9089]: Connection closed by 209.141.56.48 port 37338 [preauth] Dec 26 11:45:21 host sshd[10383]: User root from 124.230.167.26 not allowed because not listed in AllowUsers Dec 26 11:45:21 host sshd[10383]: input_userauth_request: invalid user root [preauth] Dec 26 11:45:21 host unix_chkpwd[10387]: password check failed for user (root) Dec 26 11:45:21 host sshd[10383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.230.167.26 user=root Dec 26 11:45:21 host sshd[10383]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 11:45:23 host sshd[10383]: Failed password for invalid user root from 124.230.167.26 port 40395 ssh2 Dec 26 11:45:24 host sshd[10383]: Connection closed by 124.230.167.26 port 40395 [preauth] Dec 26 11:45:26 host sshd[10391]: User root from 124.230.167.26 not allowed because not listed in AllowUsers Dec 26 11:45:26 host sshd[10391]: input_userauth_request: invalid user root [preauth] Dec 26 11:45:26 host unix_chkpwd[10416]: password check failed for user (root) Dec 26 11:45:26 host sshd[10391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.230.167.26 user=root Dec 26 11:45:26 host sshd[10391]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 11:45:29 host sshd[10391]: Failed password for invalid user root from 124.230.167.26 port 40902 ssh2 Dec 26 11:45:29 host sshd[10391]: Connection closed by 124.230.167.26 port 40902 [preauth] Dec 26 11:50:48 host sshd[11232]: Invalid user chw from 103.13.40.2 port 57008 Dec 26 11:50:48 host sshd[11232]: input_userauth_request: invalid user chw [preauth] Dec 26 11:50:48 host sshd[11232]: pam_unix(sshd:auth): check pass; user unknown Dec 26 11:50:48 host sshd[11232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 26 11:50:50 host sshd[11232]: Failed password for invalid user chw from 103.13.40.2 port 57008 ssh2 Dec 26 11:50:50 host sshd[11232]: Connection closed by 103.13.40.2 port 57008 [preauth] Dec 26 11:52:23 host sshd[11380]: User root from 165.227.173.102 not allowed because not listed in AllowUsers Dec 26 11:52:23 host sshd[11380]: input_userauth_request: invalid user root [preauth] Dec 26 11:52:24 host unix_chkpwd[11384]: password check failed for user (root) Dec 26 11:52:24 host sshd[11380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.173.102 user=root Dec 26 11:52:24 host sshd[11380]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 11:52:26 host sshd[11380]: Failed password for invalid user root from 165.227.173.102 port 37094 ssh2 Dec 26 11:52:26 host sshd[11380]: Connection closed by 165.227.173.102 port 37094 [preauth] Dec 26 11:53:42 host sshd[11568]: Invalid user cz from 45.93.201.90 port 42324 Dec 26 11:53:42 host sshd[11568]: input_userauth_request: invalid user cz [preauth] Dec 26 11:53:42 host sshd[11568]: pam_unix(sshd:auth): check pass; user unknown Dec 26 11:53:42 host sshd[11568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 26 11:53:44 host sshd[11568]: Failed password for invalid user cz from 45.93.201.90 port 42324 ssh2 Dec 26 11:53:47 host sshd[11568]: pam_unix(sshd:auth): check pass; user unknown Dec 26 11:53:49 host sshd[11568]: Failed password for invalid user cz from 45.93.201.90 port 42324 ssh2 Dec 26 11:53:52 host sshd[11568]: pam_unix(sshd:auth): check pass; user unknown Dec 26 11:53:54 host sshd[11568]: Failed password for invalid user cz from 45.93.201.90 port 42324 ssh2 Dec 26 11:53:57 host sshd[11568]: Connection closed by 45.93.201.90 port 42324 [preauth] Dec 26 11:53:57 host sshd[11568]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 26 11:56:54 host sshd[12058]: Invalid user super from 162.218.126.136 port 45820 Dec 26 11:56:54 host sshd[12058]: input_userauth_request: invalid user super [preauth] Dec 26 11:56:54 host sshd[12058]: pam_unix(sshd:auth): check pass; user unknown Dec 26 11:56:54 host sshd[12058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 26 11:56:57 host sshd[12058]: Failed password for invalid user super from 162.218.126.136 port 45820 ssh2 Dec 26 11:56:57 host sshd[12058]: Connection closed by 162.218.126.136 port 45820 [preauth] Dec 26 12:00:25 host sshd[12640]: User root from 78.139.216.115 not allowed because not listed in AllowUsers Dec 26 12:00:25 host sshd[12640]: input_userauth_request: invalid user root [preauth] Dec 26 12:00:25 host unix_chkpwd[12646]: password check failed for user (root) Dec 26 12:00:25 host sshd[12640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.139.216.115 user=root Dec 26 12:00:25 host sshd[12640]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 12:00:27 host sshd[12640]: Failed password for invalid user root from 78.139.216.115 port 56716 ssh2 Dec 26 12:00:27 host sshd[12640]: Received disconnect from 78.139.216.115 port 56716:11: Bye Bye [preauth] Dec 26 12:00:27 host sshd[12640]: Disconnected from 78.139.216.115 port 56716 [preauth] Dec 26 12:02:43 host sshd[12979]: User root from 118.201.79.222 not allowed because not listed in AllowUsers Dec 26 12:02:43 host sshd[12979]: input_userauth_request: invalid user root [preauth] Dec 26 12:02:43 host unix_chkpwd[12981]: password check failed for user (root) Dec 26 12:02:43 host sshd[12979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.201.79.222 user=root Dec 26 12:02:43 host sshd[12979]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 12:02:45 host sshd[12979]: Failed password for invalid user root from 118.201.79.222 port 44301 ssh2 Dec 26 12:02:45 host sshd[12979]: Received disconnect from 118.201.79.222 port 44301:11: Bye Bye [preauth] Dec 26 12:02:45 host sshd[12979]: Disconnected from 118.201.79.222 port 44301 [preauth] Dec 26 12:03:01 host sshd[12998]: User root from 112.220.27.58 not allowed because not listed in AllowUsers Dec 26 12:03:01 host sshd[12998]: input_userauth_request: invalid user root [preauth] Dec 26 12:03:01 host unix_chkpwd[13003]: password check failed for user (root) Dec 26 12:03:01 host sshd[12998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.220.27.58 user=root Dec 26 12:03:01 host sshd[12998]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 12:03:03 host sshd[12998]: Failed password for invalid user root from 112.220.27.58 port 33158 ssh2 Dec 26 12:03:03 host sshd[12998]: Received disconnect from 112.220.27.58 port 33158:11: Bye Bye [preauth] Dec 26 12:03:03 host sshd[12998]: Disconnected from 112.220.27.58 port 33158 [preauth] Dec 26 12:03:21 host sshd[13044]: User root from 137.184.81.127 not allowed because not listed in AllowUsers Dec 26 12:03:21 host sshd[13044]: input_userauth_request: invalid user root [preauth] Dec 26 12:03:21 host unix_chkpwd[13057]: password check failed for user (root) Dec 26 12:03:21 host sshd[13044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.81.127 user=root Dec 26 12:03:21 host sshd[13044]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 12:03:23 host sshd[13044]: Failed password for invalid user root from 137.184.81.127 port 47088 ssh2 Dec 26 12:03:23 host sshd[13044]: Received disconnect from 137.184.81.127 port 47088:11: Bye Bye [preauth] Dec 26 12:03:23 host sshd[13044]: Disconnected from 137.184.81.127 port 47088 [preauth] Dec 26 12:03:58 host sshd[13157]: User root from 124.105.173.17 not allowed because not listed in AllowUsers Dec 26 12:03:58 host sshd[13157]: input_userauth_request: invalid user root [preauth] Dec 26 12:03:58 host unix_chkpwd[13160]: password check failed for user (root) Dec 26 12:03:58 host sshd[13157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.105.173.17 user=root Dec 26 12:03:58 host sshd[13157]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 12:04:00 host sshd[13157]: Failed password for invalid user root from 124.105.173.17 port 56201 ssh2 Dec 26 12:04:00 host sshd[13157]: Received disconnect from 124.105.173.17 port 56201:11: Bye Bye [preauth] Dec 26 12:04:00 host sshd[13157]: Disconnected from 124.105.173.17 port 56201 [preauth] Dec 26 12:04:26 host sshd[13226]: User root from 165.22.51.205 not allowed because not listed in AllowUsers Dec 26 12:04:26 host sshd[13226]: input_userauth_request: invalid user root [preauth] Dec 26 12:04:26 host unix_chkpwd[13228]: password check failed for user (root) Dec 26 12:04:26 host sshd[13226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.51.205 user=root Dec 26 12:04:26 host sshd[13226]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 12:04:27 host sshd[13229]: User root from 62.117.65.188 not allowed because not listed in AllowUsers Dec 26 12:04:27 host sshd[13229]: input_userauth_request: invalid user root [preauth] Dec 26 12:04:27 host unix_chkpwd[13234]: password check failed for user (root) Dec 26 12:04:27 host sshd[13229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.117.65.188 user=root Dec 26 12:04:27 host sshd[13229]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 12:04:28 host sshd[13232]: User root from 137.184.0.243 not allowed because not listed in AllowUsers Dec 26 12:04:28 host sshd[13232]: input_userauth_request: invalid user root [preauth] Dec 26 12:04:28 host unix_chkpwd[13236]: password check failed for user (root) Dec 26 12:04:28 host sshd[13232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.0.243 user=root Dec 26 12:04:28 host sshd[13232]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 12:04:28 host sshd[13226]: Failed password for invalid user root from 165.22.51.205 port 35742 ssh2 Dec 26 12:04:28 host sshd[13226]: Received disconnect from 165.22.51.205 port 35742:11: Bye Bye [preauth] Dec 26 12:04:28 host sshd[13226]: Disconnected from 165.22.51.205 port 35742 [preauth] Dec 26 12:04:29 host sshd[13229]: Failed password for invalid user root from 62.117.65.188 port 36650 ssh2 Dec 26 12:04:29 host sshd[13229]: Received disconnect from 62.117.65.188 port 36650:11: Bye Bye [preauth] Dec 26 12:04:29 host sshd[13229]: Disconnected from 62.117.65.188 port 36650 [preauth] Dec 26 12:04:29 host sshd[13232]: Failed password for invalid user root from 137.184.0.243 port 47662 ssh2 Dec 26 12:04:30 host sshd[13232]: Received disconnect from 137.184.0.243 port 47662:11: Bye Bye [preauth] Dec 26 12:04:30 host sshd[13232]: Disconnected from 137.184.0.243 port 47662 [preauth] Dec 26 12:04:52 host sshd[13269]: User root from 143.198.158.111 not allowed because not listed in AllowUsers Dec 26 12:04:52 host sshd[13269]: input_userauth_request: invalid user root [preauth] Dec 26 12:04:52 host unix_chkpwd[13272]: password check failed for user (root) Dec 26 12:04:52 host sshd[13269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.158.111 user=root Dec 26 12:04:52 host sshd[13269]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 12:04:54 host sshd[13269]: Failed password for invalid user root from 143.198.158.111 port 36370 ssh2 Dec 26 12:04:54 host sshd[13269]: Received disconnect from 143.198.158.111 port 36370:11: Bye Bye [preauth] Dec 26 12:04:54 host sshd[13269]: Disconnected from 143.198.158.111 port 36370 [preauth] Dec 26 12:06:18 host sshd[13525]: User root from 78.139.216.115 not allowed because not listed in AllowUsers Dec 26 12:06:18 host sshd[13525]: input_userauth_request: invalid user root [preauth] Dec 26 12:06:18 host unix_chkpwd[13528]: password check failed for user (root) Dec 26 12:06:18 host sshd[13525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.139.216.115 user=root Dec 26 12:06:18 host sshd[13525]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 12:06:19 host sshd[13525]: Failed password for invalid user root from 78.139.216.115 port 60142 ssh2 Dec 26 12:06:19 host sshd[13525]: Received disconnect from 78.139.216.115 port 60142:11: Bye Bye [preauth] Dec 26 12:06:19 host sshd[13525]: Disconnected from 78.139.216.115 port 60142 [preauth] Dec 26 12:07:25 host sshd[13689]: User root from 118.201.79.222 not allowed because not listed in AllowUsers Dec 26 12:07:25 host sshd[13689]: input_userauth_request: invalid user root [preauth] Dec 26 12:07:25 host unix_chkpwd[13691]: password check failed for user (root) Dec 26 12:07:25 host sshd[13689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.201.79.222 user=root Dec 26 12:07:25 host sshd[13689]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 12:07:27 host sshd[13689]: Failed password for invalid user root from 118.201.79.222 port 50450 ssh2 Dec 26 12:07:27 host sshd[13689]: Received disconnect from 118.201.79.222 port 50450:11: Bye Bye [preauth] Dec 26 12:07:27 host sshd[13689]: Disconnected from 118.201.79.222 port 50450 [preauth] Dec 26 12:07:34 host sshd[13737]: User root from 41.76.175.75 not allowed because not listed in AllowUsers Dec 26 12:07:34 host sshd[13737]: input_userauth_request: invalid user root [preauth] Dec 26 12:07:34 host unix_chkpwd[13740]: password check failed for user (root) Dec 26 12:07:34 host sshd[13737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.76.175.75 user=root Dec 26 12:07:34 host sshd[13737]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 12:07:36 host sshd[13737]: Failed password for invalid user root from 41.76.175.75 port 46308 ssh2 Dec 26 12:07:36 host sshd[13737]: Received disconnect from 41.76.175.75 port 46308:11: Bye Bye [preauth] Dec 26 12:07:36 host sshd[13737]: Disconnected from 41.76.175.75 port 46308 [preauth] Dec 26 12:07:40 host sshd[13746]: User root from 137.184.81.127 not allowed because not listed in AllowUsers Dec 26 12:07:40 host sshd[13746]: input_userauth_request: invalid user root [preauth] Dec 26 12:07:40 host unix_chkpwd[13749]: password check failed for user (root) Dec 26 12:07:40 host sshd[13746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.81.127 user=root Dec 26 12:07:40 host sshd[13746]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 12:07:42 host sshd[13746]: Failed password for invalid user root from 137.184.81.127 port 35876 ssh2 Dec 26 12:07:42 host sshd[13746]: Received disconnect from 137.184.81.127 port 35876:11: Bye Bye [preauth] Dec 26 12:07:42 host sshd[13746]: Disconnected from 137.184.81.127 port 35876 [preauth] Dec 26 12:07:53 host sshd[13807]: User root from 112.220.27.58 not allowed because not listed in AllowUsers Dec 26 12:07:53 host sshd[13807]: input_userauth_request: invalid user root [preauth] Dec 26 12:07:53 host unix_chkpwd[13810]: password check failed for user (root) Dec 26 12:07:53 host sshd[13807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.220.27.58 user=root Dec 26 12:07:53 host sshd[13807]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 12:07:55 host sshd[13812]: User root from 62.117.65.188 not allowed because not listed in AllowUsers Dec 26 12:07:55 host sshd[13812]: input_userauth_request: invalid user root [preauth] Dec 26 12:07:55 host unix_chkpwd[13844]: password check failed for user (root) Dec 26 12:07:55 host sshd[13812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.117.65.188 user=root Dec 26 12:07:55 host sshd[13812]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 12:07:55 host sshd[13807]: Failed password for invalid user root from 112.220.27.58 port 52990 ssh2 Dec 26 12:07:57 host sshd[13812]: Failed password for invalid user root from 62.117.65.188 port 36496 ssh2 Dec 26 12:07:57 host sshd[13812]: Received disconnect from 62.117.65.188 port 36496:11: Bye Bye [preauth] Dec 26 12:07:57 host sshd[13812]: Disconnected from 62.117.65.188 port 36496 [preauth] Dec 26 12:08:09 host sshd[13909]: User root from 165.22.51.205 not allowed because not listed in AllowUsers Dec 26 12:08:09 host sshd[13909]: input_userauth_request: invalid user root [preauth] Dec 26 12:08:09 host unix_chkpwd[13913]: password check failed for user (root) Dec 26 12:08:09 host sshd[13909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.51.205 user=root Dec 26 12:08:09 host sshd[13909]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 12:08:11 host sshd[13909]: Failed password for invalid user root from 165.22.51.205 port 47162 ssh2 Dec 26 12:08:15 host sshd[13962]: User root from 137.184.0.243 not allowed because not listed in AllowUsers Dec 26 12:08:15 host sshd[13962]: input_userauth_request: invalid user root [preauth] Dec 26 12:08:15 host unix_chkpwd[13966]: password check failed for user (root) Dec 26 12:08:15 host sshd[13962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.0.243 user=root Dec 26 12:08:15 host sshd[13962]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 12:08:17 host sshd[13962]: Failed password for invalid user root from 137.184.0.243 port 49218 ssh2 Dec 26 12:08:17 host sshd[13962]: Received disconnect from 137.184.0.243 port 49218:11: Bye Bye [preauth] Dec 26 12:08:17 host sshd[13962]: Disconnected from 137.184.0.243 port 49218 [preauth] Dec 26 12:08:26 host sshd[14059]: User root from 143.198.158.111 not allowed because not listed in AllowUsers Dec 26 12:08:26 host sshd[14059]: input_userauth_request: invalid user root [preauth] Dec 26 12:08:26 host unix_chkpwd[14066]: password check failed for user (root) Dec 26 12:08:26 host sshd[14059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.158.111 user=root Dec 26 12:08:26 host sshd[14059]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 12:08:28 host sshd[14059]: Failed password for invalid user root from 143.198.158.111 port 58936 ssh2 Dec 26 12:08:29 host sshd[14059]: Received disconnect from 143.198.158.111 port 58936:11: Bye Bye [preauth] Dec 26 12:08:29 host sshd[14059]: Disconnected from 143.198.158.111 port 58936 [preauth] Dec 26 12:08:40 host sshd[14143]: User root from 124.105.173.17 not allowed because not listed in AllowUsers Dec 26 12:08:40 host sshd[14143]: input_userauth_request: invalid user root [preauth] Dec 26 12:08:40 host unix_chkpwd[14149]: password check failed for user (root) Dec 26 12:08:40 host sshd[14143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.105.173.17 user=root Dec 26 12:08:40 host sshd[14143]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 12:08:41 host sshd[14143]: Failed password for invalid user root from 124.105.173.17 port 50487 ssh2 Dec 26 12:08:41 host sshd[14143]: Received disconnect from 124.105.173.17 port 50487:11: Bye Bye [preauth] Dec 26 12:08:41 host sshd[14143]: Disconnected from 124.105.173.17 port 50487 [preauth] Dec 26 12:09:22 host sshd[14353]: User root from 41.76.175.75 not allowed because not listed in AllowUsers Dec 26 12:09:22 host sshd[14353]: input_userauth_request: invalid user root [preauth] Dec 26 12:09:22 host unix_chkpwd[14359]: password check failed for user (root) Dec 26 12:09:22 host sshd[14353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.76.175.75 user=root Dec 26 12:09:22 host sshd[14353]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 12:09:24 host sshd[14353]: Failed password for invalid user root from 41.76.175.75 port 33622 ssh2 Dec 26 12:09:24 host sshd[14353]: Received disconnect from 41.76.175.75 port 33622:11: Bye Bye [preauth] Dec 26 12:09:24 host sshd[14353]: Disconnected from 41.76.175.75 port 33622 [preauth] Dec 26 12:14:31 host sshd[15903]: User root from 164.92.94.14 not allowed because not listed in AllowUsers Dec 26 12:14:31 host sshd[15903]: input_userauth_request: invalid user root [preauth] Dec 26 12:14:31 host unix_chkpwd[15923]: password check failed for user (root) Dec 26 12:14:31 host sshd[15903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.14 user=root Dec 26 12:14:31 host sshd[15903]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 12:14:33 host sshd[15903]: Failed password for invalid user root from 164.92.94.14 port 52774 ssh2 Dec 26 12:14:33 host sshd[15903]: Received disconnect from 164.92.94.14 port 52774:11: Bye Bye [preauth] Dec 26 12:14:33 host sshd[15903]: Disconnected from 164.92.94.14 port 52774 [preauth] Dec 26 12:15:28 host sshd[16364]: Connection closed by 45.79.181.94 port 44524 [preauth] Dec 26 12:15:30 host sshd[16384]: Connection closed by 45.79.181.94 port 19002 [preauth] Dec 26 12:15:31 host sshd[16407]: Connection closed by 45.79.181.94 port 19008 [preauth] Dec 26 12:16:56 host sshd[17153]: User root from 102.128.78.42 not allowed because not listed in AllowUsers Dec 26 12:16:56 host sshd[17153]: input_userauth_request: invalid user root [preauth] Dec 26 12:16:56 host unix_chkpwd[17169]: password check failed for user (root) Dec 26 12:16:56 host sshd[17153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.128.78.42 user=root Dec 26 12:16:56 host sshd[17153]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 12:16:57 host sshd[17165]: User root from 65.155.105.188 not allowed because not listed in AllowUsers Dec 26 12:16:57 host sshd[17165]: input_userauth_request: invalid user root [preauth] Dec 26 12:16:57 host unix_chkpwd[17172]: password check failed for user (root) Dec 26 12:16:57 host sshd[17165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.155.105.188 user=root Dec 26 12:16:57 host sshd[17165]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 12:16:58 host sshd[17153]: Failed password for invalid user root from 102.128.78.42 port 33762 ssh2 Dec 26 12:16:59 host sshd[17153]: Received disconnect from 102.128.78.42 port 33762:11: Bye Bye [preauth] Dec 26 12:16:59 host sshd[17153]: Disconnected from 102.128.78.42 port 33762 [preauth] Dec 26 12:16:59 host sshd[17165]: Failed password for invalid user root from 65.155.105.188 port 46030 ssh2 Dec 26 12:17:00 host sshd[17165]: Received disconnect from 65.155.105.188 port 46030:11: Bye Bye [preauth] Dec 26 12:17:00 host sshd[17165]: Disconnected from 65.155.105.188 port 46030 [preauth] Dec 26 12:17:40 host sshd[17582]: User root from 20.122.7.237 not allowed because not listed in AllowUsers Dec 26 12:17:40 host sshd[17582]: input_userauth_request: invalid user root [preauth] Dec 26 12:17:40 host unix_chkpwd[17588]: password check failed for user (root) Dec 26 12:17:40 host sshd[17582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.122.7.237 user=root Dec 26 12:17:40 host sshd[17582]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 12:17:43 host sshd[17582]: Failed password for invalid user root from 20.122.7.237 port 46330 ssh2 Dec 26 12:17:43 host sshd[17582]: Received disconnect from 20.122.7.237 port 46330:11: Bye Bye [preauth] Dec 26 12:17:43 host sshd[17582]: Disconnected from 20.122.7.237 port 46330 [preauth] Dec 26 12:19:12 host sshd[18074]: User root from 65.155.105.188 not allowed because not listed in AllowUsers Dec 26 12:19:12 host sshd[18074]: input_userauth_request: invalid user root [preauth] Dec 26 12:19:12 host unix_chkpwd[18080]: password check failed for user (root) Dec 26 12:19:12 host sshd[18074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.155.105.188 user=root Dec 26 12:19:12 host sshd[18074]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 12:19:15 host sshd[18074]: Failed password for invalid user root from 65.155.105.188 port 53286 ssh2 Dec 26 12:19:15 host sshd[18074]: Received disconnect from 65.155.105.188 port 53286:11: Bye Bye [preauth] Dec 26 12:19:15 host sshd[18074]: Disconnected from 65.155.105.188 port 53286 [preauth] Dec 26 12:19:18 host sshd[18128]: User root from 20.122.7.237 not allowed because not listed in AllowUsers Dec 26 12:19:18 host sshd[18128]: input_userauth_request: invalid user root [preauth] Dec 26 12:19:18 host unix_chkpwd[18134]: password check failed for user (root) Dec 26 12:19:18 host sshd[18128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.122.7.237 user=root Dec 26 12:19:18 host sshd[18128]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 12:19:20 host sshd[18128]: Failed password for invalid user root from 20.122.7.237 port 39332 ssh2 Dec 26 12:19:20 host sshd[18128]: Received disconnect from 20.122.7.237 port 39332:11: Bye Bye [preauth] Dec 26 12:19:20 host sshd[18128]: Disconnected from 20.122.7.237 port 39332 [preauth] Dec 26 12:19:38 host sshd[18275]: User root from 164.92.94.14 not allowed because not listed in AllowUsers Dec 26 12:19:38 host sshd[18275]: input_userauth_request: invalid user root [preauth] Dec 26 12:19:38 host unix_chkpwd[18284]: password check failed for user (root) Dec 26 12:19:38 host sshd[18275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.14 user=root Dec 26 12:19:38 host sshd[18275]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 12:19:41 host sshd[18275]: Failed password for invalid user root from 164.92.94.14 port 46882 ssh2 Dec 26 12:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 12:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 12:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 12:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 12:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 12:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 12:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 12:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 12:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 12:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 26 12:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 12:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 12:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 26 12:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 12:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 12:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 26 12:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 12:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 12:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 26 12:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 12:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 12:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 26 12:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 12:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 12:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 26 12:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 12:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 12:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 26 12:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 12:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 12:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 26 12:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 12:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 26 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=a2zgroup user-3=dartsimp user-4=wwwkaretakers user-5=cochintaxi user-6=wwwresourcehunte user-7=keralaholi user-8=wwwrmswll user-9=ugotscom user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=vfmassets user-14=shalinijames user-15=wwwtestugo user-16=woodpeck user-17=wwwkapin user-18=wwwkmaorg user-19=disposeat user-20=remysagr user-21=mrsclean user-22=wwwnexidigital user-23=palco123 user-24=gifterman user-25=phmetals user-26=kottayamcalldriv user-27=straightcurve user-28=wwwletsstalkfood user-29=bonifacegroup user-30=wwwevmhonda feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 26 12:21:47 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 26 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-0gLeuMB1iaZUvbHi.~ Dec 26 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-0gLeuMB1iaZUvbHi.~' Dec 26 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-0gLeuMB1iaZUvbHi.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 26 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 12:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 26 12:21:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 12:21:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 12:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 12:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 12:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 12:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 12:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 12:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 12:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 12:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 12:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 12:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 26 12:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 12:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 26 12:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 26 12:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 26 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 26 12:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 12:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 12:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 26 12:21:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 12:21:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 12:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 26 12:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 12:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 26 12:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 12:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 26 12:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 12:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 12:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 26 12:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 12:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 12:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 26 12:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 12:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 12:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 26 12:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 12:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 12:22:13 host sshd[19268]: User root from 102.128.78.42 not allowed because not listed in AllowUsers Dec 26 12:22:13 host sshd[19268]: input_userauth_request: invalid user root [preauth] Dec 26 12:22:13 host unix_chkpwd[19275]: password check failed for user (root) Dec 26 12:22:13 host sshd[19268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.128.78.42 user=root Dec 26 12:22:13 host sshd[19268]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 12:22:15 host sshd[19268]: Failed password for invalid user root from 102.128.78.42 port 50972 ssh2 Dec 26 12:24:25 host sshd[19994]: Invalid user rsync from 106.10.122.53 port 42038 Dec 26 12:24:25 host sshd[19994]: input_userauth_request: invalid user rsync [preauth] Dec 26 12:24:25 host sshd[19994]: pam_unix(sshd:auth): check pass; user unknown Dec 26 12:24:25 host sshd[19994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 26 12:24:27 host sshd[19994]: Failed password for invalid user rsync from 106.10.122.53 port 42038 ssh2 Dec 26 12:24:28 host sshd[19994]: Connection closed by 106.10.122.53 port 42038 [preauth] Dec 26 12:44:15 host sshd[25962]: User root from 92.46.108.20 not allowed because not listed in AllowUsers Dec 26 12:44:15 host sshd[25962]: input_userauth_request: invalid user root [preauth] Dec 26 12:44:16 host unix_chkpwd[25971]: password check failed for user (root) Dec 26 12:44:16 host sshd[25962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 user=root Dec 26 12:44:16 host sshd[25962]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 12:44:18 host sshd[25962]: Failed password for invalid user root from 92.46.108.20 port 56146 ssh2 Dec 26 12:44:18 host sshd[25962]: Connection closed by 92.46.108.20 port 56146 [preauth] Dec 26 12:56:42 host sshd[30358]: Invalid user admin from 133.218.41.78 port 48801 Dec 26 12:56:42 host sshd[30358]: input_userauth_request: invalid user admin [preauth] Dec 26 12:56:42 host sshd[30358]: pam_unix(sshd:auth): check pass; user unknown Dec 26 12:56:42 host sshd[30358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.218.41.78 Dec 26 12:56:44 host sshd[30358]: Failed password for invalid user admin from 133.218.41.78 port 48801 ssh2 Dec 26 12:56:45 host sshd[30358]: Connection closed by 133.218.41.78 port 48801 [preauth] Dec 26 12:59:41 host sshd[31183]: Invalid user node from 134.122.90.159 port 40514 Dec 26 12:59:41 host sshd[31183]: input_userauth_request: invalid user node [preauth] Dec 26 12:59:41 host sshd[31183]: pam_unix(sshd:auth): check pass; user unknown Dec 26 12:59:41 host sshd[31183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.90.159 Dec 26 12:59:43 host sshd[31183]: Failed password for invalid user node from 134.122.90.159 port 40514 ssh2 Dec 26 12:59:43 host sshd[31183]: Connection closed by 134.122.90.159 port 40514 [preauth] Dec 26 13:10:11 host sshd[32609]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Dec 26 13:10:11 host sshd[32609]: input_userauth_request: invalid user root [preauth] Dec 26 13:10:11 host unix_chkpwd[32612]: password check failed for user (root) Dec 26 13:10:11 host sshd[32609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Dec 26 13:10:11 host sshd[32609]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 13:10:14 host sshd[32609]: Failed password for invalid user root from 162.218.126.136 port 59902 ssh2 Dec 26 13:10:14 host sshd[32609]: Connection closed by 162.218.126.136 port 59902 [preauth] Dec 26 13:21:25 host sshd[1809]: Invalid user user from 41.197.31.178 port 60360 Dec 26 13:21:25 host sshd[1809]: input_userauth_request: invalid user user [preauth] Dec 26 13:21:26 host sshd[1809]: pam_unix(sshd:auth): check pass; user unknown Dec 26 13:21:26 host sshd[1809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 26 13:21:28 host sshd[1809]: Failed password for invalid user user from 41.197.31.178 port 60360 ssh2 Dec 26 13:21:28 host sshd[1809]: Connection closed by 41.197.31.178 port 60360 [preauth] Dec 26 13:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 13:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 13:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 13:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 13:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 13:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 13:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 13:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 13:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 13:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 26 13:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 13:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 13:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 26 13:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 13:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 13:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 26 13:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 13:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 13:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 26 13:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 13:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 13:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 26 13:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 13:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 13:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 26 13:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 13:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 13:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 26 13:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 13:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 13:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 26 13:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 13:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 26 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=a2zgroup user-4=dartsimp user-5=laundryboniface user-6=wwwpmcresource user-7=travelboniface user-8=ugotscom user-9=keralaholi user-10=wwwresourcehunte user-11=wwwrmswll user-12=disposeat user-13=remysagr user-14=wwwkmaorg user-15=wwwkapin user-16=woodpeck user-17=shalinijames user-18=wwwtestugo user-19=vfmassets user-20=pmcresources user-21=wwwevmhonda user-22=bonifacegroup user-23=wwwletsstalkfood user-24=straightcurve user-25=phmetals user-26=kottayamcalldriv user-27=palco123 user-28=gifterman user-29=mrsclean user-30=wwwnexidigital feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 26 13:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 26 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 13:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cLN5s4xjhXiZJ2G6.~ Dec 26 13:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 13:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 13:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cLN5s4xjhXiZJ2G6.~' Dec 26 13:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 13:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 13:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cLN5s4xjhXiZJ2G6.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 13:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 13:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 13:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 26 13:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 13:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 13:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 26 13:21:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 13:21:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 13:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 13:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 13:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 13:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 13:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 13:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 26 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 13:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 13:21:56 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 26 13:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 26 13:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 26 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 26 13:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 13:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 13:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 26 13:22:04 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 13:22:05 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 13:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 26 13:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 13:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 13:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 26 13:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 13:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 13:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 26 13:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 13:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 13:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 26 13:22:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 13:22:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 13:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 26 13:22:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 13:22:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 13:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 26 13:22:15 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 13:22:16 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 13:23:49 host sshd[2435]: Invalid user a from 103.13.40.2 port 33994 Dec 26 13:23:49 host sshd[2435]: input_userauth_request: invalid user a [preauth] Dec 26 13:23:49 host sshd[2435]: pam_unix(sshd:auth): check pass; user unknown Dec 26 13:23:49 host sshd[2435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 26 13:23:51 host sshd[2435]: Failed password for invalid user a from 103.13.40.2 port 33994 ssh2 Dec 26 13:23:51 host sshd[2435]: Connection closed by 103.13.40.2 port 33994 [preauth] Dec 26 13:35:39 host sshd[4087]: Connection closed by 66.240.236.116 port 38984 [preauth] Dec 26 13:38:45 host sshd[4618]: Invalid user d from 45.93.201.90 port 43078 Dec 26 13:38:45 host sshd[4618]: input_userauth_request: invalid user d [preauth] Dec 26 13:38:45 host sshd[4618]: pam_unix(sshd:auth): check pass; user unknown Dec 26 13:38:45 host sshd[4618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 26 13:38:47 host sshd[4618]: Failed password for invalid user d from 45.93.201.90 port 43078 ssh2 Dec 26 13:38:50 host sshd[4618]: pam_unix(sshd:auth): check pass; user unknown Dec 26 13:38:52 host sshd[4618]: Failed password for invalid user d from 45.93.201.90 port 43078 ssh2 Dec 26 13:38:55 host sshd[4618]: pam_unix(sshd:auth): check pass; user unknown Dec 26 13:38:57 host sshd[4618]: Failed password for invalid user d from 45.93.201.90 port 43078 ssh2 Dec 26 13:39:00 host sshd[4618]: Connection closed by 45.93.201.90 port 43078 [preauth] Dec 26 13:39:00 host sshd[4618]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 26 13:42:37 host sshd[5265]: Did not receive identification string from 58.229.6.213 port 52468 Dec 26 13:53:08 host sshd[7238]: Did not receive identification string from 58.72.18.130 port 52789 Dec 26 13:55:26 host sshd[7565]: User root from 134.17.16.5 not allowed because not listed in AllowUsers Dec 26 13:55:26 host sshd[7565]: input_userauth_request: invalid user root [preauth] Dec 26 13:55:26 host unix_chkpwd[7571]: password check failed for user (root) Dec 26 13:55:26 host sshd[7565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.16.5 user=root Dec 26 13:55:26 host sshd[7565]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 13:55:28 host sshd[7565]: Failed password for invalid user root from 134.17.16.5 port 31460 ssh2 Dec 26 13:55:28 host sshd[7565]: Received disconnect from 134.17.16.5 port 31460:11: Bye Bye [preauth] Dec 26 13:55:28 host sshd[7565]: Disconnected from 134.17.16.5 port 31460 [preauth] Dec 26 13:58:45 host sshd[8130]: User root from 20.232.30.249 not allowed because not listed in AllowUsers Dec 26 13:58:45 host sshd[8130]: input_userauth_request: invalid user root [preauth] Dec 26 13:58:45 host unix_chkpwd[8134]: password check failed for user (root) Dec 26 13:58:45 host sshd[8130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.232.30.249 user=root Dec 26 13:58:45 host sshd[8130]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 13:58:48 host sshd[8130]: Failed password for invalid user root from 20.232.30.249 port 38200 ssh2 Dec 26 13:58:48 host sshd[8130]: Received disconnect from 20.232.30.249 port 38200:11: Bye Bye [preauth] Dec 26 13:58:48 host sshd[8130]: Disconnected from 20.232.30.249 port 38200 [preauth] Dec 26 14:01:24 host sshd[8623]: User root from 20.232.30.249 not allowed because not listed in AllowUsers Dec 26 14:01:24 host sshd[8623]: input_userauth_request: invalid user root [preauth] Dec 26 14:01:24 host unix_chkpwd[8628]: password check failed for user (root) Dec 26 14:01:24 host sshd[8623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.232.30.249 user=root Dec 26 14:01:24 host sshd[8623]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 14:01:27 host sshd[8623]: Failed password for invalid user root from 20.232.30.249 port 38362 ssh2 Dec 26 14:01:27 host sshd[8623]: Received disconnect from 20.232.30.249 port 38362:11: Bye Bye [preauth] Dec 26 14:01:27 host sshd[8623]: Disconnected from 20.232.30.249 port 38362 [preauth] Dec 26 14:03:59 host sshd[8923]: Invalid user user from 178.219.117.153 port 39526 Dec 26 14:03:59 host sshd[8923]: input_userauth_request: invalid user user [preauth] Dec 26 14:03:59 host sshd[8923]: pam_unix(sshd:auth): check pass; user unknown Dec 26 14:03:59 host sshd[8923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.219.117.153 Dec 26 14:04:00 host sshd[8923]: Failed password for invalid user user from 178.219.117.153 port 39526 ssh2 Dec 26 14:04:01 host sshd[8923]: Connection closed by 178.219.117.153 port 39526 [preauth] Dec 26 14:06:06 host sshd[9282]: Invalid user oracle from 106.10.122.53 port 33722 Dec 26 14:06:06 host sshd[9282]: input_userauth_request: invalid user oracle [preauth] Dec 26 14:06:06 host sshd[9282]: pam_unix(sshd:auth): check pass; user unknown Dec 26 14:06:06 host sshd[9282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 26 14:06:08 host sshd[9282]: Failed password for invalid user oracle from 106.10.122.53 port 33722 ssh2 Dec 26 14:06:08 host sshd[9282]: Connection closed by 106.10.122.53 port 33722 [preauth] Dec 26 14:19:36 host sshd[11244]: Invalid user charles from 209.141.56.48 port 43490 Dec 26 14:19:36 host sshd[11244]: input_userauth_request: invalid user charles [preauth] Dec 26 14:19:36 host sshd[11244]: pam_unix(sshd:auth): check pass; user unknown Dec 26 14:19:36 host sshd[11244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Dec 26 14:19:38 host sshd[11244]: Failed password for invalid user charles from 209.141.56.48 port 43490 ssh2 Dec 26 14:19:38 host sshd[11244]: Connection closed by 209.141.56.48 port 43490 [preauth] Dec 26 14:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 14:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 14:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 14:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 14:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 14:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 14:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 14:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 14:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 14:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 26 14:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 14:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 14:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 26 14:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 14:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 14:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 26 14:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 14:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 14:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 26 14:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 14:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 14:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 26 14:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 14:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 14:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 26 14:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 14:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 14:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 26 14:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 14:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 14:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 26 14:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 14:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 14:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 14:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 14:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 14:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 26 14:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 14:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 14:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwtestugo user-2=shalinijames user-3=vfmassets user-4=pmcresources user-5=disposeat user-6=remysagr user-7=wwwkmaorg user-8=wwwkapin user-9=woodpeck user-10=phmetals user-11=kottayamcalldriv user-12=gifterman user-13=palco123 user-14=mrsclean user-15=wwwnexidigital user-16=wwwevmhonda user-17=bonifacegroup user-18=straightcurve user-19=wwwletsstalkfood user-20=dartsimp user-21=a2zgroup user-22=laundryboniface user-23=wwwkaretakers user-24=cochintaxi user-25=travelboniface user-26=ugotscom user-27=wwwrmswll user-28=wwwresourcehunte user-29=keralaholi user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 26 14:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 26 14:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 14:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 14:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 14:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 14:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 14:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-TOeHQz4wFk1cd6fM.~ Dec 26 14:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 14:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 14:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-TOeHQz4wFk1cd6fM.~' Dec 26 14:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 14:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 14:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-TOeHQz4wFk1cd6fM.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 14:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 14:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 14:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 26 14:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 14:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 14:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 26 14:21:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 14:21:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 26 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 26 14:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 26 14:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 26 14:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 26 14:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 14:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 26 14:21:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 14:21:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 26 14:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 14:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 14:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 26 14:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 14:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 26 14:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 14:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 14:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 26 14:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 14:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 14:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 26 14:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 14:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 14:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 26 14:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 14:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 14:23:44 host sshd[12183]: Invalid user user from 162.218.126.136 port 36328 Dec 26 14:23:44 host sshd[12183]: input_userauth_request: invalid user user [preauth] Dec 26 14:23:45 host sshd[12183]: pam_unix(sshd:auth): check pass; user unknown Dec 26 14:23:45 host sshd[12183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 26 14:23:47 host sshd[12183]: Failed password for invalid user user from 162.218.126.136 port 36328 ssh2 Dec 26 14:23:47 host sshd[12183]: Connection closed by 162.218.126.136 port 36328 [preauth] Dec 26 14:25:04 host sshd[12378]: Did not receive identification string from 185.173.145.103 port 36298 Dec 26 14:25:22 host sshd[12412]: User root from 185.173.145.103 not allowed because not listed in AllowUsers Dec 26 14:25:22 host sshd[12412]: input_userauth_request: invalid user root [preauth] Dec 26 14:25:22 host unix_chkpwd[12415]: password check failed for user (root) Dec 26 14:25:22 host sshd[12412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.173.145.103 user=root Dec 26 14:25:22 host sshd[12412]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 14:25:25 host sshd[12412]: Failed password for invalid user root from 185.173.145.103 port 54650 ssh2 Dec 26 14:25:25 host sshd[12412]: Received disconnect from 185.173.145.103 port 54650:11: Normal Shutdown, Thank you for playing [preauth] Dec 26 14:25:25 host sshd[12412]: Disconnected from 185.173.145.103 port 54650 [preauth] Dec 26 14:25:34 host sshd[12447]: User root from 185.173.145.103 not allowed because not listed in AllowUsers Dec 26 14:25:34 host sshd[12447]: input_userauth_request: invalid user root [preauth] Dec 26 14:25:34 host unix_chkpwd[12451]: password check failed for user (root) Dec 26 14:25:34 host sshd[12447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.173.145.103 user=root Dec 26 14:25:34 host sshd[12447]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 14:25:36 host sshd[12447]: Failed password for invalid user root from 185.173.145.103 port 58246 ssh2 Dec 26 14:39:24 host sshd[14388]: Invalid user composer from 92.46.108.20 port 55010 Dec 26 14:39:24 host sshd[14388]: input_userauth_request: invalid user composer [preauth] Dec 26 14:39:24 host sshd[14388]: pam_unix(sshd:auth): check pass; user unknown Dec 26 14:39:24 host sshd[14388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 26 14:39:26 host sshd[14388]: Failed password for invalid user composer from 92.46.108.20 port 55010 ssh2 Dec 26 14:39:27 host sshd[14388]: Connection closed by 92.46.108.20 port 55010 [preauth] Dec 26 14:40:09 host sshd[14511]: Invalid user admin from 123.118.122.88 port 46549 Dec 26 14:40:09 host sshd[14511]: input_userauth_request: invalid user admin [preauth] Dec 26 14:40:10 host sshd[14511]: pam_unix(sshd:auth): check pass; user unknown Dec 26 14:40:10 host sshd[14511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.118.122.88 Dec 26 14:40:12 host sshd[14511]: Failed password for invalid user admin from 123.118.122.88 port 46549 ssh2 Dec 26 14:40:12 host sshd[14511]: Connection closed by 123.118.122.88 port 46549 [preauth] Dec 26 14:49:38 host sshd[16045]: User root from 159.203.129.103 not allowed because not listed in AllowUsers Dec 26 14:49:38 host sshd[16045]: input_userauth_request: invalid user root [preauth] Dec 26 14:49:38 host unix_chkpwd[16051]: password check failed for user (root) Dec 26 14:49:38 host sshd[16045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.129.103 user=root Dec 26 14:49:38 host sshd[16045]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 14:49:41 host sshd[16045]: Failed password for invalid user root from 159.203.129.103 port 46780 ssh2 Dec 26 14:49:41 host sshd[16045]: Received disconnect from 159.203.129.103 port 46780:11: Bye Bye [preauth] Dec 26 14:49:41 host sshd[16045]: Disconnected from 159.203.129.103 port 46780 [preauth] Dec 26 14:52:20 host sshd[16568]: User root from 159.203.129.103 not allowed because not listed in AllowUsers Dec 26 14:52:20 host sshd[16568]: input_userauth_request: invalid user root [preauth] Dec 26 14:52:20 host unix_chkpwd[16574]: password check failed for user (root) Dec 26 14:52:20 host sshd[16568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.129.103 user=root Dec 26 14:52:20 host sshd[16568]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 14:52:23 host sshd[16568]: Failed password for invalid user root from 159.203.129.103 port 37497 ssh2 Dec 26 14:52:23 host sshd[16568]: Received disconnect from 159.203.129.103 port 37497:11: Bye Bye [preauth] Dec 26 14:52:23 host sshd[16568]: Disconnected from 159.203.129.103 port 37497 [preauth] Dec 26 14:56:59 host sshd[17652]: Invalid user wangyp from 103.13.40.2 port 57286 Dec 26 14:56:59 host sshd[17652]: input_userauth_request: invalid user wangyp [preauth] Dec 26 14:56:59 host sshd[17652]: pam_unix(sshd:auth): check pass; user unknown Dec 26 14:56:59 host sshd[17652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 26 14:57:01 host sshd[17652]: Failed password for invalid user wangyp from 103.13.40.2 port 57286 ssh2 Dec 26 14:57:01 host sshd[17652]: Connection closed by 103.13.40.2 port 57286 [preauth] Dec 26 14:58:18 host sshd[17932]: User root from 103.246.240.28 not allowed because not listed in AllowUsers Dec 26 14:58:18 host sshd[17932]: input_userauth_request: invalid user root [preauth] Dec 26 14:58:18 host unix_chkpwd[17935]: password check failed for user (root) Dec 26 14:58:18 host sshd[17932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.246.240.28 user=root Dec 26 14:58:18 host sshd[17932]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 14:58:19 host sshd[17932]: Failed password for invalid user root from 103.246.240.28 port 43078 ssh2 Dec 26 14:58:19 host sshd[17932]: Received disconnect from 103.246.240.28 port 43078:11: Bye Bye [preauth] Dec 26 14:58:19 host sshd[17932]: Disconnected from 103.246.240.28 port 43078 [preauth] Dec 26 14:59:17 host sshd[18243]: User root from 157.230.6.213 not allowed because not listed in AllowUsers Dec 26 14:59:17 host sshd[18243]: input_userauth_request: invalid user root [preauth] Dec 26 14:59:17 host unix_chkpwd[18248]: password check failed for user (root) Dec 26 14:59:17 host sshd[18243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.6.213 user=root Dec 26 14:59:17 host sshd[18243]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 14:59:20 host sshd[18243]: Failed password for invalid user root from 157.230.6.213 port 33150 ssh2 Dec 26 14:59:20 host sshd[18243]: Received disconnect from 157.230.6.213 port 33150:11: Bye Bye [preauth] Dec 26 14:59:20 host sshd[18243]: Disconnected from 157.230.6.213 port 33150 [preauth] Dec 26 15:00:33 host sshd[18528]: User root from 183.82.1.138 not allowed because not listed in AllowUsers Dec 26 15:00:33 host sshd[18528]: input_userauth_request: invalid user root [preauth] Dec 26 15:00:33 host unix_chkpwd[18530]: password check failed for user (root) Dec 26 15:00:33 host sshd[18528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.1.138 user=root Dec 26 15:00:33 host sshd[18528]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 15:00:35 host sshd[18528]: Failed password for invalid user root from 183.82.1.138 port 17689 ssh2 Dec 26 15:00:35 host sshd[18528]: Received disconnect from 183.82.1.138 port 17689:11: Bye Bye [preauth] Dec 26 15:00:35 host sshd[18528]: Disconnected from 183.82.1.138 port 17689 [preauth] Dec 26 15:00:49 host sshd[18590]: User root from 165.227.89.232 not allowed because not listed in AllowUsers Dec 26 15:00:49 host sshd[18590]: input_userauth_request: invalid user root [preauth] Dec 26 15:00:49 host unix_chkpwd[18597]: password check failed for user (root) Dec 26 15:00:49 host sshd[18590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.89.232 user=root Dec 26 15:00:49 host sshd[18590]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 15:00:50 host sshd[18561]: Connection closed by 162.243.130.8 port 49774 [preauth] Dec 26 15:00:52 host sshd[18590]: Failed password for invalid user root from 165.227.89.232 port 54846 ssh2 Dec 26 15:00:52 host sshd[18590]: Received disconnect from 165.227.89.232 port 54846:11: Bye Bye [preauth] Dec 26 15:00:52 host sshd[18590]: Disconnected from 165.227.89.232 port 54846 [preauth] Dec 26 15:03:39 host sshd[19163]: User root from 157.230.6.213 not allowed because not listed in AllowUsers Dec 26 15:03:39 host sshd[19163]: input_userauth_request: invalid user root [preauth] Dec 26 15:03:39 host unix_chkpwd[19176]: password check failed for user (root) Dec 26 15:03:39 host sshd[19163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.6.213 user=root Dec 26 15:03:39 host sshd[19163]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 15:03:41 host sshd[19163]: Failed password for invalid user root from 157.230.6.213 port 55830 ssh2 Dec 26 15:03:42 host sshd[19163]: Received disconnect from 157.230.6.213 port 55830:11: Bye Bye [preauth] Dec 26 15:03:42 host sshd[19163]: Disconnected from 157.230.6.213 port 55830 [preauth] Dec 26 15:03:48 host sshd[19229]: User root from 165.227.89.232 not allowed because not listed in AllowUsers Dec 26 15:03:48 host sshd[19229]: input_userauth_request: invalid user root [preauth] Dec 26 15:03:48 host unix_chkpwd[19234]: password check failed for user (root) Dec 26 15:03:48 host sshd[19229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.89.232 user=root Dec 26 15:03:48 host sshd[19229]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 15:03:50 host sshd[19229]: Failed password for invalid user root from 165.227.89.232 port 58132 ssh2 Dec 26 15:03:50 host sshd[19229]: Received disconnect from 165.227.89.232 port 58132:11: Bye Bye [preauth] Dec 26 15:03:50 host sshd[19229]: Disconnected from 165.227.89.232 port 58132 [preauth] Dec 26 15:04:32 host sshd[19475]: User root from 103.246.240.28 not allowed because not listed in AllowUsers Dec 26 15:04:32 host sshd[19475]: input_userauth_request: invalid user root [preauth] Dec 26 15:04:32 host unix_chkpwd[19478]: password check failed for user (root) Dec 26 15:04:32 host sshd[19475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.246.240.28 user=root Dec 26 15:04:32 host sshd[19475]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 15:04:34 host sshd[19475]: Failed password for invalid user root from 103.246.240.28 port 43198 ssh2 Dec 26 15:04:34 host sshd[19475]: Received disconnect from 103.246.240.28 port 43198:11: Bye Bye [preauth] Dec 26 15:04:34 host sshd[19475]: Disconnected from 103.246.240.28 port 43198 [preauth] Dec 26 15:04:44 host sshd[19523]: User root from 183.82.1.138 not allowed because not listed in AllowUsers Dec 26 15:04:44 host sshd[19523]: input_userauth_request: invalid user root [preauth] Dec 26 15:04:44 host unix_chkpwd[19525]: password check failed for user (root) Dec 26 15:04:44 host sshd[19523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.1.138 user=root Dec 26 15:04:44 host sshd[19523]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 15:04:46 host sshd[19523]: Failed password for invalid user root from 183.82.1.138 port 45334 ssh2 Dec 26 15:04:46 host sshd[19523]: Received disconnect from 183.82.1.138 port 45334:11: Bye Bye [preauth] Dec 26 15:04:46 host sshd[19523]: Disconnected from 183.82.1.138 port 45334 [preauth] Dec 26 15:13:34 host sshd[20769]: Invalid user user1 from 41.197.31.178 port 38302 Dec 26 15:13:34 host sshd[20769]: input_userauth_request: invalid user user1 [preauth] Dec 26 15:13:35 host sshd[20769]: pam_unix(sshd:auth): check pass; user unknown Dec 26 15:13:35 host sshd[20769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 26 15:13:37 host sshd[20769]: Failed password for invalid user user1 from 41.197.31.178 port 38302 ssh2 Dec 26 15:13:37 host sshd[20769]: Connection closed by 41.197.31.178 port 38302 [preauth] Dec 26 15:21:36 host sshd[21942]: Did not receive identification string from 149.129.220.104 port 61000 Dec 26 15:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 15:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 15:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 15:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 15:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 15:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 15:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 15:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 15:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 15:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 26 15:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 15:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 15:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 26 15:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 15:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 15:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 26 15:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 15:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 15:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 26 15:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 15:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 15:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 26 15:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 15:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 15:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 26 15:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 15:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 15:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 26 15:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 15:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 15:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 26 15:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 15:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 26 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwletsstalkfood user-2=straightcurve user-3=wwwevmhonda user-4=bonifacegroup user-5=wwwnexidigital user-6=mrsclean user-7=phmetals user-8=kottayamcalldriv user-9=palco123 user-10=gifterman user-11=wwwkapin user-12=woodpeck user-13=disposeat user-14=remysagr user-15=wwwkmaorg user-16=pmcresources user-17=shalinijames user-18=wwwtestugo user-19=vfmassets user-20=wwwpmcresource user-21=ugotscom user-22=keralaholi user-23=wwwresourcehunte user-24=wwwrmswll user-25=travelboniface user-26=cochintaxi user-27=wwwkaretakers user-28=laundryboniface user-29=a2zgroup user-30=dartsimp feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 26 15:21:47 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 26 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-nduWuoMO2CFUD9Sc.~ Dec 26 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-nduWuoMO2CFUD9Sc.~' Dec 26 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-nduWuoMO2CFUD9Sc.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 26 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 15:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 26 15:21:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 15:21:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 15:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 15:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 15:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 15:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 15:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 15:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 15:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 15:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 15:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 15:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 26 15:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 15:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 26 15:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 26 15:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 26 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 26 15:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 15:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 26 15:21:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 15:21:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 26 15:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 15:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 15:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 26 15:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 15:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 15:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 26 15:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 15:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 26 15:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 15:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 15:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 26 15:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 15:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 15:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 26 15:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 15:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 15:24:25 host sshd[22479]: Invalid user da from 45.93.201.90 port 54268 Dec 26 15:24:25 host sshd[22479]: input_userauth_request: invalid user da [preauth] Dec 26 15:24:25 host sshd[22479]: pam_unix(sshd:auth): check pass; user unknown Dec 26 15:24:25 host sshd[22479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 26 15:24:27 host sshd[22479]: Failed password for invalid user da from 45.93.201.90 port 54268 ssh2 Dec 26 15:24:30 host sshd[22479]: pam_unix(sshd:auth): check pass; user unknown Dec 26 15:24:32 host sshd[22479]: Failed password for invalid user da from 45.93.201.90 port 54268 ssh2 Dec 26 15:24:35 host sshd[22479]: pam_unix(sshd:auth): check pass; user unknown Dec 26 15:24:37 host sshd[22479]: Failed password for invalid user da from 45.93.201.90 port 54268 ssh2 Dec 26 15:24:40 host sshd[22479]: Connection closed by 45.93.201.90 port 54268 [preauth] Dec 26 15:24:40 host sshd[22479]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 26 15:30:16 host sshd[23278]: Invalid user charles from 209.141.56.48 port 47216 Dec 26 15:30:16 host sshd[23278]: input_userauth_request: invalid user charles [preauth] Dec 26 15:30:16 host sshd[23278]: pam_unix(sshd:auth): check pass; user unknown Dec 26 15:30:16 host sshd[23278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Dec 26 15:30:18 host sshd[23278]: Failed password for invalid user charles from 209.141.56.48 port 47216 ssh2 Dec 26 15:30:18 host sshd[23278]: Connection closed by 209.141.56.48 port 47216 [preauth] Dec 26 15:30:49 host sshd[23474]: Invalid user charles from 209.141.56.48 port 38718 Dec 26 15:30:49 host sshd[23474]: input_userauth_request: invalid user charles [preauth] Dec 26 15:30:49 host sshd[23474]: pam_unix(sshd:auth): check pass; user unknown Dec 26 15:30:49 host sshd[23474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Dec 26 15:30:51 host sshd[23474]: Failed password for invalid user charles from 209.141.56.48 port 38718 ssh2 Dec 26 15:30:52 host sshd[23474]: Connection closed by 209.141.56.48 port 38718 [preauth] Dec 26 15:32:19 host sshd[23633]: User root from 79.17.69.184 not allowed because not listed in AllowUsers Dec 26 15:32:19 host sshd[23633]: input_userauth_request: invalid user root [preauth] Dec 26 15:32:20 host unix_chkpwd[23641]: password check failed for user (root) Dec 26 15:32:20 host sshd[23633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.17.69.184 user=root Dec 26 15:32:20 host sshd[23633]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 15:32:21 host sshd[23633]: Failed password for invalid user root from 79.17.69.184 port 54257 ssh2 Dec 26 15:32:22 host sshd[23633]: Received disconnect from 79.17.69.184 port 54257:11: Bye Bye [preauth] Dec 26 15:32:22 host sshd[23633]: Disconnected from 79.17.69.184 port 54257 [preauth] Dec 26 15:37:44 host sshd[24457]: Invalid user user1 from 162.218.126.136 port 54972 Dec 26 15:37:44 host sshd[24457]: input_userauth_request: invalid user user1 [preauth] Dec 26 15:37:45 host sshd[24457]: pam_unix(sshd:auth): check pass; user unknown Dec 26 15:37:45 host sshd[24457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 26 15:37:47 host sshd[24457]: Failed password for invalid user user1 from 162.218.126.136 port 54972 ssh2 Dec 26 15:37:47 host sshd[24457]: Connection closed by 162.218.126.136 port 54972 [preauth] Dec 26 15:38:11 host sshd[24490]: User root from 79.17.69.184 not allowed because not listed in AllowUsers Dec 26 15:38:11 host sshd[24490]: input_userauth_request: invalid user root [preauth] Dec 26 15:38:11 host unix_chkpwd[24502]: password check failed for user (root) Dec 26 15:38:11 host sshd[24490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.17.69.184 user=root Dec 26 15:38:11 host sshd[24490]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 15:38:12 host sshd[24490]: Failed password for invalid user root from 79.17.69.184 port 53483 ssh2 Dec 26 15:49:20 host sshd[26060]: Invalid user user1 from 106.10.122.53 port 58490 Dec 26 15:49:20 host sshd[26060]: input_userauth_request: invalid user user1 [preauth] Dec 26 15:49:20 host sshd[26060]: pam_unix(sshd:auth): check pass; user unknown Dec 26 15:49:20 host sshd[26060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 26 15:49:22 host sshd[26060]: Failed password for invalid user user1 from 106.10.122.53 port 58490 ssh2 Dec 26 15:49:22 host sshd[26060]: Connection closed by 106.10.122.53 port 58490 [preauth] Dec 26 15:56:07 host sshd[27070]: Invalid user charles from 209.141.56.48 port 37896 Dec 26 15:56:07 host sshd[27070]: input_userauth_request: invalid user charles [preauth] Dec 26 15:56:07 host sshd[27070]: pam_unix(sshd:auth): check pass; user unknown Dec 26 15:56:07 host sshd[27070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Dec 26 15:56:09 host sshd[27070]: Failed password for invalid user charles from 209.141.56.48 port 37896 ssh2 Dec 26 16:01:17 host sshd[27926]: User root from 167.71.239.134 not allowed because not listed in AllowUsers Dec 26 16:01:17 host sshd[27926]: input_userauth_request: invalid user root [preauth] Dec 26 16:01:17 host unix_chkpwd[27928]: password check failed for user (root) Dec 26 16:01:17 host sshd[27926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.239.134 user=root Dec 26 16:01:17 host sshd[27926]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:01:18 host sshd[27926]: Failed password for invalid user root from 167.71.239.134 port 42326 ssh2 Dec 26 16:01:18 host sshd[27926]: Received disconnect from 167.71.239.134 port 42326:11: Bye Bye [preauth] Dec 26 16:01:18 host sshd[27926]: Disconnected from 167.71.239.134 port 42326 [preauth] Dec 26 16:04:33 host sshd[28283]: Invalid user david from 107.189.30.59 port 55632 Dec 26 16:04:33 host sshd[28283]: input_userauth_request: invalid user david [preauth] Dec 26 16:04:33 host sshd[28283]: pam_unix(sshd:auth): check pass; user unknown Dec 26 16:04:33 host sshd[28283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Dec 26 16:04:34 host sshd[28283]: Failed password for invalid user david from 107.189.30.59 port 55632 ssh2 Dec 26 16:04:35 host sshd[28283]: Connection closed by 107.189.30.59 port 55632 [preauth] Dec 26 16:05:57 host sshd[28546]: User root from 128.199.247.226 not allowed because not listed in AllowUsers Dec 26 16:05:57 host sshd[28546]: input_userauth_request: invalid user root [preauth] Dec 26 16:05:57 host unix_chkpwd[28548]: password check failed for user (root) Dec 26 16:05:57 host sshd[28546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.247.226 user=root Dec 26 16:05:57 host sshd[28546]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:05:59 host sshd[28546]: Failed password for invalid user root from 128.199.247.226 port 50514 ssh2 Dec 26 16:05:59 host sshd[28546]: Received disconnect from 128.199.247.226 port 50514:11: Bye Bye [preauth] Dec 26 16:05:59 host sshd[28546]: Disconnected from 128.199.247.226 port 50514 [preauth] Dec 26 16:06:49 host sshd[28640]: User root from 165.227.166.247 not allowed because not listed in AllowUsers Dec 26 16:06:49 host sshd[28640]: input_userauth_request: invalid user root [preauth] Dec 26 16:06:50 host unix_chkpwd[28643]: password check failed for user (root) Dec 26 16:06:50 host sshd[28640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.247 user=root Dec 26 16:06:50 host sshd[28640]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:06:52 host sshd[28640]: Failed password for invalid user root from 165.227.166.247 port 43696 ssh2 Dec 26 16:06:52 host sshd[28640]: Received disconnect from 165.227.166.247 port 43696:11: Bye Bye [preauth] Dec 26 16:06:52 host sshd[28640]: Disconnected from 165.227.166.247 port 43696 [preauth] Dec 26 16:07:11 host sshd[28686]: User root from 167.71.239.134 not allowed because not listed in AllowUsers Dec 26 16:07:11 host sshd[28686]: input_userauth_request: invalid user root [preauth] Dec 26 16:07:11 host unix_chkpwd[28688]: password check failed for user (root) Dec 26 16:07:11 host sshd[28686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.239.134 user=root Dec 26 16:07:11 host sshd[28686]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:07:13 host sshd[28686]: Failed password for invalid user root from 167.71.239.134 port 45632 ssh2 Dec 26 16:07:13 host sshd[28686]: Received disconnect from 167.71.239.134 port 45632:11: Bye Bye [preauth] Dec 26 16:07:13 host sshd[28686]: Disconnected from 167.71.239.134 port 45632 [preauth] Dec 26 16:07:19 host sshd[28727]: User root from 220.82.130.211 not allowed because not listed in AllowUsers Dec 26 16:07:19 host sshd[28727]: input_userauth_request: invalid user root [preauth] Dec 26 16:07:19 host unix_chkpwd[28731]: password check failed for user (root) Dec 26 16:07:19 host sshd[28727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.82.130.211 user=root Dec 26 16:07:19 host sshd[28727]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:07:21 host sshd[28727]: Failed password for invalid user root from 220.82.130.211 port 54768 ssh2 Dec 26 16:07:22 host sshd[28727]: Received disconnect from 220.82.130.211 port 54768:11: Bye Bye [preauth] Dec 26 16:07:22 host sshd[28727]: Disconnected from 220.82.130.211 port 54768 [preauth] Dec 26 16:07:40 host sshd[28805]: User root from 161.35.59.70 not allowed because not listed in AllowUsers Dec 26 16:07:40 host sshd[28805]: input_userauth_request: invalid user root [preauth] Dec 26 16:07:41 host unix_chkpwd[28809]: password check failed for user (root) Dec 26 16:07:41 host sshd[28805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.59.70 user=root Dec 26 16:07:41 host sshd[28805]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:07:43 host sshd[28805]: Failed password for invalid user root from 161.35.59.70 port 51696 ssh2 Dec 26 16:07:43 host sshd[28805]: Received disconnect from 161.35.59.70 port 51696:11: Bye Bye [preauth] Dec 26 16:07:43 host sshd[28805]: Disconnected from 161.35.59.70 port 51696 [preauth] Dec 26 16:07:54 host sshd[28825]: User root from 161.82.213.204 not allowed because not listed in AllowUsers Dec 26 16:07:54 host sshd[28825]: input_userauth_request: invalid user root [preauth] Dec 26 16:07:54 host unix_chkpwd[28828]: password check failed for user (root) Dec 26 16:07:54 host sshd[28825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.82.213.204 user=root Dec 26 16:07:54 host sshd[28825]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:07:56 host sshd[28825]: Failed password for invalid user root from 161.82.213.204 port 40258 ssh2 Dec 26 16:07:56 host sshd[28825]: Received disconnect from 161.82.213.204 port 40258:11: Bye Bye [preauth] Dec 26 16:07:56 host sshd[28825]: Disconnected from 161.82.213.204 port 40258 [preauth] Dec 26 16:08:08 host sshd[28877]: User root from 84.108.40.27 not allowed because not listed in AllowUsers Dec 26 16:08:08 host sshd[28877]: input_userauth_request: invalid user root [preauth] Dec 26 16:08:08 host unix_chkpwd[28882]: password check failed for user (root) Dec 26 16:08:08 host sshd[28877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.108.40.27 user=root Dec 26 16:08:08 host sshd[28877]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:08:11 host sshd[28877]: Failed password for invalid user root from 84.108.40.27 port 52620 ssh2 Dec 26 16:08:11 host sshd[28877]: Received disconnect from 84.108.40.27 port 52620:11: Bye Bye [preauth] Dec 26 16:08:11 host sshd[28877]: Disconnected from 84.108.40.27 port 52620 [preauth] Dec 26 16:08:54 host sshd[28983]: User root from 165.22.106.178 not allowed because not listed in AllowUsers Dec 26 16:08:54 host sshd[28983]: input_userauth_request: invalid user root [preauth] Dec 26 16:08:54 host unix_chkpwd[28985]: password check failed for user (root) Dec 26 16:08:54 host sshd[28983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.106.178 user=root Dec 26 16:08:54 host sshd[28983]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:08:56 host sshd[28983]: Failed password for invalid user root from 165.22.106.178 port 49690 ssh2 Dec 26 16:08:56 host sshd[28983]: Received disconnect from 165.22.106.178 port 49690:11: Bye Bye [preauth] Dec 26 16:08:56 host sshd[28983]: Disconnected from 165.22.106.178 port 49690 [preauth] Dec 26 16:08:58 host sshd[28990]: User root from 128.199.247.226 not allowed because not listed in AllowUsers Dec 26 16:08:58 host sshd[28990]: input_userauth_request: invalid user root [preauth] Dec 26 16:08:58 host unix_chkpwd[28992]: password check failed for user (root) Dec 26 16:08:58 host sshd[28990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.247.226 user=root Dec 26 16:08:58 host sshd[28990]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:09:00 host sshd[28990]: Failed password for invalid user root from 128.199.247.226 port 56970 ssh2 Dec 26 16:09:00 host sshd[28990]: Received disconnect from 128.199.247.226 port 56970:11: Bye Bye [preauth] Dec 26 16:09:00 host sshd[28990]: Disconnected from 128.199.247.226 port 56970 [preauth] Dec 26 16:09:17 host sshd[29068]: User root from 61.216.131.31 not allowed because not listed in AllowUsers Dec 26 16:09:17 host sshd[29068]: input_userauth_request: invalid user root [preauth] Dec 26 16:09:17 host unix_chkpwd[29073]: password check failed for user (root) Dec 26 16:09:17 host sshd[29068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.216.131.31 user=root Dec 26 16:09:17 host sshd[29068]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:09:18 host sshd[29068]: Failed password for invalid user root from 61.216.131.31 port 38608 ssh2 Dec 26 16:09:19 host sshd[29068]: Received disconnect from 61.216.131.31 port 38608:11: Bye Bye [preauth] Dec 26 16:09:19 host sshd[29068]: Disconnected from 61.216.131.31 port 38608 [preauth] Dec 26 16:09:48 host sshd[29158]: User root from 161.82.213.204 not allowed because not listed in AllowUsers Dec 26 16:09:48 host sshd[29158]: input_userauth_request: invalid user root [preauth] Dec 26 16:09:48 host unix_chkpwd[29160]: password check failed for user (root) Dec 26 16:09:48 host sshd[29158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.82.213.204 user=root Dec 26 16:09:48 host sshd[29158]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:09:49 host sshd[29158]: Failed password for invalid user root from 161.82.213.204 port 48990 ssh2 Dec 26 16:10:05 host sshd[29241]: User root from 178.154.229.154 not allowed because not listed in AllowUsers Dec 26 16:10:05 host sshd[29241]: input_userauth_request: invalid user root [preauth] Dec 26 16:10:05 host unix_chkpwd[29247]: password check failed for user (root) Dec 26 16:10:05 host sshd[29241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.154.229.154 user=root Dec 26 16:10:05 host sshd[29241]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:10:06 host sshd[29241]: Failed password for invalid user root from 178.154.229.154 port 45364 ssh2 Dec 26 16:10:07 host sshd[29241]: Received disconnect from 178.154.229.154 port 45364:11: Bye Bye [preauth] Dec 26 16:10:07 host sshd[29241]: Disconnected from 178.154.229.154 port 45364 [preauth] Dec 26 16:10:12 host sshd[29261]: User root from 159.223.59.81 not allowed because not listed in AllowUsers Dec 26 16:10:12 host sshd[29261]: input_userauth_request: invalid user root [preauth] Dec 26 16:10:12 host unix_chkpwd[29263]: password check failed for user (root) Dec 26 16:10:12 host sshd[29261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.59.81 user=root Dec 26 16:10:12 host sshd[29261]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:10:13 host sshd[29261]: Failed password for invalid user root from 159.223.59.81 port 38652 ssh2 Dec 26 16:10:13 host sshd[29261]: Received disconnect from 159.223.59.81 port 38652:11: Bye Bye [preauth] Dec 26 16:10:13 host sshd[29261]: Disconnected from 159.223.59.81 port 38652 [preauth] Dec 26 16:10:39 host sshd[29441]: User root from 122.160.233.137 not allowed because not listed in AllowUsers Dec 26 16:10:39 host sshd[29441]: input_userauth_request: invalid user root [preauth] Dec 26 16:10:39 host unix_chkpwd[29444]: password check failed for user (root) Dec 26 16:10:39 host sshd[29441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.160.233.137 user=root Dec 26 16:10:39 host sshd[29441]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:10:41 host sshd[29441]: Failed password for invalid user root from 122.160.233.137 port 59266 ssh2 Dec 26 16:10:41 host sshd[29441]: Received disconnect from 122.160.233.137 port 59266:11: Bye Bye [preauth] Dec 26 16:10:41 host sshd[29441]: Disconnected from 122.160.233.137 port 59266 [preauth] Dec 26 16:10:42 host sshd[29450]: User root from 23.94.217.206 not allowed because not listed in AllowUsers Dec 26 16:10:42 host sshd[29450]: input_userauth_request: invalid user root [preauth] Dec 26 16:10:42 host unix_chkpwd[29454]: password check failed for user (root) Dec 26 16:10:42 host sshd[29450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.94.217.206 user=root Dec 26 16:10:42 host sshd[29450]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:10:44 host sshd[29450]: Failed password for invalid user root from 23.94.217.206 port 39406 ssh2 Dec 26 16:10:44 host sshd[29450]: Received disconnect from 23.94.217.206 port 39406:11: Bye Bye [preauth] Dec 26 16:10:44 host sshd[29450]: Disconnected from 23.94.217.206 port 39406 [preauth] Dec 26 16:11:03 host sshd[29490]: User root from 141.147.21.57 not allowed because not listed in AllowUsers Dec 26 16:11:03 host sshd[29490]: input_userauth_request: invalid user root [preauth] Dec 26 16:11:03 host unix_chkpwd[29493]: password check failed for user (root) Dec 26 16:11:03 host sshd[29490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.147.21.57 user=root Dec 26 16:11:03 host sshd[29490]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:11:05 host sshd[29490]: Failed password for invalid user root from 141.147.21.57 port 54174 ssh2 Dec 26 16:11:05 host sshd[29490]: Received disconnect from 141.147.21.57 port 54174:11: Bye Bye [preauth] Dec 26 16:11:05 host sshd[29490]: Disconnected from 141.147.21.57 port 54174 [preauth] Dec 26 16:11:12 host sshd[29508]: User root from 142.93.103.27 not allowed because not listed in AllowUsers Dec 26 16:11:12 host sshd[29508]: input_userauth_request: invalid user root [preauth] Dec 26 16:11:12 host unix_chkpwd[29513]: password check failed for user (root) Dec 26 16:11:12 host sshd[29508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.103.27 user=root Dec 26 16:11:12 host sshd[29508]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:11:14 host sshd[29508]: Failed password for invalid user root from 142.93.103.27 port 38526 ssh2 Dec 26 16:11:14 host sshd[29508]: Received disconnect from 142.93.103.27 port 38526:11: Bye Bye [preauth] Dec 26 16:11:14 host sshd[29508]: Disconnected from 142.93.103.27 port 38526 [preauth] Dec 26 16:11:49 host sshd[29596]: User root from 178.128.160.60 not allowed because not listed in AllowUsers Dec 26 16:11:49 host sshd[29596]: input_userauth_request: invalid user root [preauth] Dec 26 16:11:49 host unix_chkpwd[29599]: password check failed for user (root) Dec 26 16:11:49 host sshd[29596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.160.60 user=root Dec 26 16:11:49 host sshd[29596]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:11:51 host sshd[29596]: Failed password for invalid user root from 178.128.160.60 port 52192 ssh2 Dec 26 16:11:51 host sshd[29596]: Received disconnect from 178.128.160.60 port 52192:11: Bye Bye [preauth] Dec 26 16:11:51 host sshd[29596]: Disconnected from 178.128.160.60 port 52192 [preauth] Dec 26 16:12:23 host sshd[29696]: User root from 165.227.166.247 not allowed because not listed in AllowUsers Dec 26 16:12:23 host sshd[29696]: input_userauth_request: invalid user root [preauth] Dec 26 16:12:23 host unix_chkpwd[29700]: password check failed for user (root) Dec 26 16:12:23 host sshd[29696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.166.247 user=root Dec 26 16:12:23 host sshd[29696]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:12:25 host sshd[29696]: Failed password for invalid user root from 165.227.166.247 port 47146 ssh2 Dec 26 16:12:40 host sshd[29781]: User root from 20.193.148.7 not allowed because not listed in AllowUsers Dec 26 16:12:40 host sshd[29781]: input_userauth_request: invalid user root [preauth] Dec 26 16:12:40 host unix_chkpwd[29784]: password check failed for user (root) Dec 26 16:12:40 host sshd[29781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.193.148.7 user=root Dec 26 16:12:40 host sshd[29781]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:12:42 host sshd[29781]: Failed password for invalid user root from 20.193.148.7 port 11359 ssh2 Dec 26 16:12:42 host sshd[29781]: Received disconnect from 20.193.148.7 port 11359:11: Bye Bye [preauth] Dec 26 16:12:42 host sshd[29781]: Disconnected from 20.193.148.7 port 11359 [preauth] Dec 26 16:12:49 host sshd[29794]: User root from 157.245.218.29 not allowed because not listed in AllowUsers Dec 26 16:12:49 host sshd[29794]: input_userauth_request: invalid user root [preauth] Dec 26 16:12:50 host unix_chkpwd[29799]: password check failed for user (root) Dec 26 16:12:50 host sshd[29794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.218.29 user=root Dec 26 16:12:50 host sshd[29794]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:12:51 host sshd[29794]: Failed password for invalid user root from 157.245.218.29 port 57862 ssh2 Dec 26 16:12:51 host sshd[29794]: Received disconnect from 157.245.218.29 port 57862:11: Bye Bye [preauth] Dec 26 16:12:51 host sshd[29794]: Disconnected from 157.245.218.29 port 57862 [preauth] Dec 26 16:12:57 host sshd[29809]: User root from 161.35.59.70 not allowed because not listed in AllowUsers Dec 26 16:12:57 host sshd[29809]: input_userauth_request: invalid user root [preauth] Dec 26 16:12:57 host unix_chkpwd[29812]: password check failed for user (root) Dec 26 16:12:57 host sshd[29809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.59.70 user=root Dec 26 16:12:57 host sshd[29809]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:12:59 host sshd[29809]: Failed password for invalid user root from 161.35.59.70 port 50384 ssh2 Dec 26 16:13:10 host sshd[29875]: User root from 220.82.130.211 not allowed because not listed in AllowUsers Dec 26 16:13:10 host sshd[29875]: input_userauth_request: invalid user root [preauth] Dec 26 16:13:10 host unix_chkpwd[29880]: password check failed for user (root) Dec 26 16:13:10 host sshd[29875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.82.130.211 user=root Dec 26 16:13:10 host sshd[29875]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:13:13 host sshd[29875]: Failed password for invalid user root from 220.82.130.211 port 39802 ssh2 Dec 26 16:13:13 host sshd[29875]: Received disconnect from 220.82.130.211 port 39802:11: Bye Bye [preauth] Dec 26 16:13:13 host sshd[29875]: Disconnected from 220.82.130.211 port 39802 [preauth] Dec 26 16:13:18 host sshd[29925]: User root from 141.147.21.57 not allowed because not listed in AllowUsers Dec 26 16:13:18 host sshd[29925]: input_userauth_request: invalid user root [preauth] Dec 26 16:13:18 host unix_chkpwd[29928]: password check failed for user (root) Dec 26 16:13:18 host sshd[29925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.147.21.57 user=root Dec 26 16:13:18 host sshd[29925]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:13:20 host sshd[29925]: Failed password for invalid user root from 141.147.21.57 port 43872 ssh2 Dec 26 16:13:22 host sshd[29963]: User root from 23.94.217.206 not allowed because not listed in AllowUsers Dec 26 16:13:22 host sshd[29963]: input_userauth_request: invalid user root [preauth] Dec 26 16:13:22 host unix_chkpwd[29968]: password check failed for user (root) Dec 26 16:13:22 host sshd[29963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.94.217.206 user=root Dec 26 16:13:22 host sshd[29963]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:13:22 host sshd[29965]: User root from 142.93.103.27 not allowed because not listed in AllowUsers Dec 26 16:13:22 host sshd[29965]: input_userauth_request: invalid user root [preauth] Dec 26 16:13:22 host unix_chkpwd[29972]: password check failed for user (root) Dec 26 16:13:22 host sshd[29965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.103.27 user=root Dec 26 16:13:22 host sshd[29965]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:13:24 host sshd[29963]: Failed password for invalid user root from 23.94.217.206 port 48806 ssh2 Dec 26 16:13:25 host sshd[29965]: Failed password for invalid user root from 142.93.103.27 port 56294 ssh2 Dec 26 16:13:27 host sshd[30058]: User root from 178.154.229.154 not allowed because not listed in AllowUsers Dec 26 16:13:27 host sshd[30058]: input_userauth_request: invalid user root [preauth] Dec 26 16:13:27 host unix_chkpwd[30061]: password check failed for user (root) Dec 26 16:13:27 host sshd[30058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.154.229.154 user=root Dec 26 16:13:27 host sshd[30058]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:13:29 host sshd[30058]: Failed password for invalid user root from 178.154.229.154 port 59870 ssh2 Dec 26 16:13:29 host sshd[30094]: User root from 165.22.106.178 not allowed because not listed in AllowUsers Dec 26 16:13:29 host sshd[30094]: input_userauth_request: invalid user root [preauth] Dec 26 16:13:29 host unix_chkpwd[30097]: password check failed for user (root) Dec 26 16:13:29 host sshd[30094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.106.178 user=root Dec 26 16:13:29 host sshd[30094]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:13:31 host sshd[30094]: Failed password for invalid user root from 165.22.106.178 port 43778 ssh2 Dec 26 16:13:32 host sshd[30094]: Received disconnect from 165.22.106.178 port 43778:11: Bye Bye [preauth] Dec 26 16:13:32 host sshd[30094]: Disconnected from 165.22.106.178 port 43778 [preauth] Dec 26 16:13:39 host sshd[30138]: User root from 103.22.202.34 not allowed because not listed in AllowUsers Dec 26 16:13:39 host sshd[30138]: input_userauth_request: invalid user root [preauth] Dec 26 16:13:39 host unix_chkpwd[30147]: password check failed for user (root) Dec 26 16:13:39 host sshd[30138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.22.202.34 user=root Dec 26 16:13:39 host sshd[30138]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:13:41 host sshd[30138]: Failed password for invalid user root from 103.22.202.34 port 53090 ssh2 Dec 26 16:13:41 host sshd[30138]: Received disconnect from 103.22.202.34 port 53090:11: Bye Bye [preauth] Dec 26 16:13:41 host sshd[30138]: Disconnected from 103.22.202.34 port 53090 [preauth] Dec 26 16:13:46 host sshd[30156]: User root from 61.216.131.31 not allowed because not listed in AllowUsers Dec 26 16:13:46 host sshd[30156]: input_userauth_request: invalid user root [preauth] Dec 26 16:13:46 host unix_chkpwd[30159]: password check failed for user (root) Dec 26 16:13:46 host sshd[30156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.216.131.31 user=root Dec 26 16:13:46 host sshd[30156]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:13:48 host sshd[30156]: Failed password for invalid user root from 61.216.131.31 port 59468 ssh2 Dec 26 16:13:48 host sshd[30156]: Received disconnect from 61.216.131.31 port 59468:11: Bye Bye [preauth] Dec 26 16:13:48 host sshd[30156]: Disconnected from 61.216.131.31 port 59468 [preauth] Dec 26 16:14:08 host sshd[30234]: User root from 84.108.40.27 not allowed because not listed in AllowUsers Dec 26 16:14:08 host sshd[30234]: input_userauth_request: invalid user root [preauth] Dec 26 16:14:08 host unix_chkpwd[30239]: password check failed for user (root) Dec 26 16:14:08 host sshd[30234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.108.40.27 user=root Dec 26 16:14:08 host sshd[30234]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:14:10 host sshd[30234]: Failed password for invalid user root from 84.108.40.27 port 51058 ssh2 Dec 26 16:14:10 host sshd[30234]: Received disconnect from 84.108.40.27 port 51058:11: Bye Bye [preauth] Dec 26 16:14:10 host sshd[30234]: Disconnected from 84.108.40.27 port 51058 [preauth] Dec 26 16:14:14 host sshd[30249]: User root from 178.128.160.60 not allowed because not listed in AllowUsers Dec 26 16:14:14 host sshd[30249]: input_userauth_request: invalid user root [preauth] Dec 26 16:14:14 host unix_chkpwd[30282]: password check failed for user (root) Dec 26 16:14:14 host sshd[30249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.160.60 user=root Dec 26 16:14:14 host sshd[30249]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:14:16 host sshd[30249]: Failed password for invalid user root from 178.128.160.60 port 37730 ssh2 Dec 26 16:14:16 host sshd[30249]: Received disconnect from 178.128.160.60 port 37730:11: Bye Bye [preauth] Dec 26 16:14:16 host sshd[30249]: Disconnected from 178.128.160.60 port 37730 [preauth] Dec 26 16:14:26 host sshd[30353]: User root from 159.223.59.81 not allowed because not listed in AllowUsers Dec 26 16:14:26 host sshd[30353]: input_userauth_request: invalid user root [preauth] Dec 26 16:14:26 host unix_chkpwd[30358]: password check failed for user (root) Dec 26 16:14:26 host sshd[30353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.59.81 user=root Dec 26 16:14:26 host sshd[30353]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:14:26 host sshd[30355]: User root from 122.160.233.137 not allowed because not listed in AllowUsers Dec 26 16:14:26 host sshd[30355]: input_userauth_request: invalid user root [preauth] Dec 26 16:14:26 host unix_chkpwd[30359]: password check failed for user (root) Dec 26 16:14:26 host sshd[30355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.160.233.137 user=root Dec 26 16:14:26 host sshd[30355]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:14:29 host sshd[30353]: Failed password for invalid user root from 159.223.59.81 port 53734 ssh2 Dec 26 16:14:29 host sshd[30353]: Received disconnect from 159.223.59.81 port 53734:11: Bye Bye [preauth] Dec 26 16:14:29 host sshd[30353]: Disconnected from 159.223.59.81 port 53734 [preauth] Dec 26 16:14:29 host sshd[30361]: User root from 157.245.218.29 not allowed because not listed in AllowUsers Dec 26 16:14:29 host sshd[30361]: input_userauth_request: invalid user root [preauth] Dec 26 16:14:29 host unix_chkpwd[30400]: password check failed for user (root) Dec 26 16:14:29 host sshd[30361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.218.29 user=root Dec 26 16:14:29 host sshd[30361]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:14:29 host sshd[30355]: Failed password for invalid user root from 122.160.233.137 port 44978 ssh2 Dec 26 16:14:29 host sshd[30355]: Received disconnect from 122.160.233.137 port 44978:11: Bye Bye [preauth] Dec 26 16:14:29 host sshd[30355]: Disconnected from 122.160.233.137 port 44978 [preauth] Dec 26 16:14:30 host sshd[30361]: Failed password for invalid user root from 157.245.218.29 port 57116 ssh2 Dec 26 16:14:31 host sshd[30361]: Received disconnect from 157.245.218.29 port 57116:11: Bye Bye [preauth] Dec 26 16:14:31 host sshd[30361]: Disconnected from 157.245.218.29 port 57116 [preauth] Dec 26 16:14:47 host sshd[30484]: User root from 20.193.148.6 not allowed because not listed in AllowUsers Dec 26 16:14:47 host sshd[30484]: input_userauth_request: invalid user root [preauth] Dec 26 16:14:47 host unix_chkpwd[30487]: password check failed for user (root) Dec 26 16:14:47 host sshd[30484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.193.148.6 user=root Dec 26 16:14:47 host sshd[30484]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:14:49 host sshd[30484]: Failed password for invalid user root from 20.193.148.6 port 30595 ssh2 Dec 26 16:14:49 host sshd[30484]: Received disconnect from 20.193.148.6 port 30595:11: Bye Bye [preauth] Dec 26 16:14:49 host sshd[30484]: Disconnected from 20.193.148.6 port 30595 [preauth] Dec 26 16:16:04 host sshd[30752]: User root from 20.193.148.7 not allowed because not listed in AllowUsers Dec 26 16:16:04 host sshd[30752]: input_userauth_request: invalid user root [preauth] Dec 26 16:16:04 host unix_chkpwd[30754]: password check failed for user (root) Dec 26 16:16:04 host sshd[30752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.193.148.7 user=root Dec 26 16:16:04 host sshd[30752]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:16:06 host sshd[30752]: Failed password for invalid user root from 20.193.148.7 port 59040 ssh2 Dec 26 16:16:06 host sshd[30752]: Received disconnect from 20.193.148.7 port 59040:11: Bye Bye [preauth] Dec 26 16:16:06 host sshd[30752]: Disconnected from 20.193.148.7 port 59040 [preauth] Dec 26 16:17:03 host sshd[30913]: User root from 104.28.238.120 not allowed because not listed in AllowUsers Dec 26 16:17:03 host sshd[30913]: input_userauth_request: invalid user root [preauth] Dec 26 16:17:03 host unix_chkpwd[30915]: password check failed for user (root) Dec 26 16:17:03 host sshd[30913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.28.238.120 user=root Dec 26 16:17:03 host sshd[30913]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:17:05 host sshd[30913]: Failed password for invalid user root from 104.28.238.120 port 29335 ssh2 Dec 26 16:17:06 host sshd[30913]: Received disconnect from 104.28.238.120 port 29335:11: Bye Bye [preauth] Dec 26 16:17:06 host sshd[30913]: Disconnected from 104.28.238.120 port 29335 [preauth] Dec 26 16:18:42 host sshd[31153]: User root from 20.193.148.6 not allowed because not listed in AllowUsers Dec 26 16:18:42 host sshd[31153]: input_userauth_request: invalid user root [preauth] Dec 26 16:18:42 host unix_chkpwd[31155]: password check failed for user (root) Dec 26 16:18:42 host sshd[31153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.193.148.6 user=root Dec 26 16:18:42 host sshd[31153]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:18:44 host sshd[31153]: Failed password for invalid user root from 20.193.148.6 port 16640 ssh2 Dec 26 16:18:44 host sshd[31153]: Received disconnect from 20.193.148.6 port 16640:11: Bye Bye [preauth] Dec 26 16:18:44 host sshd[31153]: Disconnected from 20.193.148.6 port 16640 [preauth] Dec 26 16:18:53 host sshd[31205]: User root from 104.28.238.120 not allowed because not listed in AllowUsers Dec 26 16:18:53 host sshd[31205]: input_userauth_request: invalid user root [preauth] Dec 26 16:18:53 host unix_chkpwd[31208]: password check failed for user (root) Dec 26 16:18:53 host sshd[31205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.28.238.120 user=root Dec 26 16:18:53 host sshd[31205]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:18:55 host sshd[31205]: Failed password for invalid user root from 104.28.238.120 port 14117 ssh2 Dec 26 16:20:47 host sshd[31584]: User root from 103.22.202.34 not allowed because not listed in AllowUsers Dec 26 16:20:47 host sshd[31584]: input_userauth_request: invalid user root [preauth] Dec 26 16:20:47 host unix_chkpwd[31587]: password check failed for user (root) Dec 26 16:20:47 host sshd[31584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.22.202.34 user=root Dec 26 16:20:47 host sshd[31584]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:20:49 host sshd[31584]: Failed password for invalid user root from 103.22.202.34 port 60118 ssh2 Dec 26 16:20:49 host sshd[31584]: Received disconnect from 103.22.202.34 port 60118:11: Bye Bye [preauth] Dec 26 16:20:49 host sshd[31584]: Disconnected from 103.22.202.34 port 60118 [preauth] Dec 26 16:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 16:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 16:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 16:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 16:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 16:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 16:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 16:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 16:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 16:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 26 16:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 16:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 16:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 26 16:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 16:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 16:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 26 16:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 16:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 16:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 26 16:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 16:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 16:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 26 16:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 16:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 16:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 26 16:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 16:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 16:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 26 16:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 16:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 16:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 26 16:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 16:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 26 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=wwwrmswll user-4=wwwresourcehunte user-5=keralaholi user-6=ugotscom user-7=cochintaxi user-8=wwwkaretakers user-9=dartsimp user-10=a2zgroup user-11=laundryboniface user-12=bonifacegroup user-13=wwwevmhonda user-14=straightcurve user-15=wwwletsstalkfood user-16=gifterman user-17=palco123 user-18=phmetals user-19=kottayamcalldriv user-20=mrsclean user-21=wwwnexidigital user-22=disposeat user-23=remysagr user-24=wwwkmaorg user-25=woodpeck user-26=wwwkapin user-27=vfmassets user-28=wwwtestugo user-29=shalinijames user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 26 16:21:47 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 26 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-FhMq1ZzCWxOYyBQe.~ Dec 26 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-FhMq1ZzCWxOYyBQe.~' Dec 26 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-FhMq1ZzCWxOYyBQe.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 26 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 16:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 26 16:21:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 16:21:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 16:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 16:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 16:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 16:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 16:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 16:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 16:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 26 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 26 16:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 26 16:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 26 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 26 16:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 16:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 26 16:21:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 16:21:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 16:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 26 16:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 16:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 16:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 26 16:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 16:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 16:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 26 16:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 16:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 16:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 26 16:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 16:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 16:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 26 16:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 16:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 16:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 26 16:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 16:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 16:22:55 host sshd[32079]: Connection closed by 104.28.158.93 port 36105 [preauth] Dec 26 16:24:44 host sshd[32289]: Connection closed by 104.28.158.93 port 35703 [preauth] Dec 26 16:26:36 host sshd[32619]: Connection closed by 104.28.158.93 port 37345 [preauth] Dec 26 16:27:26 host sshd[32678]: Connection closed by 187.217.117.3 port 44086 [preauth] Dec 26 16:28:27 host sshd[398]: Connection closed by 104.28.158.93 port 37198 [preauth] Dec 26 16:28:34 host sshd[408]: Invalid user nvidia from 103.13.40.2 port 59616 Dec 26 16:28:34 host sshd[408]: input_userauth_request: invalid user nvidia [preauth] Dec 26 16:28:34 host sshd[408]: pam_unix(sshd:auth): check pass; user unknown Dec 26 16:28:34 host sshd[408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 26 16:28:35 host sshd[408]: Failed password for invalid user nvidia from 103.13.40.2 port 59616 ssh2 Dec 26 16:28:35 host sshd[408]: Connection closed by 103.13.40.2 port 59616 [preauth] Dec 26 16:30:11 host sshd[633]: Connection closed by 104.28.158.93 port 35713 [preauth] Dec 26 16:30:49 host sshd[837]: User root from 92.46.108.20 not allowed because not listed in AllowUsers Dec 26 16:30:49 host sshd[837]: input_userauth_request: invalid user root [preauth] Dec 26 16:30:50 host unix_chkpwd[842]: password check failed for user (root) Dec 26 16:30:50 host sshd[837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 user=root Dec 26 16:30:50 host sshd[837]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 16:30:51 host sshd[837]: Failed password for invalid user root from 92.46.108.20 port 43774 ssh2 Dec 26 16:30:52 host sshd[837]: Connection closed by 92.46.108.20 port 43774 [preauth] Dec 26 16:31:55 host sshd[982]: Connection closed by 104.28.158.93 port 35098 [preauth] Dec 26 16:33:47 host sshd[1193]: Connection closed by 104.28.158.93 port 34940 [preauth] Dec 26 16:35:38 host sshd[1437]: Connection closed by 104.28.158.93 port 35574 [preauth] Dec 26 16:37:28 host sshd[1760]: Connection closed by 104.28.158.93 port 35283 [preauth] Dec 26 16:39:22 host sshd[2016]: Connection closed by 104.28.158.93 port 36816 [preauth] Dec 26 16:41:17 host sshd[2347]: Connection closed by 104.28.158.93 port 37232 [preauth] Dec 26 16:43:04 host sshd[2553]: Connection closed by 104.28.158.93 port 36613 [preauth] Dec 26 16:44:55 host sshd[2768]: Connection closed by 104.28.158.93 port 36631 [preauth] Dec 26 16:46:49 host sshd[3148]: Connection closed by 104.28.158.93 port 35496 [preauth] Dec 26 16:48:41 host sshd[3366]: Connection closed by 104.28.158.93 port 36666 [preauth] Dec 26 16:50:32 host sshd[3588]: Connection closed by 104.28.158.93 port 37036 [preauth] Dec 26 16:50:45 host sshd[3614]: Invalid user user1 from 162.218.126.136 port 46894 Dec 26 16:50:45 host sshd[3614]: input_userauth_request: invalid user user1 [preauth] Dec 26 16:50:46 host sshd[3614]: pam_unix(sshd:auth): check pass; user unknown Dec 26 16:50:46 host sshd[3614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 26 16:50:48 host sshd[3614]: Failed password for invalid user user1 from 162.218.126.136 port 46894 ssh2 Dec 26 16:50:48 host sshd[3614]: Connection closed by 162.218.126.136 port 46894 [preauth] Dec 26 16:52:32 host sshd[3802]: Connection closed by 104.28.158.93 port 34957 [preauth] Dec 26 16:54:22 host sshd[3977]: Connection closed by 104.28.158.93 port 35725 [preauth] Dec 26 16:56:10 host sshd[4339]: Connection closed by 104.28.158.93 port 34917 [preauth] Dec 26 16:58:01 host sshd[4562]: Connection closed by 104.28.158.93 port 36830 [preauth] Dec 26 16:59:52 host sshd[4774]: Connection closed by 104.28.158.93 port 36258 [preauth] Dec 26 17:01:41 host sshd[5108]: Connection closed by 104.28.158.93 port 35535 [preauth] Dec 26 17:03:28 host sshd[5301]: Connection reset by 104.28.158.93 port 35186 [preauth] Dec 26 17:04:08 host sshd[5356]: Invalid user app from 41.197.31.178 port 47412 Dec 26 17:04:08 host sshd[5356]: input_userauth_request: invalid user app [preauth] Dec 26 17:04:08 host sshd[5356]: pam_unix(sshd:auth): check pass; user unknown Dec 26 17:04:08 host sshd[5356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 26 17:04:10 host sshd[5356]: Failed password for invalid user app from 41.197.31.178 port 47412 ssh2 Dec 26 17:04:11 host sshd[5356]: Connection closed by 41.197.31.178 port 47412 [preauth] Dec 26 17:05:21 host sshd[5482]: Connection closed by 104.28.158.93 port 35456 [preauth] Dec 26 17:06:45 host sshd[5771]: User root from 43.157.26.169 not allowed because not listed in AllowUsers Dec 26 17:06:45 host sshd[5771]: input_userauth_request: invalid user root [preauth] Dec 26 17:06:45 host unix_chkpwd[5774]: password check failed for user (root) Dec 26 17:06:45 host sshd[5771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.26.169 user=root Dec 26 17:06:45 host sshd[5771]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 17:06:46 host sshd[5771]: Failed password for invalid user root from 43.157.26.169 port 41138 ssh2 Dec 26 17:06:47 host sshd[5771]: Received disconnect from 43.157.26.169 port 41138:11: Bye Bye [preauth] Dec 26 17:06:47 host sshd[5771]: Disconnected from 43.157.26.169 port 41138 [preauth] Dec 26 17:06:48 host sshd[5780]: User root from 143.110.190.26 not allowed because not listed in AllowUsers Dec 26 17:06:48 host sshd[5780]: input_userauth_request: invalid user root [preauth] Dec 26 17:06:48 host unix_chkpwd[5782]: password check failed for user (root) Dec 26 17:06:48 host sshd[5780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.190.26 user=root Dec 26 17:06:48 host sshd[5780]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 17:06:50 host sshd[5780]: Failed password for invalid user root from 143.110.190.26 port 32838 ssh2 Dec 26 17:06:50 host sshd[5780]: Received disconnect from 143.110.190.26 port 32838:11: Bye Bye [preauth] Dec 26 17:06:50 host sshd[5780]: Disconnected from 143.110.190.26 port 32838 [preauth] Dec 26 17:07:12 host sshd[5829]: Connection closed by 104.28.158.93 port 36745 [preauth] Dec 26 17:08:16 host sshd[5933]: User root from 157.230.15.216 not allowed because not listed in AllowUsers Dec 26 17:08:16 host sshd[5933]: input_userauth_request: invalid user root [preauth] Dec 26 17:08:16 host unix_chkpwd[5938]: password check failed for user (root) Dec 26 17:08:16 host sshd[5933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.15.216 user=root Dec 26 17:08:16 host sshd[5933]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 17:08:18 host sshd[5933]: Failed password for invalid user root from 157.230.15.216 port 34664 ssh2 Dec 26 17:08:19 host sshd[5933]: Received disconnect from 157.230.15.216 port 34664:11: Bye Bye [preauth] Dec 26 17:08:19 host sshd[5933]: Disconnected from 157.230.15.216 port 34664 [preauth] Dec 26 17:09:40 host sshd[6117]: User root from 143.110.190.26 not allowed because not listed in AllowUsers Dec 26 17:09:40 host sshd[6117]: input_userauth_request: invalid user root [preauth] Dec 26 17:09:40 host unix_chkpwd[6119]: password check failed for user (root) Dec 26 17:09:40 host sshd[6117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.190.26 user=root Dec 26 17:09:40 host sshd[6117]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 17:09:43 host sshd[6117]: Failed password for invalid user root from 143.110.190.26 port 34190 ssh2 Dec 26 17:10:05 host sshd[6220]: Invalid user db from 45.93.201.90 port 48792 Dec 26 17:10:05 host sshd[6220]: input_userauth_request: invalid user db [preauth] Dec 26 17:10:05 host sshd[6220]: pam_unix(sshd:auth): check pass; user unknown Dec 26 17:10:05 host sshd[6220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 26 17:10:07 host sshd[6220]: Failed password for invalid user db from 45.93.201.90 port 48792 ssh2 Dec 26 17:10:11 host sshd[6220]: pam_unix(sshd:auth): check pass; user unknown Dec 26 17:10:13 host sshd[6220]: Failed password for invalid user db from 45.93.201.90 port 48792 ssh2 Dec 26 17:10:17 host sshd[6220]: pam_unix(sshd:auth): check pass; user unknown Dec 26 17:10:19 host sshd[6220]: Failed password for invalid user db from 45.93.201.90 port 48792 ssh2 Dec 26 17:10:22 host sshd[6220]: Connection closed by 45.93.201.90 port 48792 [preauth] Dec 26 17:10:22 host sshd[6220]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 26 17:10:24 host sshd[6240]: User root from 2.228.139.162 not allowed because not listed in AllowUsers Dec 26 17:10:24 host sshd[6240]: input_userauth_request: invalid user root [preauth] Dec 26 17:10:24 host unix_chkpwd[6243]: password check failed for user (root) Dec 26 17:10:24 host sshd[6240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.228.139.162 user=root Dec 26 17:10:24 host sshd[6240]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 17:10:26 host sshd[6240]: Failed password for invalid user root from 2.228.139.162 port 38725 ssh2 Dec 26 17:10:26 host sshd[6240]: Received disconnect from 2.228.139.162 port 38725:11: Bye Bye [preauth] Dec 26 17:10:26 host sshd[6240]: Disconnected from 2.228.139.162 port 38725 [preauth] Dec 26 17:11:09 host sshd[6333]: User root from 188.166.215.228 not allowed because not listed in AllowUsers Dec 26 17:11:09 host sshd[6333]: input_userauth_request: invalid user root [preauth] Dec 26 17:11:09 host unix_chkpwd[6336]: password check failed for user (root) Dec 26 17:11:09 host sshd[6333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.215.228 user=root Dec 26 17:11:09 host sshd[6333]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 17:11:12 host sshd[6333]: Failed password for invalid user root from 188.166.215.228 port 51150 ssh2 Dec 26 17:11:12 host sshd[6333]: Received disconnect from 188.166.215.228 port 51150:11: Bye Bye [preauth] Dec 26 17:11:12 host sshd[6333]: Disconnected from 188.166.215.228 port 51150 [preauth] Dec 26 17:11:53 host sshd[6520]: User root from 43.157.26.169 not allowed because not listed in AllowUsers Dec 26 17:11:53 host sshd[6520]: input_userauth_request: invalid user root [preauth] Dec 26 17:11:53 host unix_chkpwd[6523]: password check failed for user (root) Dec 26 17:11:53 host sshd[6520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.26.169 user=root Dec 26 17:11:53 host sshd[6520]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 17:11:55 host sshd[6520]: Failed password for invalid user root from 43.157.26.169 port 42038 ssh2 Dec 26 17:11:56 host sshd[6520]: Received disconnect from 43.157.26.169 port 42038:11: Bye Bye [preauth] Dec 26 17:11:56 host sshd[6520]: Disconnected from 43.157.26.169 port 42038 [preauth] Dec 26 17:12:50 host sshd[6647]: User root from 2.228.139.162 not allowed because not listed in AllowUsers Dec 26 17:12:50 host sshd[6647]: input_userauth_request: invalid user root [preauth] Dec 26 17:12:50 host unix_chkpwd[6660]: password check failed for user (root) Dec 26 17:12:50 host sshd[6647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.228.139.162 user=root Dec 26 17:12:50 host sshd[6647]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 17:12:51 host sshd[6647]: Failed password for invalid user root from 2.228.139.162 port 26142 ssh2 Dec 26 17:12:52 host sshd[6666]: User root from 157.230.15.216 not allowed because not listed in AllowUsers Dec 26 17:12:52 host sshd[6666]: input_userauth_request: invalid user root [preauth] Dec 26 17:12:52 host unix_chkpwd[6693]: password check failed for user (root) Dec 26 17:12:52 host sshd[6666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.15.216 user=root Dec 26 17:12:52 host sshd[6666]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 17:12:54 host sshd[6666]: Failed password for invalid user root from 157.230.15.216 port 56790 ssh2 Dec 26 17:12:55 host sshd[6666]: Received disconnect from 157.230.15.216 port 56790:11: Bye Bye [preauth] Dec 26 17:12:55 host sshd[6666]: Disconnected from 157.230.15.216 port 56790 [preauth] Dec 26 17:13:38 host sshd[6826]: User root from 188.166.215.228 not allowed because not listed in AllowUsers Dec 26 17:13:38 host sshd[6826]: input_userauth_request: invalid user root [preauth] Dec 26 17:13:38 host unix_chkpwd[6829]: password check failed for user (root) Dec 26 17:13:38 host sshd[6826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.215.228 user=root Dec 26 17:13:38 host sshd[6826]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 17:13:40 host sshd[6826]: Failed password for invalid user root from 188.166.215.228 port 40253 ssh2 Dec 26 17:13:40 host sshd[6826]: Received disconnect from 188.166.215.228 port 40253:11: Bye Bye [preauth] Dec 26 17:13:40 host sshd[6826]: Disconnected from 188.166.215.228 port 40253 [preauth] Dec 26 17:14:14 host sshd[6917]: User root from 188.141.89.71 not allowed because not listed in AllowUsers Dec 26 17:14:14 host sshd[6917]: input_userauth_request: invalid user root [preauth] Dec 26 17:14:14 host unix_chkpwd[6921]: password check failed for user (root) Dec 26 17:14:14 host sshd[6917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.141.89.71 user=root Dec 26 17:14:14 host sshd[6917]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 17:14:16 host sshd[6917]: Failed password for invalid user root from 188.141.89.71 port 44672 ssh2 Dec 26 17:14:26 host sshd[6917]: Received disconnect from 188.141.89.71 port 44672:11: Bye Bye [preauth] Dec 26 17:14:26 host sshd[6917]: Disconnected from 188.141.89.71 port 44672 [preauth] Dec 26 17:17:53 host sshd[7360]: Connection closed by 188.141.89.71 port 57588 [preauth] Dec 26 17:21:12 host sshd[7860]: Connection closed by 188.141.89.71 port 41492 [preauth] Dec 26 17:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 17:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 17:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 17:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 17:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 17:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 17:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 17:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 17:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 17:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 26 17:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 17:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 17:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 26 17:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 17:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 17:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 26 17:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 17:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 17:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 26 17:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 17:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 17:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 26 17:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 17:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 17:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 26 17:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 17:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 17:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 26 17:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 17:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 17:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 26 17:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 17:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 26 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=ugotscom user-4=wwwresourcehunte user-5=keralaholi user-6=wwwrmswll user-7=wwwkaretakers user-8=cochintaxi user-9=a2zgroup user-10=dartsimp user-11=laundryboniface user-12=wwwevmhonda user-13=bonifacegroup user-14=wwwletsstalkfood user-15=straightcurve user-16=kottayamcalldriv user-17=phmetals user-18=palco123 user-19=gifterman user-20=mrsclean user-21=wwwnexidigital user-22=remysagr user-23=disposeat user-24=wwwkmaorg user-25=woodpeck user-26=wwwkapin user-27=shalinijames user-28=wwwtestugo user-29=vfmassets user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 26 17:21:47 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 26 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-AYAQjfsxSuyOTTkL.~ Dec 26 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-AYAQjfsxSuyOTTkL.~' Dec 26 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-AYAQjfsxSuyOTTkL.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 17:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 17:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 26 17:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 17:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 17:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 26 17:21:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 17:21:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 26 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 26 17:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 26 17:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 26 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 26 17:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 17:21:52 host sshd[8081]: User root from 106.10.122.53 not allowed because not listed in AllowUsers Dec 26 17:21:52 host sshd[8081]: input_userauth_request: invalid user root [preauth] Dec 26 17:21:52 host unix_chkpwd[8091]: password check failed for user (root) Dec 26 17:21:52 host sshd[8081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 user=root Dec 26 17:21:52 host sshd[8081]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 17:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 26 17:21:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 17:21:54 host sshd[8081]: Failed password for invalid user root from 106.10.122.53 port 33956 ssh2 Dec 26 17:21:54 host sshd[8081]: Connection closed by 106.10.122.53 port 33956 [preauth] Dec 26 17:21:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 26 17:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 17:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 17:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 26 17:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 17:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 17:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 26 17:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 17:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 26 17:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 17:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 17:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 26 17:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 17:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 17:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 26 17:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 17:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 17:24:23 host sshd[8531]: User root from 188.141.89.71 not allowed because not listed in AllowUsers Dec 26 17:24:23 host sshd[8531]: input_userauth_request: invalid user root [preauth] Dec 26 17:24:23 host unix_chkpwd[8534]: password check failed for user (root) Dec 26 17:24:23 host sshd[8531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.141.89.71 user=root Dec 26 17:24:23 host sshd[8531]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 17:24:24 host sshd[8531]: Failed password for invalid user root from 188.141.89.71 port 53627 ssh2 Dec 26 17:37:13 host sshd[10322]: User root from 159.203.72.14 not allowed because not listed in AllowUsers Dec 26 17:37:13 host sshd[10322]: input_userauth_request: invalid user root [preauth] Dec 26 17:37:13 host unix_chkpwd[10327]: password check failed for user (root) Dec 26 17:37:13 host sshd[10322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.72.14 user=root Dec 26 17:37:13 host sshd[10322]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 17:37:15 host sshd[10322]: Failed password for invalid user root from 159.203.72.14 port 51576 ssh2 Dec 26 17:37:15 host sshd[10322]: Received disconnect from 159.203.72.14 port 51576:11: Bye Bye [preauth] Dec 26 17:37:15 host sshd[10322]: Disconnected from 159.203.72.14 port 51576 [preauth] Dec 26 17:42:18 host sshd[11049]: User root from 159.203.72.14 not allowed because not listed in AllowUsers Dec 26 17:42:18 host sshd[11049]: input_userauth_request: invalid user root [preauth] Dec 26 17:42:18 host unix_chkpwd[11052]: password check failed for user (root) Dec 26 17:42:18 host sshd[11049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.72.14 user=root Dec 26 17:42:18 host sshd[11049]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 17:42:19 host sshd[11049]: Failed password for invalid user root from 159.203.72.14 port 45676 ssh2 Dec 26 17:42:20 host sshd[11049]: Received disconnect from 159.203.72.14 port 45676:11: Bye Bye [preauth] Dec 26 17:42:20 host sshd[11049]: Disconnected from 159.203.72.14 port 45676 [preauth] Dec 26 17:47:25 host sshd[11826]: Did not receive identification string from 185.173.145.5 port 49494 Dec 26 17:47:40 host sshd[11840]: User root from 185.173.145.5 not allowed because not listed in AllowUsers Dec 26 17:47:40 host sshd[11840]: input_userauth_request: invalid user root [preauth] Dec 26 17:47:40 host unix_chkpwd[11843]: password check failed for user (root) Dec 26 17:47:40 host sshd[11840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.173.145.5 user=root Dec 26 17:47:40 host sshd[11840]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 17:47:43 host sshd[11840]: Failed password for invalid user root from 185.173.145.5 port 50852 ssh2 Dec 26 17:47:43 host sshd[11840]: Received disconnect from 185.173.145.5 port 50852:11: Normal Shutdown, Thank you for playing [preauth] Dec 26 17:47:43 host sshd[11840]: Disconnected from 185.173.145.5 port 50852 [preauth] Dec 26 17:47:52 host sshd[11860]: User root from 185.173.145.5 not allowed because not listed in AllowUsers Dec 26 17:47:52 host sshd[11860]: input_userauth_request: invalid user root [preauth] Dec 26 17:47:52 host unix_chkpwd[11866]: password check failed for user (root) Dec 26 17:47:52 host sshd[11860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.173.145.5 user=root Dec 26 17:47:52 host sshd[11860]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 17:47:54 host sshd[11860]: Failed password for invalid user root from 185.173.145.5 port 59134 ssh2 Dec 26 17:47:54 host sshd[11860]: Received disconnect from 185.173.145.5 port 59134:11: Normal Shutdown, Thank you for playing [preauth] Dec 26 17:47:54 host sshd[11860]: Disconnected from 185.173.145.5 port 59134 [preauth] Dec 26 17:59:33 host sshd[13732]: User root from 103.13.40.2 not allowed because not listed in AllowUsers Dec 26 17:59:33 host sshd[13732]: input_userauth_request: invalid user root [preauth] Dec 26 17:59:33 host unix_chkpwd[13734]: password check failed for user (root) Dec 26 17:59:33 host sshd[13732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 user=root Dec 26 17:59:33 host sshd[13732]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 17:59:35 host sshd[13732]: Failed password for invalid user root from 103.13.40.2 port 52888 ssh2 Dec 26 17:59:35 host sshd[13732]: Connection closed by 103.13.40.2 port 52888 [preauth] Dec 26 18:03:27 host sshd[14376]: Invalid user user1 from 162.218.126.136 port 43728 Dec 26 18:03:27 host sshd[14376]: input_userauth_request: invalid user user1 [preauth] Dec 26 18:03:27 host sshd[14376]: pam_unix(sshd:auth): check pass; user unknown Dec 26 18:03:27 host sshd[14376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 26 18:03:29 host sshd[14376]: Failed password for invalid user user1 from 162.218.126.136 port 43728 ssh2 Dec 26 18:03:29 host sshd[14376]: Connection closed by 162.218.126.136 port 43728 [preauth] Dec 26 18:08:47 host sshd[15135]: Connection closed by 66.175.213.4 port 15374 [preauth] Dec 26 18:08:49 host sshd[15138]: Connection closed by 66.175.213.4 port 15390 [preauth] Dec 26 18:08:51 host sshd[15141]: Connection closed by 66.175.213.4 port 15396 [preauth] Dec 26 18:17:46 host sshd[16391]: Bad protocol version identification 'GET / HTTP/1.1' from 198.74.56.135 port 59639 Dec 26 18:17:49 host sshd[16418]: Invalid user yeh from 92.46.108.20 port 35158 Dec 26 18:17:49 host sshd[16418]: input_userauth_request: invalid user yeh [preauth] Dec 26 18:17:49 host sshd[16418]: pam_unix(sshd:auth): check pass; user unknown Dec 26 18:17:49 host sshd[16418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 26 18:17:51 host sshd[16418]: Failed password for invalid user yeh from 92.46.108.20 port 35158 ssh2 Dec 26 18:17:51 host sshd[16418]: Connection closed by 92.46.108.20 port 35158 [preauth] Dec 26 18:20:46 host sshd[16842]: Did not receive identification string from 198.74.56.135 port 59642 Dec 26 18:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 18:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 18:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 18:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 18:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 18:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 18:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 18:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 18:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 18:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 26 18:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 18:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 18:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 26 18:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 18:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 18:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 26 18:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 18:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 18:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 26 18:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 18:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 18:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 26 18:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 18:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 18:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 26 18:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 18:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 18:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 26 18:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 18:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 18:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 26 18:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 18:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 18:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 18:22:17 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 18:22:17 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 18:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 26 18:22:17 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 18:22:17 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 18:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=a2zgroup user-3=dartsimp user-4=cochintaxi user-5=wwwkaretakers user-6=wwwresourcehunte user-7=keralaholi user-8=wwwrmswll user-9=ugotscom user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=vfmassets user-14=shalinijames user-15=wwwtestugo user-16=woodpeck user-17=wwwkapin user-18=disposeat user-19=remysagr user-20=wwwkmaorg user-21=mrsclean user-22=wwwnexidigital user-23=palco123 user-24=gifterman user-25=phmetals user-26=kottayamcalldriv user-27=wwwletsstalkfood user-28=straightcurve user-29=bonifacegroup user-30=wwwevmhonda feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 26 18:22:17 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 26 18:22:17 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 18:22:17 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 18:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 18:22:17 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 18:22:17 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 18:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Pw1FmkMCf4t4w54Z.~ Dec 26 18:22:17 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 18:22:17 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 18:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Pw1FmkMCf4t4w54Z.~' Dec 26 18:22:17 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 18:22:17 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 18:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Pw1FmkMCf4t4w54Z.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 18:22:17 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 18:22:17 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 18:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 26 18:22:18 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 18:22:18 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 18:22:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 26 18:22:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 18:22:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 18:22:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 18:22:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 18:22:19 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 18:22:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 18:22:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 18:22:19 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 18:22:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 18:22:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 18:22:19 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 18:22:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 26 18:22:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 18:22:19 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 18:22:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 18:22:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 18:22:20 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 18:22:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 26 18:22:20 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 26 18:22:21 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 26 18:22:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 26 18:22:22 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 18:22:28 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 18:22:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 26 18:22:28 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 18:22:35 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 18:22:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 26 18:22:36 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 18:22:40 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 18:22:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 26 18:22:40 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 18:22:40 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 18:22:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 26 18:22:40 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 18:22:42 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 18:22:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 26 18:22:43 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 18:22:44 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 18:22:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 26 18:22:44 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 18:22:45 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 18:22:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 26 18:22:46 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 18:22:47 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 18:46:54 host sshd[20432]: Did not receive identification string from 183.146.30.220 port 9868 Dec 26 18:46:56 host sshd[20437]: Invalid user linkxess from 183.146.30.220 port 28154 Dec 26 18:46:56 host sshd[20437]: input_userauth_request: invalid user linkxess [preauth] Dec 26 18:46:56 host sshd[20438]: User root from 183.146.30.220 not allowed because not listed in AllowUsers Dec 26 18:46:56 host sshd[20438]: input_userauth_request: invalid user root [preauth] Dec 26 18:46:56 host sshd[20439]: Invalid user ubuntu from 183.146.30.220 port 28202 Dec 26 18:46:56 host sshd[20439]: input_userauth_request: invalid user ubuntu [preauth] Dec 26 18:46:56 host sshd[20442]: User root from 183.146.30.220 not allowed because not listed in AllowUsers Dec 26 18:46:56 host sshd[20442]: input_userauth_request: invalid user root [preauth] Dec 26 18:46:56 host sshd[20441]: Invalid user admin from 183.146.30.220 port 28212 Dec 26 18:46:56 host sshd[20441]: input_userauth_request: invalid user admin [preauth] Dec 26 18:46:56 host sshd[20443]: Invalid user ZXDSL from 183.146.30.220 port 28178 Dec 26 18:46:56 host sshd[20443]: input_userauth_request: invalid user ZXDSL [preauth] Dec 26 18:46:56 host sshd[20440]: Invalid user ec2-user from 183.146.30.220 port 28150 Dec 26 18:46:56 host sshd[20440]: input_userauth_request: invalid user ec2-user [preauth] Dec 26 18:46:56 host sshd[20445]: Invalid user ubuntu from 183.146.30.220 port 28222 Dec 26 18:46:56 host sshd[20445]: input_userauth_request: invalid user ubuntu [preauth] Dec 26 18:46:56 host sshd[20452]: Invalid user zyfwp from 183.146.30.220 port 28158 Dec 26 18:46:56 host sshd[20452]: input_userauth_request: invalid user zyfwp [preauth] Dec 26 18:46:56 host sshd[20446]: Invalid user pi from 183.146.30.220 port 28176 Dec 26 18:46:56 host sshd[20446]: input_userauth_request: invalid user pi [preauth] Dec 26 18:46:56 host sshd[20449]: Invalid user ubuntu from 183.146.30.220 port 28148 Dec 26 18:46:56 host sshd[20449]: input_userauth_request: invalid user ubuntu [preauth] Dec 26 18:46:56 host sshd[20450]: User root from 183.146.30.220 not allowed because not listed in AllowUsers Dec 26 18:46:56 host sshd[20450]: input_userauth_request: invalid user root [preauth] Dec 26 18:46:56 host sshd[20453]: Invalid user elastic from 183.146.30.220 port 28224 Dec 26 18:46:56 host sshd[20453]: input_userauth_request: invalid user elastic [preauth] Dec 26 18:46:56 host sshd[20458]: User root from 183.146.30.220 not allowed because not listed in AllowUsers Dec 26 18:46:56 host sshd[20459]: Invalid user test from 183.146.30.220 port 28198 Dec 26 18:46:56 host sshd[20459]: input_userauth_request: invalid user test [preauth] Dec 26 18:46:56 host sshd[20458]: input_userauth_request: invalid user root [preauth] Dec 26 18:46:56 host sshd[20457]: Invalid user test from 183.146.30.220 port 28213 Dec 26 18:46:56 host sshd[20457]: input_userauth_request: invalid user test [preauth] Dec 26 18:46:56 host sshd[20462]: User root from 183.146.30.220 not allowed because not listed in AllowUsers Dec 26 18:46:56 host sshd[20462]: input_userauth_request: invalid user root [preauth] Dec 26 18:46:56 host sshd[20451]: Invalid user ftpuser from 183.146.30.220 port 28188 Dec 26 18:46:56 host sshd[20451]: input_userauth_request: invalid user ftpuser [preauth] Dec 26 18:46:56 host sshd[20454]: Invalid user test from 183.146.30.220 port 28192 Dec 26 18:46:56 host sshd[20454]: input_userauth_request: invalid user test [preauth] Dec 26 18:46:56 host sshd[20460]: User root from 183.146.30.220 not allowed because not listed in AllowUsers Dec 26 18:46:56 host sshd[20460]: input_userauth_request: invalid user root [preauth] Dec 26 18:46:56 host sshd[20461]: Invalid user steam from 183.146.30.220 port 28210 Dec 26 18:46:56 host sshd[20461]: input_userauth_request: invalid user steam [preauth] Dec 26 18:46:56 host sshd[20467]: User root from 183.146.30.220 not allowed because not listed in AllowUsers Dec 26 18:46:56 host sshd[20467]: input_userauth_request: invalid user root [preauth] Dec 26 18:46:56 host sshd[20468]: Invalid user devops from 183.146.30.220 port 28184 Dec 26 18:46:56 host sshd[20468]: input_userauth_request: invalid user devops [preauth] Dec 26 18:46:56 host sshd[20484]: Invalid user es from 183.146.30.220 port 28166 Dec 26 18:46:56 host sshd[20484]: input_userauth_request: invalid user es [preauth] Dec 26 18:46:56 host sshd[20490]: User root from 183.146.30.220 not allowed because not listed in AllowUsers Dec 26 18:46:56 host sshd[20490]: input_userauth_request: invalid user root [preauth] Dec 26 18:46:56 host sshd[20437]: pam_unix(sshd:auth): check pass; user unknown Dec 26 18:46:56 host sshd[20437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.146.30.220 Dec 26 18:46:56 host sshd[20439]: pam_unix(sshd:auth): check pass; user unknown Dec 26 18:46:56 host sshd[20439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.146.30.220 Dec 26 18:46:56 host sshd[20452]: pam_unix(sshd:auth): check pass; user unknown Dec 26 18:46:56 host sshd[20452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.146.30.220 Dec 26 18:46:56 host sshd[20446]: pam_unix(sshd:auth): check pass; user unknown Dec 26 18:46:56 host sshd[20446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.146.30.220 Dec 26 18:46:56 host sshd[20461]: pam_unix(sshd:auth): check pass; user unknown Dec 26 18:46:56 host sshd[20461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.146.30.220 Dec 26 18:46:56 host unix_chkpwd[20495]: password check failed for user (root) Dec 26 18:46:56 host sshd[20458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.146.30.220 user=root Dec 26 18:46:56 host sshd[20458]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 18:46:56 host unix_chkpwd[20496]: password check failed for user (root) Dec 26 18:46:56 host sshd[20467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.146.30.220 user=root Dec 26 18:46:56 host sshd[20467]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 18:46:56 host sshd[20456]: Invalid user esuser from 183.146.30.220 port 28186 Dec 26 18:46:56 host sshd[20456]: input_userauth_request: invalid user esuser [preauth] Dec 26 18:46:56 host sshd[20484]: pam_unix(sshd:auth): check pass; user unknown Dec 26 18:46:56 host sshd[20484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.146.30.220 Dec 26 18:46:57 host unix_chkpwd[20497]: password check failed for user (root) Dec 26 18:46:57 host sshd[20490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.146.30.220 user=root Dec 26 18:46:57 host sshd[20490]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 18:46:57 host sshd[20433]: User root from 183.146.30.220 not allowed because not listed in AllowUsers Dec 26 18:46:57 host sshd[20433]: input_userauth_request: invalid user root [preauth] Dec 26 18:46:57 host sshd[20456]: pam_unix(sshd:auth): check pass; user unknown Dec 26 18:46:57 host sshd[20456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.146.30.220 Dec 26 18:46:57 host sshd[20435]: User root from 183.146.30.220 not allowed because not listed in AllowUsers Dec 26 18:46:57 host sshd[20435]: input_userauth_request: invalid user root [preauth] Dec 26 18:46:57 host sshd[20434]: Invalid user test from 183.146.30.220 port 28220 Dec 26 18:46:57 host sshd[20434]: input_userauth_request: invalid user test [preauth] Dec 26 18:46:57 host sshd[20436]: Invalid user support from 183.146.30.220 port 28180 Dec 26 18:46:57 host sshd[20436]: input_userauth_request: invalid user support [preauth] Dec 26 18:46:57 host unix_chkpwd[20498]: password check failed for user (root) Dec 26 18:46:57 host sshd[20438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.146.30.220 user=root Dec 26 18:46:57 host sshd[20438]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 18:46:57 host sshd[20443]: pam_unix(sshd:auth): check pass; user unknown Dec 26 18:46:57 host sshd[20443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.146.30.220 Dec 26 18:46:57 host sshd[20440]: pam_unix(sshd:auth): check pass; user unknown Dec 26 18:46:57 host sshd[20440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.146.30.220 Dec 26 18:46:57 host sshd[20445]: pam_unix(sshd:auth): check pass; user unknown Dec 26 18:46:57 host sshd[20445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.146.30.220 Dec 26 18:46:57 host sshd[20441]: pam_unix(sshd:auth): check pass; user unknown Dec 26 18:46:57 host sshd[20441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.146.30.220 Dec 26 18:46:57 host sshd[20453]: pam_unix(sshd:auth): check pass; user unknown Dec 26 18:46:57 host sshd[20453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.146.30.220 Dec 26 18:46:57 host sshd[20449]: pam_unix(sshd:auth): check pass; user unknown Dec 26 18:46:57 host sshd[20449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.146.30.220 Dec 26 18:46:57 host sshd[20457]: pam_unix(sshd:auth): check pass; user unknown Dec 26 18:46:57 host sshd[20457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.146.30.220 Dec 26 18:46:57 host sshd[20454]: pam_unix(sshd:auth): check pass; user unknown Dec 26 18:46:57 host sshd[20454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.146.30.220 Dec 26 18:46:57 host unix_chkpwd[20499]: password check failed for user (root) Dec 26 18:46:57 host sshd[20450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.146.30.220 user=root Dec 26 18:46:57 host sshd[20450]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 18:46:57 host unix_chkpwd[20500]: password check failed for user (root) Dec 26 18:46:57 host sshd[20442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.146.30.220 user=root Dec 26 18:46:57 host sshd[20442]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 18:46:57 host sshd[20459]: pam_unix(sshd:auth): check pass; user unknown Dec 26 18:46:57 host sshd[20459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.146.30.220 Dec 26 18:46:57 host unix_chkpwd[20501]: password check failed for user (root) Dec 26 18:46:57 host sshd[20462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.146.30.220 user=root Dec 26 18:46:57 host sshd[20462]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 18:46:57 host sshd[20451]: pam_unix(sshd:auth): check pass; user unknown Dec 26 18:46:57 host sshd[20451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.146.30.220 Dec 26 18:46:57 host unix_chkpwd[20502]: password check failed for user (root) Dec 26 18:46:57 host sshd[20460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.146.30.220 user=root Dec 26 18:46:57 host sshd[20460]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 18:46:57 host unix_chkpwd[20503]: password check failed for user (root) Dec 26 18:46:57 host sshd[20433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.146.30.220 user=root Dec 26 18:46:57 host sshd[20433]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 18:46:57 host sshd[20434]: pam_unix(sshd:auth): check pass; user unknown Dec 26 18:46:57 host sshd[20434]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.146.30.220 Dec 26 18:46:57 host sshd[20436]: pam_unix(sshd:auth): check pass; user unknown Dec 26 18:46:57 host sshd[20436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.146.30.220 Dec 26 18:46:57 host unix_chkpwd[20504]: password check failed for user (root) Dec 26 18:46:57 host sshd[20435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.146.30.220 user=root Dec 26 18:46:57 host sshd[20435]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 18:46:57 host sshd[20468]: pam_unix(sshd:auth): check pass; user unknown Dec 26 18:46:57 host sshd[20468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.146.30.220 Dec 26 18:46:59 host sshd[20437]: Failed password for invalid user linkxess from 183.146.30.220 port 28154 ssh2 Dec 26 18:46:59 host sshd[20439]: Failed password for invalid user ubuntu from 183.146.30.220 port 28202 ssh2 Dec 26 18:46:59 host sshd[20452]: Failed password for invalid user zyfwp from 183.146.30.220 port 28158 ssh2 Dec 26 18:46:59 host sshd[20446]: Failed password for invalid user pi from 183.146.30.220 port 28176 ssh2 Dec 26 18:46:59 host sshd[20461]: Failed password for invalid user steam from 183.146.30.220 port 28210 ssh2 Dec 26 18:46:59 host sshd[20458]: Failed password for invalid user root from 183.146.30.220 port 28169 ssh2 Dec 26 18:46:59 host sshd[20467]: Failed password for invalid user root from 183.146.30.220 port 28167 ssh2 Dec 26 18:46:59 host sshd[20490]: Failed password for invalid user root from 183.146.30.220 port 28214 ssh2 Dec 26 18:46:59 host sshd[20484]: Failed password for invalid user es from 183.146.30.220 port 28166 ssh2 Dec 26 18:46:59 host sshd[20437]: Connection closed by 183.146.30.220 port 28154 [preauth] Dec 26 18:46:59 host sshd[20439]: Connection closed by 183.146.30.220 port 28202 [preauth] Dec 26 18:46:59 host sshd[20456]: Failed password for invalid user esuser from 183.146.30.220 port 28186 ssh2 Dec 26 18:46:59 host sshd[20452]: Connection closed by 183.146.30.220 port 28158 [preauth] Dec 26 18:46:59 host sshd[20446]: Connection closed by 183.146.30.220 port 28176 [preauth] Dec 26 18:46:59 host sshd[20461]: Connection closed by 183.146.30.220 port 28210 [preauth] Dec 26 18:46:59 host sshd[20458]: Connection closed by 183.146.30.220 port 28169 [preauth] Dec 26 18:46:59 host sshd[20467]: Connection closed by 183.146.30.220 port 28167 [preauth] Dec 26 18:46:59 host sshd[20438]: Failed password for invalid user root from 183.146.30.220 port 28164 ssh2 Dec 26 18:46:59 host sshd[20490]: Connection closed by 183.146.30.220 port 28214 [preauth] Dec 26 18:46:59 host sshd[20443]: Failed password for invalid user ZXDSL from 183.146.30.220 port 28178 ssh2 Dec 26 18:46:59 host sshd[20440]: Failed password for invalid user ec2-user from 183.146.30.220 port 28150 ssh2 Dec 26 18:46:59 host sshd[20445]: Failed password for invalid user ubuntu from 183.146.30.220 port 28222 ssh2 Dec 26 18:46:59 host sshd[20441]: Failed password for invalid user admin from 183.146.30.220 port 28212 ssh2 Dec 26 18:46:59 host sshd[20453]: Failed password for invalid user elastic from 183.146.30.220 port 28224 ssh2 Dec 26 18:46:59 host sshd[20449]: Failed password for invalid user ubuntu from 183.146.30.220 port 28148 ssh2 Dec 26 18:46:59 host sshd[20457]: Failed password for invalid user test from 183.146.30.220 port 28213 ssh2 Dec 26 18:46:59 host sshd[20454]: Failed password for invalid user test from 183.146.30.220 port 28192 ssh2 Dec 26 18:46:59 host sshd[20450]: Failed password for invalid user root from 183.146.30.220 port 28155 ssh2 Dec 26 18:46:59 host sshd[20442]: Failed password for invalid user root from 183.146.30.220 port 28181 ssh2 Dec 26 18:46:59 host sshd[20459]: Failed password for invalid user test from 183.146.30.220 port 28198 ssh2 Dec 26 18:46:59 host sshd[20484]: Connection closed by 183.146.30.220 port 28166 [preauth] Dec 26 18:46:59 host sshd[20462]: Failed password for invalid user root from 183.146.30.220 port 28144 ssh2 Dec 26 18:46:59 host sshd[20451]: Failed password for invalid user ftpuser from 183.146.30.220 port 28188 ssh2 Dec 26 18:46:59 host sshd[20460]: Failed password for invalid user root from 183.146.30.220 port 28162 ssh2 Dec 26 18:46:59 host sshd[20456]: Connection closed by 183.146.30.220 port 28186 [preauth] Dec 26 18:46:59 host sshd[20433]: Failed password for invalid user root from 183.146.30.220 port 28152 ssh2 Dec 26 18:46:59 host sshd[20434]: Failed password for invalid user test from 183.146.30.220 port 28220 ssh2 Dec 26 18:46:59 host sshd[20436]: Failed password for invalid user support from 183.146.30.220 port 28180 ssh2 Dec 26 18:46:59 host sshd[20435]: Failed password for invalid user root from 183.146.30.220 port 28218 ssh2 Dec 26 18:46:59 host sshd[20468]: Failed password for invalid user devops from 183.146.30.220 port 28184 ssh2 Dec 26 18:46:59 host sshd[20443]: Connection closed by 183.146.30.220 port 28178 [preauth] Dec 26 18:46:59 host sshd[20440]: Connection closed by 183.146.30.220 port 28150 [preauth] Dec 26 18:52:42 host sshd[21336]: Invalid user chensong from 106.10.122.53 port 44272 Dec 26 18:52:42 host sshd[21336]: input_userauth_request: invalid user chensong [preauth] Dec 26 18:52:42 host sshd[21336]: pam_unix(sshd:auth): check pass; user unknown Dec 26 18:52:42 host sshd[21336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 26 18:52:44 host sshd[21336]: Failed password for invalid user chensong from 106.10.122.53 port 44272 ssh2 Dec 26 18:52:44 host sshd[21336]: Connection closed by 106.10.122.53 port 44272 [preauth] Dec 26 18:54:01 host sshd[21488]: Invalid user user1 from 41.197.31.178 port 44470 Dec 26 18:54:01 host sshd[21488]: input_userauth_request: invalid user user1 [preauth] Dec 26 18:54:01 host sshd[21488]: pam_unix(sshd:auth): check pass; user unknown Dec 26 18:54:01 host sshd[21488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 26 18:54:03 host sshd[21488]: Failed password for invalid user user1 from 41.197.31.178 port 44470 ssh2 Dec 26 18:54:03 host sshd[21488]: Connection closed by 41.197.31.178 port 44470 [preauth] Dec 26 18:54:42 host sshd[21681]: Invalid user dc from 45.93.201.90 port 57598 Dec 26 18:54:42 host sshd[21681]: input_userauth_request: invalid user dc [preauth] Dec 26 18:54:42 host sshd[21681]: pam_unix(sshd:auth): check pass; user unknown Dec 26 18:54:42 host sshd[21681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 26 18:54:44 host sshd[21681]: Failed password for invalid user dc from 45.93.201.90 port 57598 ssh2 Dec 26 18:54:47 host sshd[21681]: pam_unix(sshd:auth): check pass; user unknown Dec 26 18:54:49 host sshd[21681]: Failed password for invalid user dc from 45.93.201.90 port 57598 ssh2 Dec 26 18:54:52 host sshd[21681]: pam_unix(sshd:auth): check pass; user unknown Dec 26 18:54:55 host sshd[21681]: Failed password for invalid user dc from 45.93.201.90 port 57598 ssh2 Dec 26 18:54:58 host sshd[21681]: Connection closed by 45.93.201.90 port 57598 [preauth] Dec 26 18:54:58 host sshd[21681]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 26 19:15:47 host sshd[24488]: Invalid user user1 from 162.218.126.136 port 53500 Dec 26 19:15:47 host sshd[24488]: input_userauth_request: invalid user user1 [preauth] Dec 26 19:15:47 host sshd[24488]: pam_unix(sshd:auth): check pass; user unknown Dec 26 19:15:47 host sshd[24488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 26 19:15:49 host sshd[24488]: Failed password for invalid user user1 from 162.218.126.136 port 53500 ssh2 Dec 26 19:15:50 host sshd[24488]: Connection closed by 162.218.126.136 port 53500 [preauth] Dec 26 19:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 19:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 19:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 19:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 19:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 19:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 19:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 19:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 19:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 19:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 26 19:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 19:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 19:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 26 19:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 19:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 19:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 26 19:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 19:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 19:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 26 19:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 19:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 19:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 26 19:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 19:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 19:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 26 19:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 19:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 19:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 26 19:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 19:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 19:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 26 19:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 19:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 19:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 19:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 26 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=dartsimp user-4=a2zgroup user-5=laundryboniface user-6=wwwpmcresource user-7=travelboniface user-8=ugotscom user-9=wwwrmswll user-10=wwwresourcehunte user-11=keralaholi user-12=remysagr user-13=disposeat user-14=wwwkmaorg user-15=woodpeck user-16=wwwkapin user-17=wwwtestugo user-18=shalinijames user-19=vfmassets user-20=pmcresources user-21=wwwevmhonda user-22=bonifacegroup user-23=straightcurve user-24=wwwletsstalkfood user-25=phmetals user-26=kottayamcalldriv user-27=gifterman user-28=palco123 user-29=mrsclean user-30=wwwnexidigital feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 26 19:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 26 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-3cTwt22IihVRAD4k.~ Dec 26 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-3cTwt22IihVRAD4k.~' Dec 26 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-3cTwt22IihVRAD4k.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 26 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 26 19:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 19:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 26 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 19:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 19:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 19:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 19:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 19:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 26 19:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 26 19:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 26 19:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 26 19:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 19:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 19:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 26 19:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 19:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 19:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 26 19:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 19:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 26 19:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 19:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 19:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 26 19:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 19:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 19:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 26 19:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 19:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 19:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 26 19:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 19:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 19:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 26 19:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 19:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 19:29:31 host sshd[26477]: Invalid user user from 103.13.40.2 port 54238 Dec 26 19:29:31 host sshd[26477]: input_userauth_request: invalid user user [preauth] Dec 26 19:29:31 host sshd[26477]: pam_unix(sshd:auth): check pass; user unknown Dec 26 19:29:31 host sshd[26477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 26 19:29:33 host sshd[26477]: Failed password for invalid user user from 103.13.40.2 port 54238 ssh2 Dec 26 19:29:33 host sshd[26477]: Connection closed by 103.13.40.2 port 54238 [preauth] Dec 26 20:10:14 host sshd[32533]: User root from 92.46.108.20 not allowed because not listed in AllowUsers Dec 26 20:10:14 host sshd[32533]: input_userauth_request: invalid user root [preauth] Dec 26 20:10:14 host unix_chkpwd[32537]: password check failed for user (root) Dec 26 20:10:14 host sshd[32533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 user=root Dec 26 20:10:14 host sshd[32533]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 20:10:16 host sshd[32533]: Failed password for invalid user root from 92.46.108.20 port 50824 ssh2 Dec 26 20:10:16 host sshd[32533]: Connection closed by 92.46.108.20 port 50824 [preauth] Dec 26 20:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 20:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 20:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 20:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 20:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 20:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 20:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 20:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 20:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 20:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 26 20:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 20:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 20:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 26 20:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 20:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 20:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 26 20:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 20:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 20:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 26 20:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 20:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 20:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 26 20:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 20:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 20:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 26 20:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 20:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 20:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 26 20:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 20:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 20:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 26 20:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 20:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 20:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 20:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 26 20:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 20:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 20:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwnexidigital user-2=mrsclean user-3=phmetals user-4=kottayamcalldriv user-5=palco123 user-6=gifterman user-7=straightcurve user-8=wwwletsstalkfood user-9=wwwevmhonda user-10=bonifacegroup user-11=pmcresources user-12=shalinijames user-13=wwwtestugo user-14=vfmassets user-15=woodpeck user-16=wwwkapin user-17=disposeat user-18=remysagr user-19=wwwkmaorg user-20=ugotscom user-21=keralaholi user-22=wwwresourcehunte user-23=wwwrmswll user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=a2zgroup user-28=dartsimp user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 26 20:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 26 20:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 20:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 20:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 20:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 20:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 20:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-mR3T332zfqYvXDQD.~ Dec 26 20:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 20:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 20:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-mR3T332zfqYvXDQD.~' Dec 26 20:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 20:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 20:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-mR3T332zfqYvXDQD.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 20:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 20:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 20:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 26 20:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 20:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 26 20:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 20:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 26 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 20:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 20:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 26 20:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 26 20:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 26 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 26 20:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 20:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 20:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 26 20:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 20:21:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 20:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 26 20:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 20:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 26 20:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 20:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 26 20:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 20:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 20:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 26 20:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 20:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 20:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 26 20:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 20:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 20:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 26 20:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 20:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 20:23:09 host sshd[2127]: User root from 106.10.122.53 not allowed because not listed in AllowUsers Dec 26 20:23:09 host sshd[2127]: input_userauth_request: invalid user root [preauth] Dec 26 20:23:09 host unix_chkpwd[2129]: password check failed for user (root) Dec 26 20:23:09 host sshd[2127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 user=root Dec 26 20:23:09 host sshd[2127]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 20:23:11 host sshd[2127]: Failed password for invalid user root from 106.10.122.53 port 53032 ssh2 Dec 26 20:23:11 host sshd[2127]: Connection closed by 106.10.122.53 port 53032 [preauth] Dec 26 20:28:22 host sshd[2932]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Dec 26 20:28:22 host sshd[2932]: input_userauth_request: invalid user root [preauth] Dec 26 20:28:22 host unix_chkpwd[2935]: password check failed for user (root) Dec 26 20:28:22 host sshd[2932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Dec 26 20:28:22 host sshd[2932]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 20:28:25 host sshd[2932]: Failed password for invalid user root from 162.218.126.136 port 37956 ssh2 Dec 26 20:28:25 host sshd[2932]: Connection closed by 162.218.126.136 port 37956 [preauth] Dec 26 20:28:46 host sshd[2988]: Connection reset by 68.183.4.78 port 20932 [preauth] Dec 26 20:39:12 host sshd[4267]: Invalid user dd from 45.93.201.90 port 38378 Dec 26 20:39:12 host sshd[4267]: input_userauth_request: invalid user dd [preauth] Dec 26 20:39:12 host sshd[4267]: pam_unix(sshd:auth): check pass; user unknown Dec 26 20:39:12 host sshd[4267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 26 20:39:14 host sshd[4267]: Failed password for invalid user dd from 45.93.201.90 port 38378 ssh2 Dec 26 20:39:17 host sshd[4267]: pam_unix(sshd:auth): check pass; user unknown Dec 26 20:39:20 host sshd[4267]: Failed password for invalid user dd from 45.93.201.90 port 38378 ssh2 Dec 26 20:39:23 host sshd[4267]: pam_unix(sshd:auth): check pass; user unknown Dec 26 20:39:25 host sshd[4267]: Failed password for invalid user dd from 45.93.201.90 port 38378 ssh2 Dec 26 20:39:28 host sshd[4267]: Connection closed by 45.93.201.90 port 38378 [preauth] Dec 26 20:39:28 host sshd[4267]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 26 20:43:34 host sshd[4862]: Invalid user user1 from 41.197.31.178 port 57130 Dec 26 20:43:34 host sshd[4862]: input_userauth_request: invalid user user1 [preauth] Dec 26 20:43:34 host sshd[4862]: pam_unix(sshd:auth): check pass; user unknown Dec 26 20:43:34 host sshd[4862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 26 20:43:36 host sshd[4862]: Failed password for invalid user user1 from 41.197.31.178 port 57130 ssh2 Dec 26 20:43:36 host sshd[4862]: Connection closed by 41.197.31.178 port 57130 [preauth] Dec 26 20:48:27 host sshd[5511]: Did not receive identification string from 149.129.255.172 port 43384 Dec 26 20:58:37 host sshd[7090]: Invalid user cxdz from 103.13.40.2 port 36954 Dec 26 20:58:37 host sshd[7090]: input_userauth_request: invalid user cxdz [preauth] Dec 26 20:58:37 host sshd[7090]: pam_unix(sshd:auth): check pass; user unknown Dec 26 20:58:37 host sshd[7090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 26 20:58:39 host sshd[7090]: Failed password for invalid user cxdz from 103.13.40.2 port 36954 ssh2 Dec 26 20:58:39 host sshd[7090]: Connection closed by 103.13.40.2 port 36954 [preauth] Dec 26 21:06:55 host sshd[8301]: Did not receive identification string from 212.83.8.79 port 51548 Dec 26 21:12:01 host sshd[8949]: Invalid user richard from 107.189.30.59 port 42092 Dec 26 21:12:01 host sshd[8949]: input_userauth_request: invalid user richard [preauth] Dec 26 21:12:01 host sshd[8949]: pam_unix(sshd:auth): check pass; user unknown Dec 26 21:12:01 host sshd[8949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Dec 26 21:12:03 host sshd[8949]: Failed password for invalid user richard from 107.189.30.59 port 42092 ssh2 Dec 26 21:12:03 host sshd[8949]: Connection closed by 107.189.30.59 port 42092 [preauth] Dec 26 21:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 21:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 21:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 21:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 21:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 21:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 21:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 21:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 21:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 21:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 26 21:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 21:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 21:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 26 21:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 21:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 21:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 26 21:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 21:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 21:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 26 21:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 21:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 21:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 26 21:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 21:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 21:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 26 21:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 21:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 21:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 26 21:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 21:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 21:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 26 21:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 21:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 21:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 21:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 21:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 21:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 26 21:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 21:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 21:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=dartsimp user-3=a2zgroup user-4=cochintaxi user-5=wwwkaretakers user-6=wwwrmswll user-7=wwwresourcehunte user-8=keralaholi user-9=ugotscom user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=vfmassets user-14=wwwtestugo user-15=shalinijames user-16=woodpeck user-17=wwwkapin user-18=disposeat user-19=wwwkmaorg user-20=remysagr user-21=mrsclean user-22=wwwnexidigital user-23=gifterman user-24=palco123 user-25=kottayamcalldriv user-26=phmetals user-27=wwwletsstalkfood user-28=straightcurve user-29=bonifacegroup user-30=wwwevmhonda feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 26 21:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 26 21:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 21:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 21:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 21:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 21:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 21:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-AvWXhrOBZMo6Mqfc.~ Dec 26 21:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 21:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 21:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-AvWXhrOBZMo6Mqfc.~' Dec 26 21:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 21:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 21:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-AvWXhrOBZMo6Mqfc.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 21:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 21:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 26 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 26 21:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 21:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 26 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 21:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 21:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 21:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 21:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 26 21:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 26 21:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 26 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 26 21:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 21:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 21:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 26 21:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 21:21:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 26 21:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 21:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 21:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 26 21:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 21:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 21:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 26 21:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 21:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 21:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 26 21:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 21:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 21:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 26 21:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 21:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 21:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 26 21:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 21:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 21:39:16 host sshd[12576]: User root from 45.224.235.24 not allowed because not listed in AllowUsers Dec 26 21:39:16 host sshd[12576]: input_userauth_request: invalid user root [preauth] Dec 26 21:39:16 host unix_chkpwd[12580]: password check failed for user (root) Dec 26 21:39:16 host sshd[12576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.224.235.24 user=root Dec 26 21:39:16 host sshd[12576]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 21:39:19 host sshd[12576]: Failed password for invalid user root from 45.224.235.24 port 47510 ssh2 Dec 26 21:39:19 host sshd[12576]: Received disconnect from 45.224.235.24 port 47510:11: Bye Bye [preauth] Dec 26 21:39:19 host sshd[12576]: Disconnected from 45.224.235.24 port 47510 [preauth] Dec 26 21:39:19 host sshd[12582]: User root from 157.230.83.80 not allowed because not listed in AllowUsers Dec 26 21:39:19 host sshd[12582]: input_userauth_request: invalid user root [preauth] Dec 26 21:39:19 host unix_chkpwd[12585]: password check failed for user (root) Dec 26 21:39:19 host sshd[12582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.83.80 user=root Dec 26 21:39:19 host sshd[12582]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 21:39:22 host sshd[12582]: Failed password for invalid user root from 157.230.83.80 port 60270 ssh2 Dec 26 21:39:22 host sshd[12582]: Received disconnect from 157.230.83.80 port 60270:11: Bye Bye [preauth] Dec 26 21:39:22 host sshd[12582]: Disconnected from 157.230.83.80 port 60270 [preauth] Dec 26 21:39:44 host sshd[12630]: User root from 142.93.210.182 not allowed because not listed in AllowUsers Dec 26 21:39:44 host sshd[12630]: input_userauth_request: invalid user root [preauth] Dec 26 21:39:44 host unix_chkpwd[12632]: password check failed for user (root) Dec 26 21:39:44 host sshd[12630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.210.182 user=root Dec 26 21:39:44 host sshd[12630]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 21:39:46 host sshd[12630]: Failed password for invalid user root from 142.93.210.182 port 47332 ssh2 Dec 26 21:39:46 host sshd[12630]: Received disconnect from 142.93.210.182 port 47332:11: Bye Bye [preauth] Dec 26 21:39:46 host sshd[12630]: Disconnected from 142.93.210.182 port 47332 [preauth] Dec 26 21:40:21 host sshd[12710]: User root from 165.154.253.219 not allowed because not listed in AllowUsers Dec 26 21:40:21 host sshd[12710]: input_userauth_request: invalid user root [preauth] Dec 26 21:40:21 host unix_chkpwd[12716]: password check failed for user (root) Dec 26 21:40:21 host sshd[12710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.154.253.219 user=root Dec 26 21:40:21 host sshd[12710]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 21:40:22 host sshd[12710]: Failed password for invalid user root from 165.154.253.219 port 38450 ssh2 Dec 26 21:40:23 host sshd[12710]: Received disconnect from 165.154.253.219 port 38450:11: Bye Bye [preauth] Dec 26 21:40:23 host sshd[12710]: Disconnected from 165.154.253.219 port 38450 [preauth] Dec 26 21:40:23 host sshd[12717]: User root from 210.56.25.101 not allowed because not listed in AllowUsers Dec 26 21:40:23 host sshd[12717]: input_userauth_request: invalid user root [preauth] Dec 26 21:40:23 host unix_chkpwd[12721]: password check failed for user (root) Dec 26 21:40:23 host sshd[12717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.56.25.101 user=root Dec 26 21:40:23 host sshd[12717]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 21:40:25 host sshd[12717]: Failed password for invalid user root from 210.56.25.101 port 36514 ssh2 Dec 26 21:40:25 host sshd[12717]: Received disconnect from 210.56.25.101 port 36514:11: Bye Bye [preauth] Dec 26 21:40:25 host sshd[12717]: Disconnected from 210.56.25.101 port 36514 [preauth] Dec 26 21:41:07 host sshd[12899]: User root from 192.227.194.176 not allowed because not listed in AllowUsers Dec 26 21:41:07 host sshd[12899]: input_userauth_request: invalid user root [preauth] Dec 26 21:41:07 host unix_chkpwd[12908]: password check failed for user (root) Dec 26 21:41:07 host sshd[12899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.194.176 user=root Dec 26 21:41:07 host sshd[12899]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 21:41:08 host sshd[12909]: Invalid user admin from 162.218.126.136 port 56792 Dec 26 21:41:08 host sshd[12909]: input_userauth_request: invalid user admin [preauth] Dec 26 21:41:08 host sshd[12909]: pam_unix(sshd:auth): check pass; user unknown Dec 26 21:41:08 host sshd[12909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 26 21:41:09 host sshd[12899]: Failed password for invalid user root from 192.227.194.176 port 39900 ssh2 Dec 26 21:41:09 host sshd[12899]: Received disconnect from 192.227.194.176 port 39900:11: Bye Bye [preauth] Dec 26 21:41:09 host sshd[12899]: Disconnected from 192.227.194.176 port 39900 [preauth] Dec 26 21:41:10 host sshd[12909]: Failed password for invalid user admin from 162.218.126.136 port 56792 ssh2 Dec 26 21:41:10 host sshd[12909]: Connection closed by 162.218.126.136 port 56792 [preauth] Dec 26 21:41:24 host sshd[12983]: User root from 50.217.175.10 not allowed because not listed in AllowUsers Dec 26 21:41:24 host sshd[12983]: input_userauth_request: invalid user root [preauth] Dec 26 21:41:24 host unix_chkpwd[12991]: password check failed for user (root) Dec 26 21:41:24 host sshd[12983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.217.175.10 user=root Dec 26 21:41:24 host sshd[12983]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 21:41:25 host sshd[12983]: Failed password for invalid user root from 50.217.175.10 port 38812 ssh2 Dec 26 21:41:25 host sshd[12983]: Received disconnect from 50.217.175.10 port 38812:11: Bye Bye [preauth] Dec 26 21:41:25 host sshd[12983]: Disconnected from 50.217.175.10 port 38812 [preauth] Dec 26 21:41:33 host sshd[13053]: User root from 99.231.187.127 not allowed because not listed in AllowUsers Dec 26 21:41:33 host sshd[13053]: input_userauth_request: invalid user root [preauth] Dec 26 21:41:33 host unix_chkpwd[13066]: password check failed for user (root) Dec 26 21:41:33 host sshd[13053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=99.231.187.127 user=root Dec 26 21:41:33 host sshd[13053]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 21:41:33 host sshd[13057]: User root from 159.203.11.165 not allowed because not listed in AllowUsers Dec 26 21:41:33 host sshd[13057]: input_userauth_request: invalid user root [preauth] Dec 26 21:41:33 host unix_chkpwd[13067]: password check failed for user (root) Dec 26 21:41:33 host sshd[13057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.11.165 user=root Dec 26 21:41:33 host sshd[13057]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 21:41:35 host sshd[13053]: Failed password for invalid user root from 99.231.187.127 port 34582 ssh2 Dec 26 21:41:35 host sshd[13057]: Failed password for invalid user root from 159.203.11.165 port 39096 ssh2 Dec 26 21:41:35 host sshd[13075]: User root from 210.187.80.132 not allowed because not listed in AllowUsers Dec 26 21:41:35 host sshd[13075]: input_userauth_request: invalid user root [preauth] Dec 26 21:41:35 host unix_chkpwd[13082]: password check failed for user (root) Dec 26 21:41:35 host sshd[13075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.187.80.132 user=root Dec 26 21:41:35 host sshd[13075]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 21:41:36 host sshd[13053]: Received disconnect from 99.231.187.127 port 34582:11: Bye Bye [preauth] Dec 26 21:41:36 host sshd[13053]: Disconnected from 99.231.187.127 port 34582 [preauth] Dec 26 21:41:36 host sshd[13057]: Received disconnect from 159.203.11.165 port 39096:11: Bye Bye [preauth] Dec 26 21:41:36 host sshd[13057]: Disconnected from 159.203.11.165 port 39096 [preauth] Dec 26 21:41:38 host sshd[13075]: Failed password for invalid user root from 210.187.80.132 port 43188 ssh2 Dec 26 21:41:38 host sshd[13075]: Received disconnect from 210.187.80.132 port 43188:11: Bye Bye [preauth] Dec 26 21:41:38 host sshd[13075]: Disconnected from 210.187.80.132 port 43188 [preauth] Dec 26 21:41:58 host sshd[13187]: User root from 90.154.125.157 not allowed because not listed in AllowUsers Dec 26 21:41:58 host sshd[13187]: input_userauth_request: invalid user root [preauth] Dec 26 21:41:58 host unix_chkpwd[13195]: password check failed for user (root) Dec 26 21:41:58 host sshd[13187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.154.125.157 user=root Dec 26 21:41:58 host sshd[13187]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 21:42:01 host sshd[13187]: Failed password for invalid user root from 90.154.125.157 port 37228 ssh2 Dec 26 21:42:01 host sshd[13187]: Received disconnect from 90.154.125.157 port 37228:11: Bye Bye [preauth] Dec 26 21:42:01 host sshd[13187]: Disconnected from 90.154.125.157 port 37228 [preauth] Dec 26 21:44:45 host sshd[14133]: User root from 125.212.233.50 not allowed because not listed in AllowUsers Dec 26 21:44:45 host sshd[14133]: input_userauth_request: invalid user root [preauth] Dec 26 21:44:45 host unix_chkpwd[14140]: password check failed for user (root) Dec 26 21:44:45 host sshd[14133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.233.50 user=root Dec 26 21:44:45 host sshd[14133]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 21:44:47 host sshd[14133]: Failed password for invalid user root from 125.212.233.50 port 58996 ssh2 Dec 26 21:44:47 host sshd[14133]: Received disconnect from 125.212.233.50 port 58996:11: Bye Bye [preauth] Dec 26 21:44:47 host sshd[14133]: Disconnected from 125.212.233.50 port 58996 [preauth] Dec 26 21:44:54 host sshd[14176]: User root from 50.217.175.10 not allowed because not listed in AllowUsers Dec 26 21:44:54 host sshd[14176]: input_userauth_request: invalid user root [preauth] Dec 26 21:44:54 host unix_chkpwd[14183]: password check failed for user (root) Dec 26 21:44:54 host sshd[14176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.217.175.10 user=root Dec 26 21:44:54 host sshd[14176]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 21:44:56 host sshd[14176]: Failed password for invalid user root from 50.217.175.10 port 59318 ssh2 Dec 26 21:45:07 host sshd[14276]: User root from 159.203.11.165 not allowed because not listed in AllowUsers Dec 26 21:45:07 host sshd[14276]: input_userauth_request: invalid user root [preauth] Dec 26 21:45:07 host unix_chkpwd[14287]: password check failed for user (root) Dec 26 21:45:07 host sshd[14276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.11.165 user=root Dec 26 21:45:07 host sshd[14276]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 21:45:08 host sshd[14282]: User root from 45.224.235.24 not allowed because not listed in AllowUsers Dec 26 21:45:08 host sshd[14282]: input_userauth_request: invalid user root [preauth] Dec 26 21:45:08 host unix_chkpwd[14293]: password check failed for user (root) Dec 26 21:45:08 host sshd[14282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.224.235.24 user=root Dec 26 21:45:08 host sshd[14282]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 21:45:09 host sshd[14276]: Failed password for invalid user root from 159.203.11.165 port 57100 ssh2 Dec 26 21:45:09 host sshd[14276]: Received disconnect from 159.203.11.165 port 57100:11: Bye Bye [preauth] Dec 26 21:45:09 host sshd[14276]: Disconnected from 159.203.11.165 port 57100 [preauth] Dec 26 21:45:10 host sshd[14282]: Failed password for invalid user root from 45.224.235.24 port 51140 ssh2 Dec 26 21:45:13 host sshd[14366]: User root from 210.187.80.132 not allowed because not listed in AllowUsers Dec 26 21:45:13 host sshd[14366]: input_userauth_request: invalid user root [preauth] Dec 26 21:45:13 host unix_chkpwd[14372]: password check failed for user (root) Dec 26 21:45:13 host sshd[14366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.187.80.132 user=root Dec 26 21:45:13 host sshd[14366]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 21:45:15 host sshd[14377]: User root from 61.82.54.57 not allowed because not listed in AllowUsers Dec 26 21:45:15 host sshd[14377]: input_userauth_request: invalid user root [preauth] Dec 26 21:45:15 host unix_chkpwd[14411]: password check failed for user (root) Dec 26 21:45:15 host sshd[14377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.82.54.57 user=root Dec 26 21:45:15 host sshd[14377]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 21:45:15 host sshd[14366]: Failed password for invalid user root from 210.187.80.132 port 50184 ssh2 Dec 26 21:45:17 host sshd[14377]: Failed password for invalid user root from 61.82.54.57 port 54136 ssh2 Dec 26 21:45:17 host sshd[14377]: Received disconnect from 61.82.54.57 port 54136:11: Bye Bye [preauth] Dec 26 21:45:17 host sshd[14377]: Disconnected from 61.82.54.57 port 54136 [preauth] Dec 26 21:45:29 host sshd[14495]: User root from 157.230.83.80 not allowed because not listed in AllowUsers Dec 26 21:45:29 host sshd[14495]: input_userauth_request: invalid user root [preauth] Dec 26 21:45:29 host unix_chkpwd[14504]: password check failed for user (root) Dec 26 21:45:29 host sshd[14495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.83.80 user=root Dec 26 21:45:29 host sshd[14495]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 21:45:30 host sshd[14498]: User root from 210.56.25.101 not allowed because not listed in AllowUsers Dec 26 21:45:30 host sshd[14498]: input_userauth_request: invalid user root [preauth] Dec 26 21:45:30 host unix_chkpwd[14513]: password check failed for user (root) Dec 26 21:45:30 host sshd[14498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.56.25.101 user=root Dec 26 21:45:30 host sshd[14498]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 21:45:32 host sshd[14498]: Failed password for invalid user root from 210.56.25.101 port 33716 ssh2 Dec 26 21:45:32 host sshd[14498]: Received disconnect from 210.56.25.101 port 33716:11: Bye Bye [preauth] Dec 26 21:45:32 host sshd[14498]: Disconnected from 210.56.25.101 port 33716 [preauth] Dec 26 21:45:32 host sshd[14495]: Failed password for invalid user root from 157.230.83.80 port 33432 ssh2 Dec 26 21:45:50 host sshd[14649]: User root from 90.154.125.157 not allowed because not listed in AllowUsers Dec 26 21:45:50 host sshd[14649]: input_userauth_request: invalid user root [preauth] Dec 26 21:45:50 host unix_chkpwd[14665]: password check failed for user (root) Dec 26 21:45:50 host sshd[14649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.154.125.157 user=root Dec 26 21:45:50 host sshd[14649]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 21:45:51 host sshd[14672]: User root from 142.93.210.182 not allowed because not listed in AllowUsers Dec 26 21:45:51 host sshd[14672]: input_userauth_request: invalid user root [preauth] Dec 26 21:45:52 host unix_chkpwd[14674]: password check failed for user (root) Dec 26 21:45:52 host sshd[14672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.210.182 user=root Dec 26 21:45:52 host sshd[14672]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 21:45:52 host sshd[14649]: Failed password for invalid user root from 90.154.125.157 port 51388 ssh2 Dec 26 21:45:52 host sshd[14649]: Received disconnect from 90.154.125.157 port 51388:11: Bye Bye [preauth] Dec 26 21:45:52 host sshd[14649]: Disconnected from 90.154.125.157 port 51388 [preauth] Dec 26 21:45:52 host sshd[14667]: User root from 192.227.194.176 not allowed because not listed in AllowUsers Dec 26 21:45:52 host sshd[14667]: input_userauth_request: invalid user root [preauth] Dec 26 21:45:52 host unix_chkpwd[14678]: password check failed for user (root) Dec 26 21:45:52 host sshd[14667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.194.176 user=root Dec 26 21:45:52 host sshd[14667]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 21:45:53 host sshd[14672]: Failed password for invalid user root from 142.93.210.182 port 50732 ssh2 Dec 26 21:45:53 host sshd[14672]: Received disconnect from 142.93.210.182 port 50732:11: Bye Bye [preauth] Dec 26 21:45:53 host sshd[14672]: Disconnected from 142.93.210.182 port 50732 [preauth] Dec 26 21:45:54 host sshd[14667]: Failed password for invalid user root from 192.227.194.176 port 38910 ssh2 Dec 26 21:45:54 host sshd[14667]: Received disconnect from 192.227.194.176 port 38910:11: Bye Bye [preauth] Dec 26 21:45:54 host sshd[14667]: Disconnected from 192.227.194.176 port 38910 [preauth] Dec 26 21:46:02 host sshd[14810]: User root from 165.154.253.219 not allowed because not listed in AllowUsers Dec 26 21:46:02 host sshd[14810]: input_userauth_request: invalid user root [preauth] Dec 26 21:46:02 host unix_chkpwd[14817]: password check failed for user (root) Dec 26 21:46:02 host sshd[14810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.154.253.219 user=root Dec 26 21:46:02 host sshd[14810]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 21:46:04 host sshd[14810]: Failed password for invalid user root from 165.154.253.219 port 35510 ssh2 Dec 26 21:46:04 host sshd[14810]: Received disconnect from 165.154.253.219 port 35510:11: Bye Bye [preauth] Dec 26 21:46:04 host sshd[14810]: Disconnected from 165.154.253.219 port 35510 [preauth] Dec 26 21:46:05 host sshd[14822]: User root from 99.231.187.127 not allowed because not listed in AllowUsers Dec 26 21:46:05 host sshd[14822]: input_userauth_request: invalid user root [preauth] Dec 26 21:46:05 host unix_chkpwd[14830]: password check failed for user (root) Dec 26 21:46:05 host sshd[14822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=99.231.187.127 user=root Dec 26 21:46:05 host sshd[14822]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 21:46:07 host sshd[14822]: Failed password for invalid user root from 99.231.187.127 port 41072 ssh2 Dec 26 21:47:10 host sshd[15183]: User root from 61.82.54.57 not allowed because not listed in AllowUsers Dec 26 21:47:10 host sshd[15183]: input_userauth_request: invalid user root [preauth] Dec 26 21:47:10 host unix_chkpwd[15193]: password check failed for user (root) Dec 26 21:47:10 host sshd[15183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.82.54.57 user=root Dec 26 21:47:10 host sshd[15183]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 21:47:12 host sshd[15183]: Failed password for invalid user root from 61.82.54.57 port 53534 ssh2 Dec 26 21:47:12 host sshd[15183]: Received disconnect from 61.82.54.57 port 53534:11: Bye Bye [preauth] Dec 26 21:47:12 host sshd[15183]: Disconnected from 61.82.54.57 port 53534 [preauth] Dec 26 21:49:24 host sshd[15952]: User root from 125.212.233.50 not allowed because not listed in AllowUsers Dec 26 21:49:24 host sshd[15952]: input_userauth_request: invalid user root [preauth] Dec 26 21:49:24 host unix_chkpwd[15958]: password check failed for user (root) Dec 26 21:49:24 host sshd[15952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.233.50 user=root Dec 26 21:49:24 host sshd[15952]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 21:49:26 host sshd[15952]: Failed password for invalid user root from 125.212.233.50 port 43028 ssh2 Dec 26 21:53:03 host sshd[16700]: Invalid user dell from 106.10.122.53 port 52896 Dec 26 21:53:03 host sshd[16700]: input_userauth_request: invalid user dell [preauth] Dec 26 21:53:03 host sshd[16700]: pam_unix(sshd:auth): check pass; user unknown Dec 26 21:53:03 host sshd[16700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 26 21:53:05 host sshd[16700]: Failed password for invalid user dell from 106.10.122.53 port 52896 ssh2 Dec 26 21:53:05 host sshd[16700]: Connection closed by 106.10.122.53 port 52896 [preauth] Dec 26 22:07:39 host sshd[18648]: Did not receive identification string from 43.138.78.49 port 41056 Dec 26 22:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 22:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 22:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 22:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 22:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 22:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 22:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 22:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 22:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 22:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 26 22:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 22:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 22:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 26 22:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 22:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 22:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 26 22:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 22:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 22:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 26 22:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 22:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 22:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 26 22:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 22:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 22:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 26 22:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 22:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 22:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 26 22:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 22:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 22:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 26 22:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 22:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 26 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=shalinijames user-3=wwwtestugo user-4=vfmassets user-5=wwwkapin user-6=woodpeck user-7=disposeat user-8=wwwkmaorg user-9=remysagr user-10=wwwnexidigital user-11=mrsclean user-12=phmetals user-13=kottayamcalldriv user-14=palco123 user-15=gifterman user-16=wwwletsstalkfood user-17=straightcurve user-18=wwwevmhonda user-19=bonifacegroup user-20=laundryboniface user-21=a2zgroup user-22=dartsimp user-23=wwwkaretakers user-24=cochintaxi user-25=ugotscom user-26=wwwresourcehunte user-27=keralaholi user-28=wwwrmswll user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 26 22:21:47 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 26 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 22:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-IFUWo0iVqxiyfcK7.~ Dec 26 22:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 22:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 22:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-IFUWo0iVqxiyfcK7.~' Dec 26 22:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 22:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 22:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-IFUWo0iVqxiyfcK7.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 22:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 22:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 22:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 26 22:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 22:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 22:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 26 22:21:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 22:21:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 26 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 26 22:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 26 22:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 26 22:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 26 22:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 22:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 22:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 26 22:21:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 22:21:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 26 22:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 22:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 22:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 26 22:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 22:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 26 22:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 22:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 26 22:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 22:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 22:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 26 22:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 22:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 22:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 26 22:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 22:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 22:23:12 host sshd[21082]: User root from 80.47.114.70 not allowed because not listed in AllowUsers Dec 26 22:23:12 host sshd[21082]: input_userauth_request: invalid user root [preauth] Dec 26 22:23:12 host unix_chkpwd[21086]: password check failed for user (root) Dec 26 22:23:12 host sshd[21082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.47.114.70 user=root Dec 26 22:23:12 host sshd[21082]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 22:23:14 host sshd[21082]: Failed password for invalid user root from 80.47.114.70 port 50206 ssh2 Dec 26 22:23:14 host sshd[21082]: Received disconnect from 80.47.114.70 port 50206:11: Bye Bye [preauth] Dec 26 22:23:14 host sshd[21082]: Disconnected from 80.47.114.70 port 50206 [preauth] Dec 26 22:23:59 host sshd[21161]: Invalid user de from 45.93.201.90 port 44732 Dec 26 22:23:59 host sshd[21161]: input_userauth_request: invalid user de [preauth] Dec 26 22:23:59 host sshd[21161]: pam_unix(sshd:auth): check pass; user unknown Dec 26 22:23:59 host sshd[21161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 26 22:24:02 host sshd[21161]: Failed password for invalid user de from 45.93.201.90 port 44732 ssh2 Dec 26 22:24:05 host sshd[21161]: pam_unix(sshd:auth): check pass; user unknown Dec 26 22:24:07 host sshd[21161]: Failed password for invalid user de from 45.93.201.90 port 44732 ssh2 Dec 26 22:24:10 host sshd[21161]: pam_unix(sshd:auth): check pass; user unknown Dec 26 22:24:12 host sshd[21161]: Failed password for invalid user de from 45.93.201.90 port 44732 ssh2 Dec 26 22:24:15 host sshd[21161]: Connection closed by 45.93.201.90 port 44732 [preauth] Dec 26 22:24:15 host sshd[21161]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 26 22:26:23 host sshd[21419]: User root from 211.37.149.4 not allowed because not listed in AllowUsers Dec 26 22:26:23 host sshd[21419]: input_userauth_request: invalid user root [preauth] Dec 26 22:26:23 host unix_chkpwd[21424]: password check failed for user (root) Dec 26 22:26:23 host sshd[21419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.37.149.4 user=root Dec 26 22:26:23 host sshd[21419]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 22:26:24 host sshd[21422]: User root from 157.230.55.110 not allowed because not listed in AllowUsers Dec 26 22:26:24 host sshd[21422]: input_userauth_request: invalid user root [preauth] Dec 26 22:26:24 host unix_chkpwd[21426]: password check failed for user (root) Dec 26 22:26:24 host sshd[21422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.55.110 user=root Dec 26 22:26:24 host sshd[21422]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 22:26:25 host sshd[21419]: Failed password for invalid user root from 211.37.149.4 port 45890 ssh2 Dec 26 22:26:25 host sshd[21419]: Received disconnect from 211.37.149.4 port 45890:11: Bye Bye [preauth] Dec 26 22:26:25 host sshd[21419]: Disconnected from 211.37.149.4 port 45890 [preauth] Dec 26 22:26:26 host sshd[21422]: Failed password for invalid user root from 157.230.55.110 port 56694 ssh2 Dec 26 22:26:26 host sshd[21422]: Received disconnect from 157.230.55.110 port 56694:11: Bye Bye [preauth] Dec 26 22:26:26 host sshd[21422]: Disconnected from 157.230.55.110 port 56694 [preauth] Dec 26 22:27:01 host sshd[21495]: User root from 111.238.174.6 not allowed because not listed in AllowUsers Dec 26 22:27:01 host sshd[21495]: input_userauth_request: invalid user root [preauth] Dec 26 22:27:01 host unix_chkpwd[21498]: password check failed for user (root) Dec 26 22:27:01 host sshd[21495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.238.174.6 user=root Dec 26 22:27:01 host sshd[21495]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 22:27:02 host sshd[21511]: Invalid user admin from 103.13.40.2 port 49660 Dec 26 22:27:02 host sshd[21511]: input_userauth_request: invalid user admin [preauth] Dec 26 22:27:02 host sshd[21511]: pam_unix(sshd:auth): check pass; user unknown Dec 26 22:27:02 host sshd[21511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 26 22:27:03 host sshd[21495]: Failed password for invalid user root from 111.238.174.6 port 38656 ssh2 Dec 26 22:27:03 host sshd[21495]: Received disconnect from 111.238.174.6 port 38656:11: Bye Bye [preauth] Dec 26 22:27:03 host sshd[21495]: Disconnected from 111.238.174.6 port 38656 [preauth] Dec 26 22:27:03 host sshd[21511]: Failed password for invalid user admin from 103.13.40.2 port 49660 ssh2 Dec 26 22:27:03 host sshd[21511]: Connection closed by 103.13.40.2 port 49660 [preauth] Dec 26 22:27:35 host sshd[21577]: User root from 164.92.192.229 not allowed because not listed in AllowUsers Dec 26 22:27:35 host sshd[21577]: input_userauth_request: invalid user root [preauth] Dec 26 22:27:36 host unix_chkpwd[21580]: password check failed for user (root) Dec 26 22:27:36 host sshd[21577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.192.229 user=root Dec 26 22:27:36 host sshd[21577]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 22:27:38 host sshd[21577]: Failed password for invalid user root from 164.92.192.229 port 54224 ssh2 Dec 26 22:27:38 host sshd[21577]: Received disconnect from 164.92.192.229 port 54224:11: Bye Bye [preauth] Dec 26 22:27:38 host sshd[21577]: Disconnected from 164.92.192.229 port 54224 [preauth] Dec 26 22:28:38 host sshd[21797]: User root from 80.47.114.70 not allowed because not listed in AllowUsers Dec 26 22:28:38 host sshd[21797]: input_userauth_request: invalid user root [preauth] Dec 26 22:28:38 host unix_chkpwd[21801]: password check failed for user (root) Dec 26 22:28:38 host sshd[21797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.47.114.70 user=root Dec 26 22:28:38 host sshd[21797]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 22:28:39 host sshd[21802]: User root from 206.189.156.63 not allowed because not listed in AllowUsers Dec 26 22:28:39 host sshd[21802]: input_userauth_request: invalid user root [preauth] Dec 26 22:28:39 host unix_chkpwd[21804]: password check failed for user (root) Dec 26 22:28:39 host sshd[21802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.156.63 user=root Dec 26 22:28:39 host sshd[21802]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 22:28:40 host sshd[21797]: Failed password for invalid user root from 80.47.114.70 port 59642 ssh2 Dec 26 22:28:40 host sshd[21797]: Received disconnect from 80.47.114.70 port 59642:11: Bye Bye [preauth] Dec 26 22:28:40 host sshd[21797]: Disconnected from 80.47.114.70 port 59642 [preauth] Dec 26 22:28:41 host sshd[21806]: User root from 159.223.122.224 not allowed because not listed in AllowUsers Dec 26 22:28:41 host sshd[21806]: input_userauth_request: invalid user root [preauth] Dec 26 22:28:41 host unix_chkpwd[21809]: password check failed for user (root) Dec 26 22:28:41 host sshd[21806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.122.224 user=root Dec 26 22:28:41 host sshd[21806]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 22:28:41 host sshd[21802]: Failed password for invalid user root from 206.189.156.63 port 34558 ssh2 Dec 26 22:28:41 host sshd[21802]: Received disconnect from 206.189.156.63 port 34558:11: Bye Bye [preauth] Dec 26 22:28:41 host sshd[21802]: Disconnected from 206.189.156.63 port 34558 [preauth] Dec 26 22:28:43 host sshd[21806]: Failed password for invalid user root from 159.223.122.224 port 37100 ssh2 Dec 26 22:28:43 host sshd[21806]: Received disconnect from 159.223.122.224 port 37100:11: Bye Bye [preauth] Dec 26 22:28:43 host sshd[21806]: Disconnected from 159.223.122.224 port 37100 [preauth] Dec 26 22:30:23 host sshd[22036]: User root from 157.230.55.110 not allowed because not listed in AllowUsers Dec 26 22:30:23 host sshd[22036]: input_userauth_request: invalid user root [preauth] Dec 26 22:30:23 host unix_chkpwd[22039]: password check failed for user (root) Dec 26 22:30:23 host sshd[22036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.55.110 user=root Dec 26 22:30:23 host sshd[22036]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 22:30:26 host sshd[22036]: Failed password for invalid user root from 157.230.55.110 port 43752 ssh2 Dec 26 22:30:26 host sshd[22036]: Received disconnect from 157.230.55.110 port 43752:11: Bye Bye [preauth] Dec 26 22:30:26 host sshd[22036]: Disconnected from 157.230.55.110 port 43752 [preauth] Dec 26 22:30:42 host sshd[22110]: User root from 159.223.122.224 not allowed because not listed in AllowUsers Dec 26 22:30:42 host sshd[22110]: input_userauth_request: invalid user root [preauth] Dec 26 22:30:42 host unix_chkpwd[22113]: password check failed for user (root) Dec 26 22:30:42 host sshd[22110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.122.224 user=root Dec 26 22:30:42 host sshd[22110]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 22:30:44 host sshd[22110]: Failed password for invalid user root from 159.223.122.224 port 43446 ssh2 Dec 26 22:30:44 host sshd[22110]: Received disconnect from 159.223.122.224 port 43446:11: Bye Bye [preauth] Dec 26 22:30:44 host sshd[22110]: Disconnected from 159.223.122.224 port 43446 [preauth] Dec 26 22:30:54 host sshd[22164]: User root from 206.189.156.63 not allowed because not listed in AllowUsers Dec 26 22:30:54 host sshd[22164]: input_userauth_request: invalid user root [preauth] Dec 26 22:30:54 host unix_chkpwd[22167]: password check failed for user (root) Dec 26 22:30:54 host sshd[22164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.156.63 user=root Dec 26 22:30:54 host sshd[22164]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 22:30:56 host sshd[22164]: Failed password for invalid user root from 206.189.156.63 port 34712 ssh2 Dec 26 22:30:56 host sshd[22164]: Received disconnect from 206.189.156.63 port 34712:11: Bye Bye [preauth] Dec 26 22:30:56 host sshd[22164]: Disconnected from 206.189.156.63 port 34712 [preauth] Dec 26 22:30:59 host sshd[22202]: User root from 164.92.192.229 not allowed because not listed in AllowUsers Dec 26 22:30:59 host sshd[22202]: input_userauth_request: invalid user root [preauth] Dec 26 22:30:59 host unix_chkpwd[22208]: password check failed for user (root) Dec 26 22:30:59 host sshd[22202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.192.229 user=root Dec 26 22:30:59 host sshd[22202]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 22:31:01 host sshd[22202]: Failed password for invalid user root from 164.92.192.229 port 56328 ssh2 Dec 26 22:31:01 host sshd[22202]: Received disconnect from 164.92.192.229 port 56328:11: Bye Bye [preauth] Dec 26 22:31:01 host sshd[22202]: Disconnected from 164.92.192.229 port 56328 [preauth] Dec 26 22:31:03 host sshd[22241]: User root from 211.37.149.4 not allowed because not listed in AllowUsers Dec 26 22:31:03 host sshd[22241]: input_userauth_request: invalid user root [preauth] Dec 26 22:31:03 host unix_chkpwd[22256]: password check failed for user (root) Dec 26 22:31:03 host sshd[22241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.37.149.4 user=root Dec 26 22:31:03 host sshd[22241]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 22:31:05 host sshd[22241]: Failed password for invalid user root from 211.37.149.4 port 36750 ssh2 Dec 26 22:31:05 host sshd[22241]: Received disconnect from 211.37.149.4 port 36750:11: Bye Bye [preauth] Dec 26 22:31:05 host sshd[22241]: Disconnected from 211.37.149.4 port 36750 [preauth] Dec 26 22:32:54 host sshd[22469]: Invalid user apache from 41.197.31.178 port 45404 Dec 26 22:32:54 host sshd[22469]: input_userauth_request: invalid user apache [preauth] Dec 26 22:32:54 host sshd[22469]: pam_unix(sshd:auth): check pass; user unknown Dec 26 22:32:54 host sshd[22469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 26 22:32:56 host sshd[22469]: Failed password for invalid user apache from 41.197.31.178 port 45404 ssh2 Dec 26 22:32:57 host sshd[22469]: Connection closed by 41.197.31.178 port 45404 [preauth] Dec 26 22:33:04 host sshd[22490]: Invalid user user1 from 92.46.108.20 port 60744 Dec 26 22:33:04 host sshd[22490]: input_userauth_request: invalid user user1 [preauth] Dec 26 22:33:05 host sshd[22490]: pam_unix(sshd:auth): check pass; user unknown Dec 26 22:33:05 host sshd[22490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 26 22:33:07 host sshd[22490]: Failed password for invalid user user1 from 92.46.108.20 port 60744 ssh2 Dec 26 22:33:07 host sshd[22490]: Connection closed by 92.46.108.20 port 60744 [preauth] Dec 26 22:37:47 host sshd[23177]: User root from 65.181.73.155 not allowed because not listed in AllowUsers Dec 26 22:37:47 host sshd[23177]: input_userauth_request: invalid user root [preauth] Dec 26 22:37:47 host unix_chkpwd[23180]: password check failed for user (root) Dec 26 22:37:47 host sshd[23177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.181.73.155 user=root Dec 26 22:37:47 host sshd[23177]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 22:37:49 host sshd[23177]: Failed password for invalid user root from 65.181.73.155 port 54899 ssh2 Dec 26 22:37:49 host sshd[23177]: Received disconnect from 65.181.73.155 port 54899:11: Bye Bye [preauth] Dec 26 22:37:49 host sshd[23177]: Disconnected from 65.181.73.155 port 54899 [preauth] Dec 26 22:37:51 host sshd[23184]: Bad protocol version identification 'SSH-2.0' from 212.83.8.75 port 48326 Dec 26 22:40:44 host sshd[23615]: User root from 65.181.73.155 not allowed because not listed in AllowUsers Dec 26 22:40:44 host sshd[23615]: input_userauth_request: invalid user root [preauth] Dec 26 22:40:44 host unix_chkpwd[23621]: password check failed for user (root) Dec 26 22:40:44 host sshd[23615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.181.73.155 user=root Dec 26 22:40:44 host sshd[23615]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 22:40:46 host sshd[23615]: Failed password for invalid user root from 65.181.73.155 port 42504 ssh2 Dec 26 22:40:46 host sshd[23615]: Received disconnect from 65.181.73.155 port 42504:11: Bye Bye [preauth] Dec 26 22:40:46 host sshd[23615]: Disconnected from 65.181.73.155 port 42504 [preauth] Dec 26 22:53:32 host sshd[25281]: Invalid user user from 162.218.126.136 port 41108 Dec 26 22:53:32 host sshd[25281]: input_userauth_request: invalid user user [preauth] Dec 26 22:53:32 host sshd[25281]: pam_unix(sshd:auth): check pass; user unknown Dec 26 22:53:32 host sshd[25281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 26 22:53:34 host sshd[25281]: Failed password for invalid user user from 162.218.126.136 port 41108 ssh2 Dec 26 22:53:35 host sshd[25281]: Connection closed by 162.218.126.136 port 41108 [preauth] Dec 26 22:56:37 host sshd[25712]: Connection closed by 94.102.61.20 port 52318 [preauth] Dec 26 23:06:45 host sshd[27063]: User root from 148.72.247.54 not allowed because not listed in AllowUsers Dec 26 23:06:45 host sshd[27063]: input_userauth_request: invalid user root [preauth] Dec 26 23:06:45 host unix_chkpwd[27066]: password check failed for user (root) Dec 26 23:06:45 host sshd[27063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.247.54 user=root Dec 26 23:06:45 host sshd[27063]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 23:06:47 host sshd[27063]: Failed password for invalid user root from 148.72.247.54 port 52684 ssh2 Dec 26 23:06:47 host sshd[27063]: Received disconnect from 148.72.247.54 port 52684:11: Bye Bye [preauth] Dec 26 23:06:47 host sshd[27063]: Disconnected from 148.72.247.54 port 52684 [preauth] Dec 26 23:08:39 host sshd[27257]: User root from 137.184.1.35 not allowed because not listed in AllowUsers Dec 26 23:08:39 host sshd[27257]: input_userauth_request: invalid user root [preauth] Dec 26 23:08:39 host unix_chkpwd[27261]: password check failed for user (root) Dec 26 23:08:39 host sshd[27257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.1.35 user=root Dec 26 23:08:39 host sshd[27257]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 23:08:41 host sshd[27257]: Failed password for invalid user root from 137.184.1.35 port 48628 ssh2 Dec 26 23:08:41 host sshd[27257]: Received disconnect from 137.184.1.35 port 48628:11: Bye Bye [preauth] Dec 26 23:08:41 host sshd[27257]: Disconnected from 137.184.1.35 port 48628 [preauth] Dec 26 23:09:58 host sshd[27387]: User root from 190.128.239.54 not allowed because not listed in AllowUsers Dec 26 23:09:58 host sshd[27387]: input_userauth_request: invalid user root [preauth] Dec 26 23:09:58 host unix_chkpwd[27392]: password check failed for user (root) Dec 26 23:09:58 host sshd[27387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.239.54 user=root Dec 26 23:09:58 host sshd[27387]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 23:10:00 host sshd[27387]: Failed password for invalid user root from 190.128.239.54 port 55864 ssh2 Dec 26 23:10:01 host sshd[27387]: Received disconnect from 190.128.239.54 port 55864:11: Bye Bye [preauth] Dec 26 23:10:01 host sshd[27387]: Disconnected from 190.128.239.54 port 55864 [preauth] Dec 26 23:10:58 host sshd[27530]: User root from 189.7.129.60 not allowed because not listed in AllowUsers Dec 26 23:10:58 host sshd[27530]: input_userauth_request: invalid user root [preauth] Dec 26 23:10:58 host unix_chkpwd[27534]: password check failed for user (root) Dec 26 23:10:58 host sshd[27530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.7.129.60 user=root Dec 26 23:10:58 host sshd[27530]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 23:11:00 host sshd[27530]: Failed password for invalid user root from 189.7.129.60 port 50122 ssh2 Dec 26 23:11:00 host sshd[27530]: Received disconnect from 189.7.129.60 port 50122:11: Bye Bye [preauth] Dec 26 23:11:00 host sshd[27530]: Disconnected from 189.7.129.60 port 50122 [preauth] Dec 26 23:11:06 host sshd[27557]: User root from 192.241.157.126 not allowed because not listed in AllowUsers Dec 26 23:11:06 host sshd[27557]: input_userauth_request: invalid user root [preauth] Dec 26 23:11:06 host unix_chkpwd[27563]: password check failed for user (root) Dec 26 23:11:06 host sshd[27557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.157.126 user=root Dec 26 23:11:06 host sshd[27557]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 23:11:08 host sshd[27557]: Failed password for invalid user root from 192.241.157.126 port 48858 ssh2 Dec 26 23:11:08 host sshd[27557]: Received disconnect from 192.241.157.126 port 48858:11: Bye Bye [preauth] Dec 26 23:11:08 host sshd[27557]: Disconnected from 192.241.157.126 port 48858 [preauth] Dec 26 23:13:06 host sshd[27854]: User root from 148.72.247.54 not allowed because not listed in AllowUsers Dec 26 23:13:06 host sshd[27854]: input_userauth_request: invalid user root [preauth] Dec 26 23:13:06 host unix_chkpwd[27856]: password check failed for user (root) Dec 26 23:13:06 host sshd[27854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.247.54 user=root Dec 26 23:13:06 host sshd[27854]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 23:13:09 host sshd[27854]: Failed password for invalid user root from 148.72.247.54 port 52916 ssh2 Dec 26 23:13:24 host sshd[27944]: User root from 137.184.1.35 not allowed because not listed in AllowUsers Dec 26 23:13:24 host sshd[27944]: input_userauth_request: invalid user root [preauth] Dec 26 23:13:24 host unix_chkpwd[27948]: password check failed for user (root) Dec 26 23:13:24 host sshd[27944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.1.35 user=root Dec 26 23:13:24 host sshd[27944]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 23:13:26 host sshd[27944]: Failed password for invalid user root from 137.184.1.35 port 58766 ssh2 Dec 26 23:13:27 host sshd[27944]: Received disconnect from 137.184.1.35 port 58766:11: Bye Bye [preauth] Dec 26 23:13:27 host sshd[27944]: Disconnected from 137.184.1.35 port 58766 [preauth] Dec 26 23:13:33 host sshd[28013]: User root from 192.241.157.126 not allowed because not listed in AllowUsers Dec 26 23:13:33 host sshd[28013]: input_userauth_request: invalid user root [preauth] Dec 26 23:13:33 host unix_chkpwd[28016]: password check failed for user (root) Dec 26 23:13:33 host sshd[28013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.157.126 user=root Dec 26 23:13:33 host sshd[28013]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 23:13:35 host sshd[28013]: Failed password for invalid user root from 192.241.157.126 port 53522 ssh2 Dec 26 23:13:41 host sshd[28055]: User root from 190.128.239.54 not allowed because not listed in AllowUsers Dec 26 23:13:41 host sshd[28055]: input_userauth_request: invalid user root [preauth] Dec 26 23:13:41 host unix_chkpwd[28058]: password check failed for user (root) Dec 26 23:13:41 host sshd[28055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.239.54 user=root Dec 26 23:13:41 host sshd[28055]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 23:13:44 host sshd[28055]: Failed password for invalid user root from 190.128.239.54 port 43076 ssh2 Dec 26 23:15:01 host sshd[28221]: User root from 189.7.129.60 not allowed because not listed in AllowUsers Dec 26 23:15:01 host sshd[28221]: input_userauth_request: invalid user root [preauth] Dec 26 23:15:01 host unix_chkpwd[28226]: password check failed for user (root) Dec 26 23:15:01 host sshd[28221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.7.129.60 user=root Dec 26 23:15:01 host sshd[28221]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 23:15:03 host sshd[28221]: Failed password for invalid user root from 189.7.129.60 port 41706 ssh2 Dec 26 23:15:03 host sshd[28221]: Received disconnect from 189.7.129.60 port 41706:11: Bye Bye [preauth] Dec 26 23:15:03 host sshd[28221]: Disconnected from 189.7.129.60 port 41706 [preauth] Dec 26 23:19:04 host sshd[28797]: Did not receive identification string from 193.42.33.214 port 34248 Dec 26 23:19:18 host sshd[28818]: User root from 193.42.33.214 not allowed because not listed in AllowUsers Dec 26 23:19:18 host sshd[28818]: input_userauth_request: invalid user root [preauth] Dec 26 23:19:18 host unix_chkpwd[28821]: password check failed for user (root) Dec 26 23:19:18 host sshd[28818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.42.33.214 user=root Dec 26 23:19:18 host sshd[28818]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 23:19:19 host sshd[28818]: Failed password for invalid user root from 193.42.33.214 port 60304 ssh2 Dec 26 23:19:20 host sshd[28818]: Received disconnect from 193.42.33.214 port 60304:11: Normal Shutdown, Thank you for playing [preauth] Dec 26 23:19:20 host sshd[28818]: Disconnected from 193.42.33.214 port 60304 [preauth] Dec 26 23:19:33 host sshd[28856]: User root from 193.42.33.214 not allowed because not listed in AllowUsers Dec 26 23:19:33 host sshd[28856]: input_userauth_request: invalid user root [preauth] Dec 26 23:19:33 host unix_chkpwd[28860]: password check failed for user (root) Dec 26 23:19:33 host sshd[28856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.42.33.214 user=root Dec 26 23:19:33 host sshd[28856]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 23:19:35 host sshd[28856]: Failed password for invalid user root from 193.42.33.214 port 36952 ssh2 Dec 26 23:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 23:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 23:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 23:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 23:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 23:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 23:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 23:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 23:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 23:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 26 23:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 23:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 23:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 26 23:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 23:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 23:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 26 23:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 23:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 23:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 26 23:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 23:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 23:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 26 23:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 23:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 23:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 26 23:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 23:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 23:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 26 23:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 23:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 23:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 26 23:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 23:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 23:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 23:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 23:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 23:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 26 23:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 23:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 23:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=keralaholi user-3=wwwresourcehunte user-4=wwwrmswll user-5=ugotscom user-6=travelboniface user-7=cochintaxi user-8=wwwkaretakers user-9=laundryboniface user-10=a2zgroup user-11=dartsimp user-12=straightcurve user-13=wwwletsstalkfood user-14=bonifacegroup user-15=wwwevmhonda user-16=mrsclean user-17=wwwnexidigital user-18=palco123 user-19=gifterman user-20=kottayamcalldriv user-21=phmetals user-22=wwwkapin user-23=woodpeck user-24=wwwkmaorg user-25=disposeat user-26=remysagr user-27=pmcresources user-28=vfmassets user-29=shalinijames user-30=wwwtestugo feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 26 23:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 26 23:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 23:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 23:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 23:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 23:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 23:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-55mzkUoq2soV5KZV.~ Dec 26 23:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 23:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 23:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-55mzkUoq2soV5KZV.~' Dec 26 23:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 23:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 23:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-55mzkUoq2soV5KZV.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 26 23:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 23:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 23:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 26 23:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 23:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 26 23:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 23:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 26 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 26 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 26 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 26 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 23:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 26 23:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 26 23:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 26 23:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 26 23:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 26 23:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 26 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 26 23:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 26 23:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 26 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 26 23:21:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 26 23:21:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 26 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 26 23:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 23:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 26 23:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 23:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 26 23:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 26 23:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 26 23:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 26 23:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 23:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 23:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 26 23:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 26 23:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 26 23:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 26 23:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 26 23:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 26 23:22:37 host sshd[29457]: Invalid user nagios from 106.10.122.53 port 43212 Dec 26 23:22:37 host sshd[29457]: input_userauth_request: invalid user nagios [preauth] Dec 26 23:22:37 host sshd[29457]: pam_unix(sshd:auth): check pass; user unknown Dec 26 23:22:37 host sshd[29457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 26 23:22:39 host sshd[29457]: Failed password for invalid user nagios from 106.10.122.53 port 43212 ssh2 Dec 26 23:22:39 host sshd[29457]: Connection closed by 106.10.122.53 port 43212 [preauth] Dec 26 23:48:31 host sshd[670]: User root from 159.223.89.88 not allowed because not listed in AllowUsers Dec 26 23:48:31 host sshd[670]: input_userauth_request: invalid user root [preauth] Dec 26 23:48:32 host unix_chkpwd[672]: password check failed for user (root) Dec 26 23:48:32 host sshd[670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.89.88 user=root Dec 26 23:48:32 host sshd[670]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 26 23:48:33 host sshd[670]: Failed password for invalid user root from 159.223.89.88 port 60596 ssh2 Dec 26 23:48:33 host sshd[670]: Connection closed by 159.223.89.88 port 60596 [preauth] Dec 26 23:55:29 host sshd[2072]: Invalid user user from 103.13.40.2 port 37258 Dec 26 23:55:29 host sshd[2072]: input_userauth_request: invalid user user [preauth] Dec 26 23:55:29 host sshd[2072]: pam_unix(sshd:auth): check pass; user unknown Dec 26 23:55:29 host sshd[2072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 26 23:55:31 host sshd[2072]: Failed password for invalid user user from 103.13.40.2 port 37258 ssh2 Dec 26 23:55:31 host sshd[2072]: Connection closed by 103.13.40.2 port 37258 [preauth] Dec 27 00:06:03 host sshd[3946]: Invalid user jboss from 162.218.126.136 port 47860 Dec 27 00:06:03 host sshd[3946]: input_userauth_request: invalid user jboss [preauth] Dec 27 00:06:04 host sshd[3946]: pam_unix(sshd:auth): check pass; user unknown Dec 27 00:06:04 host sshd[3946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 27 00:06:05 host sshd[3946]: Failed password for invalid user jboss from 162.218.126.136 port 47860 ssh2 Dec 27 00:06:05 host sshd[3946]: Connection closed by 162.218.126.136 port 47860 [preauth] Dec 27 00:09:03 host sshd[4399]: Invalid user df from 45.93.201.90 port 34120 Dec 27 00:09:03 host sshd[4399]: input_userauth_request: invalid user df [preauth] Dec 27 00:09:03 host sshd[4399]: pam_unix(sshd:auth): check pass; user unknown Dec 27 00:09:03 host sshd[4399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 27 00:09:05 host sshd[4399]: Failed password for invalid user df from 45.93.201.90 port 34120 ssh2 Dec 27 00:09:08 host sshd[4399]: pam_unix(sshd:auth): check pass; user unknown Dec 27 00:09:11 host sshd[4399]: Failed password for invalid user df from 45.93.201.90 port 34120 ssh2 Dec 27 00:09:14 host sshd[4399]: pam_unix(sshd:auth): check pass; user unknown Dec 27 00:09:16 host sshd[4399]: Failed password for invalid user df from 45.93.201.90 port 34120 ssh2 Dec 27 00:09:19 host sshd[4399]: Connection closed by 45.93.201.90 port 34120 [preauth] Dec 27 00:09:19 host sshd[4399]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 27 00:13:14 host sshd[4985]: User root from 139.59.121.188 not allowed because not listed in AllowUsers Dec 27 00:13:14 host sshd[4985]: input_userauth_request: invalid user root [preauth] Dec 27 00:13:14 host unix_chkpwd[4988]: password check failed for user (root) Dec 27 00:13:14 host sshd[4985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.121.188 user=root Dec 27 00:13:14 host sshd[4985]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 00:13:16 host sshd[4985]: Failed password for invalid user root from 139.59.121.188 port 48914 ssh2 Dec 27 00:13:16 host sshd[4985]: Received disconnect from 139.59.121.188 port 48914:11: Bye Bye [preauth] Dec 27 00:13:16 host sshd[4985]: Disconnected from 139.59.121.188 port 48914 [preauth] Dec 27 00:14:04 host sshd[5122]: Did not receive identification string from 45.79.172.21 port 24694 Dec 27 00:14:06 host sshd[5128]: Did not receive identification string from 45.79.172.21 port 24708 Dec 27 00:14:07 host sshd[5131]: Did not receive identification string from 45.79.172.21 port 24718 Dec 27 00:18:01 host sshd[6654]: User root from 138.197.66.68 not allowed because not listed in AllowUsers Dec 27 00:18:01 host sshd[6654]: input_userauth_request: invalid user root [preauth] Dec 27 00:18:01 host unix_chkpwd[6667]: password check failed for user (root) Dec 27 00:18:01 host sshd[6654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.66.68 user=root Dec 27 00:18:01 host sshd[6654]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 00:18:04 host sshd[6654]: Failed password for invalid user root from 138.197.66.68 port 40680 ssh2 Dec 27 00:18:04 host sshd[6654]: Received disconnect from 138.197.66.68 port 40680:11: Bye Bye [preauth] Dec 27 00:18:04 host sshd[6654]: Disconnected from 138.197.66.68 port 40680 [preauth] Dec 27 00:19:33 host sshd[6833]: User root from 138.197.66.68 not allowed because not listed in AllowUsers Dec 27 00:19:33 host sshd[6833]: input_userauth_request: invalid user root [preauth] Dec 27 00:19:33 host unix_chkpwd[6836]: password check failed for user (root) Dec 27 00:19:33 host sshd[6833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.66.68 user=root Dec 27 00:19:33 host sshd[6833]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 00:19:35 host sshd[6833]: Failed password for invalid user root from 138.197.66.68 port 56675 ssh2 Dec 27 00:19:52 host sshd[6885]: User root from 139.59.121.188 not allowed because not listed in AllowUsers Dec 27 00:19:52 host sshd[6885]: input_userauth_request: invalid user root [preauth] Dec 27 00:19:52 host unix_chkpwd[6888]: password check failed for user (root) Dec 27 00:19:52 host sshd[6885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.121.188 user=root Dec 27 00:19:52 host sshd[6885]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 00:19:54 host sshd[6885]: Failed password for invalid user root from 139.59.121.188 port 51876 ssh2 Dec 27 00:19:54 host sshd[6885]: Received disconnect from 139.59.121.188 port 51876:11: Bye Bye [preauth] Dec 27 00:19:54 host sshd[6885]: Disconnected from 139.59.121.188 port 51876 [preauth] Dec 27 00:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 00:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 00:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 00:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 00:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 00:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 00:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 00:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 00:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 00:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 27 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 27 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 27 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 27 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 27 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 27 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 27 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 27 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 00:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 00:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 00:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 27 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=dartsimp user-2=a2zgroup user-3=laundryboniface user-4=cochintaxi user-5=wwwkaretakers user-6=travelboniface user-7=ugotscom user-8=wwwrmswll user-9=wwwresourcehunte user-10=keralaholi user-11=wwwpmcresource user-12=wwwtestugo user-13=shalinijames user-14=vfmassets user-15=pmcresources user-16=disposeat user-17=wwwkmaorg user-18=remysagr user-19=woodpeck user-20=wwwkapin user-21=kottayamcalldriv user-22=phmetals user-23=gifterman user-24=palco123 user-25=mrsclean user-26=wwwnexidigital user-27=wwwevmhonda user-28=bonifacegroup user-29=wwwletsstalkfood user-30=straightcurve feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 27 00:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 27 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-uiDCpFae9xjPJbu8.~ Dec 27 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-uiDCpFae9xjPJbu8.~' Dec 27 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-uiDCpFae9xjPJbu8.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 27 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 27 00:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 00:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 00:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 00:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 00:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 00:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 00:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 00:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 27 00:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 00:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 00:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 00:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 00:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 00:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 27 00:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 27 00:21:50 host sshd[7364]: User root from 41.197.31.178 not allowed because not listed in AllowUsers Dec 27 00:21:50 host sshd[7364]: input_userauth_request: invalid user root [preauth] Dec 27 00:21:50 host unix_chkpwd[7381]: password check failed for user (root) Dec 27 00:21:50 host sshd[7364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 user=root Dec 27 00:21:50 host sshd[7364]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 00:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 27 00:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 27 00:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 00:21:53 host sshd[7364]: Failed password for invalid user root from 41.197.31.178 port 36266 ssh2 Dec 27 00:21:53 host sshd[7364]: Connection closed by 41.197.31.178 port 36266 [preauth] Dec 27 00:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 27 00:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 00:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 00:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 27 00:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 00:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 00:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 27 00:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 00:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 00:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 27 00:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 00:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 27 00:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 00:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 00:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 27 00:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 00:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 00:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 27 00:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 00:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 00:23:59 host sshd[7664]: Did not receive identification string from 149.129.220.222 port 61000 Dec 27 00:24:39 host sshd[7753]: User root from 217.17.230.180 not allowed because not listed in AllowUsers Dec 27 00:24:39 host sshd[7753]: input_userauth_request: invalid user root [preauth] Dec 27 00:24:39 host unix_chkpwd[7756]: password check failed for user (root) Dec 27 00:24:39 host sshd[7753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.17.230.180 user=root Dec 27 00:24:39 host sshd[7753]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 00:24:41 host sshd[7753]: Failed password for invalid user root from 217.17.230.180 port 39042 ssh2 Dec 27 00:24:41 host sshd[7753]: Received disconnect from 217.17.230.180 port 39042:11: Bye Bye [preauth] Dec 27 00:24:41 host sshd[7753]: Disconnected from 217.17.230.180 port 39042 [preauth] Dec 27 00:30:19 host sshd[8602]: User root from 217.17.230.180 not allowed because not listed in AllowUsers Dec 27 00:30:19 host sshd[8602]: input_userauth_request: invalid user root [preauth] Dec 27 00:30:19 host unix_chkpwd[8605]: password check failed for user (root) Dec 27 00:30:19 host sshd[8602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.17.230.180 user=root Dec 27 00:30:19 host sshd[8602]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 00:30:21 host sshd[8602]: Failed password for invalid user root from 217.17.230.180 port 46120 ssh2 Dec 27 00:52:10 host sshd[11761]: Invalid user cloud from 106.10.122.53 port 34834 Dec 27 00:52:10 host sshd[11761]: input_userauth_request: invalid user cloud [preauth] Dec 27 00:52:10 host sshd[11761]: pam_unix(sshd:auth): check pass; user unknown Dec 27 00:52:10 host sshd[11761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 27 00:52:12 host sshd[11761]: Failed password for invalid user cloud from 106.10.122.53 port 34834 ssh2 Dec 27 00:52:12 host sshd[11761]: Connection closed by 106.10.122.53 port 34834 [preauth] Dec 27 00:55:48 host sshd[12255]: Invalid user applprod from 92.46.108.20 port 35778 Dec 27 00:55:48 host sshd[12255]: input_userauth_request: invalid user applprod [preauth] Dec 27 00:55:49 host sshd[12255]: pam_unix(sshd:auth): check pass; user unknown Dec 27 00:55:49 host sshd[12255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 27 00:55:51 host sshd[12255]: Failed password for invalid user applprod from 92.46.108.20 port 35778 ssh2 Dec 27 00:55:53 host sshd[12255]: Connection closed by 92.46.108.20 port 35778 [preauth] Dec 27 01:10:49 host sshd[14252]: User root from 110.249.128.123 not allowed because not listed in AllowUsers Dec 27 01:10:49 host sshd[14252]: input_userauth_request: invalid user root [preauth] Dec 27 01:10:49 host unix_chkpwd[14255]: password check failed for user (root) Dec 27 01:10:49 host sshd[14252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.249.128.123 user=root Dec 27 01:10:49 host sshd[14252]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 01:10:50 host sshd[14252]: Failed password for invalid user root from 110.249.128.123 port 61726 ssh2 Dec 27 01:10:51 host sshd[14252]: Received disconnect from 110.249.128.123 port 61726:11: Bye Bye [preauth] Dec 27 01:10:51 host sshd[14252]: Disconnected from 110.249.128.123 port 61726 [preauth] Dec 27 01:13:11 host sshd[14489]: User root from 152.70.165.140 not allowed because not listed in AllowUsers Dec 27 01:13:11 host sshd[14489]: input_userauth_request: invalid user root [preauth] Dec 27 01:13:11 host unix_chkpwd[14493]: password check failed for user (root) Dec 27 01:13:11 host sshd[14489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.70.165.140 user=root Dec 27 01:13:11 host sshd[14489]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 01:13:13 host sshd[14489]: Failed password for invalid user root from 152.70.165.140 port 60062 ssh2 Dec 27 01:13:13 host sshd[14489]: Received disconnect from 152.70.165.140 port 60062:11: Bye Bye [preauth] Dec 27 01:13:13 host sshd[14489]: Disconnected from 152.70.165.140 port 60062 [preauth] Dec 27 01:14:06 host sshd[14590]: User root from 167.172.141.86 not allowed because not listed in AllowUsers Dec 27 01:14:06 host sshd[14590]: input_userauth_request: invalid user root [preauth] Dec 27 01:14:06 host unix_chkpwd[14598]: password check failed for user (root) Dec 27 01:14:06 host sshd[14590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.141.86 user=root Dec 27 01:14:06 host sshd[14590]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 01:14:08 host sshd[14590]: Failed password for invalid user root from 167.172.141.86 port 33102 ssh2 Dec 27 01:14:08 host sshd[14590]: Received disconnect from 167.172.141.86 port 33102:11: Bye Bye [preauth] Dec 27 01:14:08 host sshd[14590]: Disconnected from 167.172.141.86 port 33102 [preauth] Dec 27 01:15:52 host sshd[14908]: User root from 152.70.165.140 not allowed because not listed in AllowUsers Dec 27 01:15:52 host sshd[14908]: input_userauth_request: invalid user root [preauth] Dec 27 01:15:52 host unix_chkpwd[14910]: password check failed for user (root) Dec 27 01:15:52 host sshd[14908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.70.165.140 user=root Dec 27 01:15:52 host sshd[14908]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 01:15:53 host sshd[14908]: Failed password for invalid user root from 152.70.165.140 port 57864 ssh2 Dec 27 01:15:53 host sshd[14908]: Received disconnect from 152.70.165.140 port 57864:11: Bye Bye [preauth] Dec 27 01:15:53 host sshd[14908]: Disconnected from 152.70.165.140 port 57864 [preauth] Dec 27 01:16:51 host sshd[15064]: User root from 167.172.141.86 not allowed because not listed in AllowUsers Dec 27 01:16:51 host sshd[15064]: input_userauth_request: invalid user root [preauth] Dec 27 01:16:51 host unix_chkpwd[15067]: password check failed for user (root) Dec 27 01:16:51 host sshd[15064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.141.86 user=root Dec 27 01:16:51 host sshd[15064]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 01:16:52 host sshd[15064]: Failed password for invalid user root from 167.172.141.86 port 39800 ssh2 Dec 27 01:16:53 host sshd[15064]: Received disconnect from 167.172.141.86 port 39800:11: Bye Bye [preauth] Dec 27 01:16:53 host sshd[15064]: Disconnected from 167.172.141.86 port 39800 [preauth] Dec 27 01:18:29 host sshd[15255]: Invalid user zhangjie from 162.218.126.136 port 46578 Dec 27 01:18:29 host sshd[15255]: input_userauth_request: invalid user zhangjie [preauth] Dec 27 01:18:29 host sshd[15255]: pam_unix(sshd:auth): check pass; user unknown Dec 27 01:18:29 host sshd[15255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 27 01:18:32 host sshd[15255]: Failed password for invalid user zhangjie from 162.218.126.136 port 46578 ssh2 Dec 27 01:18:32 host sshd[15255]: Connection closed by 162.218.126.136 port 46578 [preauth] Dec 27 01:18:34 host sshd[15261]: User root from 205.185.126.226 not allowed because not listed in AllowUsers Dec 27 01:18:34 host sshd[15261]: input_userauth_request: invalid user root [preauth] Dec 27 01:18:34 host unix_chkpwd[15264]: password check failed for user (root) Dec 27 01:18:34 host sshd[15261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.126.226 user=root Dec 27 01:18:34 host sshd[15261]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 01:18:36 host sshd[15261]: Failed password for invalid user root from 205.185.126.226 port 46130 ssh2 Dec 27 01:18:37 host sshd[15261]: Received disconnect from 205.185.126.226 port 46130:11: Bye Bye [preauth] Dec 27 01:18:37 host sshd[15261]: Disconnected from 205.185.126.226 port 46130 [preauth] Dec 27 01:20:46 host sshd[15620]: User root from 51.83.74.104 not allowed because not listed in AllowUsers Dec 27 01:20:46 host sshd[15620]: input_userauth_request: invalid user root [preauth] Dec 27 01:20:46 host unix_chkpwd[15623]: password check failed for user (root) Dec 27 01:20:46 host sshd[15620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.74.104 user=root Dec 27 01:20:46 host sshd[15620]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 01:20:47 host sshd[15620]: Failed password for invalid user root from 51.83.74.104 port 51386 ssh2 Dec 27 01:20:47 host sshd[15620]: Received disconnect from 51.83.74.104 port 51386:11: Bye Bye [preauth] Dec 27 01:20:47 host sshd[15620]: Disconnected from 51.83.74.104 port 51386 [preauth] Dec 27 01:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 01:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 01:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 01:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 01:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 01:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 01:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 01:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 01:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 01:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 27 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 27 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 27 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 27 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 27 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 27 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 27 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 27 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 01:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 01:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 01:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 01:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 27 01:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkmaorg user-2=disposeat user-3=remysagr user-4=woodpeck user-5=wwwkapin user-6=shalinijames user-7=wwwtestugo user-8=vfmassets user-9=pmcresources user-10=wwwevmhonda user-11=bonifacegroup user-12=straightcurve user-13=wwwletsstalkfood user-14=kottayamcalldriv user-15=phmetals user-16=palco123 user-17=gifterman user-18=wwwnexidigital user-19=mrsclean user-20=wwwkaretakers user-21=cochintaxi user-22=a2zgroup user-23=dartsimp user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=ugotscom user-28=wwwresourcehunte user-29=keralaholi user-30=wwwrmswll feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 27 01:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 27 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ZrtPicZ2yor90ns1.~ Dec 27 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ZrtPicZ2yor90ns1.~' Dec 27 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ZrtPicZ2yor90ns1.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 27 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 27 01:21:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 01:21:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 01:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 01:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 01:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 27 01:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 01:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 01:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 01:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 01:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 27 01:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 27 01:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 27 01:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 27 01:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 01:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 27 01:21:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 01:21:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 27 01:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 01:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 01:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 27 01:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 01:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 01:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 27 01:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 01:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 01:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 27 01:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 01:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 27 01:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 01:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 01:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 27 01:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 01:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 01:22:42 host sshd[16034]: User root from 187.218.23.85 not allowed because not listed in AllowUsers Dec 27 01:22:42 host sshd[16034]: input_userauth_request: invalid user root [preauth] Dec 27 01:22:42 host unix_chkpwd[16038]: password check failed for user (root) Dec 27 01:22:42 host sshd[16034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.218.23.85 user=root Dec 27 01:22:42 host sshd[16034]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 01:22:43 host sshd[16034]: Failed password for invalid user root from 187.218.23.85 port 47160 ssh2 Dec 27 01:22:44 host sshd[16034]: Received disconnect from 187.218.23.85 port 47160:11: Bye Bye [preauth] Dec 27 01:22:44 host sshd[16034]: Disconnected from 187.218.23.85 port 47160 [preauth] Dec 27 01:23:49 host sshd[16152]: User root from 104.131.40.97 not allowed because not listed in AllowUsers Dec 27 01:23:49 host sshd[16152]: input_userauth_request: invalid user root [preauth] Dec 27 01:23:49 host unix_chkpwd[16157]: password check failed for user (root) Dec 27 01:23:49 host sshd[16152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.40.97 user=root Dec 27 01:23:49 host sshd[16152]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 01:23:51 host sshd[16152]: Failed password for invalid user root from 104.131.40.97 port 60526 ssh2 Dec 27 01:23:51 host sshd[16152]: Received disconnect from 104.131.40.97 port 60526:11: Bye Bye [preauth] Dec 27 01:23:51 host sshd[16152]: Disconnected from 104.131.40.97 port 60526 [preauth] Dec 27 01:24:11 host sshd[16198]: User root from 51.83.74.104 not allowed because not listed in AllowUsers Dec 27 01:24:11 host sshd[16198]: input_userauth_request: invalid user root [preauth] Dec 27 01:24:11 host unix_chkpwd[16201]: password check failed for user (root) Dec 27 01:24:11 host sshd[16198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.74.104 user=root Dec 27 01:24:11 host sshd[16198]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 01:24:13 host sshd[16198]: Failed password for invalid user root from 51.83.74.104 port 40914 ssh2 Dec 27 01:24:48 host sshd[16305]: Invalid user user from 103.13.40.2 port 36520 Dec 27 01:24:48 host sshd[16305]: input_userauth_request: invalid user user [preauth] Dec 27 01:24:48 host sshd[16305]: pam_unix(sshd:auth): check pass; user unknown Dec 27 01:24:48 host sshd[16305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 27 01:24:49 host sshd[16305]: Failed password for invalid user user from 103.13.40.2 port 36520 ssh2 Dec 27 01:24:49 host sshd[16305]: Connection closed by 103.13.40.2 port 36520 [preauth] Dec 27 01:24:54 host sshd[16312]: User root from 205.185.126.226 not allowed because not listed in AllowUsers Dec 27 01:24:54 host sshd[16312]: input_userauth_request: invalid user root [preauth] Dec 27 01:24:54 host unix_chkpwd[16315]: password check failed for user (root) Dec 27 01:24:54 host sshd[16312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.126.226 user=root Dec 27 01:24:54 host sshd[16312]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 01:24:56 host sshd[16312]: Failed password for invalid user root from 205.185.126.226 port 48808 ssh2 Dec 27 01:24:56 host sshd[16312]: Received disconnect from 205.185.126.226 port 48808:11: Bye Bye [preauth] Dec 27 01:24:56 host sshd[16312]: Disconnected from 205.185.126.226 port 48808 [preauth] Dec 27 01:25:29 host sshd[16552]: User root from 104.131.40.97 not allowed because not listed in AllowUsers Dec 27 01:25:29 host sshd[16552]: input_userauth_request: invalid user root [preauth] Dec 27 01:25:29 host unix_chkpwd[16555]: password check failed for user (root) Dec 27 01:25:29 host sshd[16552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.40.97 user=root Dec 27 01:25:29 host sshd[16552]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 01:25:31 host sshd[16552]: Failed password for invalid user root from 104.131.40.97 port 60974 ssh2 Dec 27 01:25:31 host sshd[16552]: Received disconnect from 104.131.40.97 port 60974:11: Bye Bye [preauth] Dec 27 01:25:31 host sshd[16552]: Disconnected from 104.131.40.97 port 60974 [preauth] Dec 27 01:25:34 host sshd[16590]: User root from 187.218.23.85 not allowed because not listed in AllowUsers Dec 27 01:25:34 host sshd[16590]: input_userauth_request: invalid user root [preauth] Dec 27 01:25:34 host unix_chkpwd[16594]: password check failed for user (root) Dec 27 01:25:34 host sshd[16590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.218.23.85 user=root Dec 27 01:25:34 host sshd[16590]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 01:25:36 host sshd[16590]: Failed password for invalid user root from 187.218.23.85 port 47652 ssh2 Dec 27 01:25:37 host sshd[16590]: Received disconnect from 187.218.23.85 port 47652:11: Bye Bye [preauth] Dec 27 01:25:37 host sshd[16590]: Disconnected from 187.218.23.85 port 47652 [preauth] Dec 27 01:27:03 host sshd[16790]: User root from 110.249.128.123 not allowed because not listed in AllowUsers Dec 27 01:27:03 host sshd[16790]: input_userauth_request: invalid user root [preauth] Dec 27 01:27:03 host unix_chkpwd[16808]: password check failed for user (root) Dec 27 01:27:03 host sshd[16790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.249.128.123 user=root Dec 27 01:27:03 host sshd[16790]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 01:27:05 host sshd[16790]: Failed password for invalid user root from 110.249.128.123 port 25513 ssh2 Dec 27 01:27:05 host sshd[16790]: Received disconnect from 110.249.128.123 port 25513:11: Bye Bye [preauth] Dec 27 01:27:05 host sshd[16790]: Disconnected from 110.249.128.123 port 25513 [preauth] Dec 27 01:38:15 host sshd[18337]: User root from 200.70.56.204 not allowed because not listed in AllowUsers Dec 27 01:38:15 host sshd[18337]: input_userauth_request: invalid user root [preauth] Dec 27 01:38:16 host unix_chkpwd[18344]: password check failed for user (root) Dec 27 01:38:16 host sshd[18337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.70.56.204 user=root Dec 27 01:38:16 host sshd[18337]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 01:38:17 host sshd[18337]: Failed password for invalid user root from 200.70.56.204 port 44946 ssh2 Dec 27 01:38:18 host sshd[18337]: Received disconnect from 200.70.56.204 port 44946:11: Bye Bye [preauth] Dec 27 01:38:18 host sshd[18337]: Disconnected from 200.70.56.204 port 44946 [preauth] Dec 27 01:40:26 host sshd[18601]: User root from 200.70.56.204 not allowed because not listed in AllowUsers Dec 27 01:40:26 host sshd[18601]: input_userauth_request: invalid user root [preauth] Dec 27 01:40:26 host unix_chkpwd[18627]: password check failed for user (root) Dec 27 01:40:26 host sshd[18601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.70.56.204 user=root Dec 27 01:40:26 host sshd[18601]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 01:40:27 host sshd[18601]: Failed password for invalid user root from 200.70.56.204 port 44820 ssh2 Dec 27 01:51:28 host sshd[20485]: Invalid user charles from 107.189.30.59 port 56784 Dec 27 01:51:28 host sshd[20485]: input_userauth_request: invalid user charles [preauth] Dec 27 01:51:28 host sshd[20485]: pam_unix(sshd:auth): check pass; user unknown Dec 27 01:51:28 host sshd[20485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Dec 27 01:51:30 host sshd[20485]: Failed password for invalid user charles from 107.189.30.59 port 56784 ssh2 Dec 27 01:51:31 host sshd[20485]: Connection closed by 107.189.30.59 port 56784 [preauth] Dec 27 01:53:59 host sshd[20744]: Invalid user dg from 45.93.201.90 port 35092 Dec 27 01:53:59 host sshd[20744]: input_userauth_request: invalid user dg [preauth] Dec 27 01:53:59 host sshd[20744]: pam_unix(sshd:auth): check pass; user unknown Dec 27 01:53:59 host sshd[20744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 27 01:54:01 host sshd[20744]: Failed password for invalid user dg from 45.93.201.90 port 35092 ssh2 Dec 27 01:54:04 host sshd[20744]: pam_unix(sshd:auth): check pass; user unknown Dec 27 01:54:06 host sshd[20744]: Failed password for invalid user dg from 45.93.201.90 port 35092 ssh2 Dec 27 01:54:10 host sshd[20744]: pam_unix(sshd:auth): check pass; user unknown Dec 27 01:54:12 host sshd[20744]: Failed password for invalid user dg from 45.93.201.90 port 35092 ssh2 Dec 27 01:54:16 host sshd[20744]: Connection closed by 45.93.201.90 port 35092 [preauth] Dec 27 01:54:16 host sshd[20744]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 27 01:55:43 host sshd[20947]: Connection closed by 107.170.251.5 port 36230 [preauth] Dec 27 02:11:05 host sshd[23201]: Invalid user user1 from 41.197.31.178 port 52956 Dec 27 02:11:05 host sshd[23201]: input_userauth_request: invalid user user1 [preauth] Dec 27 02:11:06 host sshd[23201]: pam_unix(sshd:auth): check pass; user unknown Dec 27 02:11:06 host sshd[23201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 27 02:11:08 host sshd[23201]: Failed password for invalid user user1 from 41.197.31.178 port 52956 ssh2 Dec 27 02:11:08 host sshd[23201]: Connection closed by 41.197.31.178 port 52956 [preauth] Dec 27 02:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 02:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 02:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 02:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 27 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 27 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 27 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 27 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 27 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 27 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 27 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 27 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 02:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 27 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=disposeat user-2=remysagr user-3=wwwkmaorg user-4=wwwkapin user-5=woodpeck user-6=vfmassets user-7=wwwtestugo user-8=shalinijames user-9=pmcresources user-10=bonifacegroup user-11=wwwevmhonda user-12=wwwletsstalkfood user-13=straightcurve user-14=gifterman user-15=palco123 user-16=phmetals user-17=kottayamcalldriv user-18=wwwnexidigital user-19=mrsclean user-20=wwwkaretakers user-21=cochintaxi user-22=dartsimp user-23=a2zgroup user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=wwwrmswll user-28=keralaholi user-29=wwwresourcehunte user-30=ugotscom feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 27 02:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 27 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-SlLVYsPdjfeqwInN.~ Dec 27 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-SlLVYsPdjfeqwInN.~' Dec 27 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-SlLVYsPdjfeqwInN.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 27 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:21:48 host sshd[25397]: Invalid user user from 106.10.122.53 port 43860 Dec 27 02:21:48 host sshd[25397]: input_userauth_request: invalid user user [preauth] Dec 27 02:21:48 host sshd[25397]: pam_unix(sshd:auth): check pass; user unknown Dec 27 02:21:48 host sshd[25397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 27 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 27 02:21:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:21:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 27 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 02:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 27 02:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 27 02:21:50 host sshd[25397]: Failed password for invalid user user from 106.10.122.53 port 43860 ssh2 Dec 27 02:21:50 host sshd[25397]: Connection closed by 106.10.122.53 port 43860 [preauth] Dec 27 02:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 27 02:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 27 02:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 02:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 02:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 27 02:21:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 02:22:00 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 27 02:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 27 02:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 27 02:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 27 02:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 27 02:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 27 02:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 02:22:17 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 02:29:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 02:29:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:29:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:29:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 02:29:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:29:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:29:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 02:29:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:29:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:29:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 27 02:29:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:29:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 02:29:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:29:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=woodpeck user-2=wwwkapin user-3=remysagr user-4=disposeat user-5=wwwkmaorg user-6=pmcresources user-7=shalinijames user-8=wwwtestugo user-9=vfmassets user-10=straightcurve user-11=wwwletsstalkfood user-12=wwwevmhonda user-13=bonifacegroup user-14=wwwnexidigital user-15=mrsclean user-16=kottayamcalldriv user-17=phmetals user-18=palco123 user-19=gifterman user-20=cochintaxi user-21=wwwkaretakers user-22=laundryboniface user-23=a2zgroup user-24=dartsimp user-25=wwwpmcresource user-26=ugotscom user-27=keralaholi user-28=wwwresourcehunte user-29=wwwrmswll user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 27 02:29:46 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 27 02:29:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:29:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwevmhonda --output=json Dec 27 02:29:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:29:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color instance info --format=json --check-updates=true Dec 27 02:29:46 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 27 02:30:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 27 02:30:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 27 02:30:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 27 02:30:01 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 27 02:30:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 27 02:30:01 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 27 02:30:18 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 27 02:30:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 27 02:30:18 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 27 02:30:18 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 27 02:30:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwevmhonda LangPHP php_get_vhost_versions --output=json Dec 27 02:30:18 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:30:19 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:30:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 package_manager_get_package_info package-0=ea-php72 --output=json Dec 27 02:30:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:30:19 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:30:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color instance login-url --skip-plugins=false --format=json Dec 27 02:30:19 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 27 02:30:20 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 27 02:30:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwletsstalkfood --output=json Dec 27 02:30:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:30:20 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:30:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color instance info --format=json --check-updates=true Dec 27 02:30:20 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 02:30:47 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 02:30:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 27 02:30:47 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 02:30:48 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 02:30:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 27 02:30:48 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 02:30:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 02:30:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 27 02:30:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 02:30:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 02:30:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood LangPHP php_get_vhost_versions --output=json Dec 27 02:30:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:30:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:30:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color instance login-url --skip-plugins=false --format=json Dec 27 02:30:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 02:30:55 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 02:30:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DomainInfo single_domain_data domain=letsstalkfood.com return_https_redirect_status=1 --output=json Dec 27 02:30:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:30:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:30:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_vhost_ssl_components --output=json Dec 27 02:30:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:30:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:30:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_ssl_vhosts --output=json Dec 27 02:30:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:30:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:30:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood Mime list_redirects --output=json Dec 27 02:30:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:30:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:30:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 27 02:30:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 02:30:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 02:30:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 27 02:30:57 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 02:30:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 02:30:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 27 02:30:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 02:31:07 host sshd[27971]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Dec 27 02:31:07 host sshd[27971]: input_userauth_request: invalid user root [preauth] Dec 27 02:31:07 host unix_chkpwd[27978]: password check failed for user (root) Dec 27 02:31:07 host sshd[27971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Dec 27 02:31:07 host sshd[27971]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 02:31:09 host sshd[27971]: Failed password for invalid user root from 162.218.126.136 port 42236 ssh2 Dec 27 02:31:09 host sshd[27971]: Connection closed by 162.218.126.136 port 42236 [preauth] Dec 27 02:31:23 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 02:31:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 27 02:31:23 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 02:31:33 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 02:31:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/wp-config.php Dec 27 02:31:33 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 02:31:33 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 02:31:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:31:33 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 02:31:33 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 02:31:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/.maintenance Dec 27 02:31:33 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 02:31:33 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 02:31:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color db-prefix get Dec 27 02:31:33 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 02:31:34 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 02:31:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DirectoryPrivacy is_directory_protected dir=/home/wwwletsstalkfood/public_html --output=json Dec 27 02:31:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:31:34 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:31:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:31:34 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 02:31:34 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 02:31:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 27 02:31:35 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 02:31:35 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 02:31:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 27 02:31:35 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 02:31:35 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 02:31:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 27 02:31:35 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 02:31:37 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 02:31:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 27 02:31:37 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 02:31:37 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 02:31:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color admin-username is-secure Dec 27 02:31:37 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 02:31:38 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 02:31:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:31:38 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 02:31:38 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 02:31:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/wp-config.php Dec 27 02:31:38 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 02:31:38 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 02:31:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/stat -c %a /home/wwwletsstalkfood/public_html/wp-config.php Dec 27 02:31:38 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 02:31:38 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 02:31:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color pingbacks is_disabled Dec 27 02:31:38 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 02:31:39 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 02:31:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:31:39 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 02:31:39 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 02:31:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color security-keys are_keys_correct Dec 27 02:31:39 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 02:31:40 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 02:31:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=mrsclean --output=json Dec 27 02:31:40 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:31:40 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:31:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/backup --no-color instance info --format=json --check-updates=true Dec 27 02:31:40 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 27 02:31:40 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 27 02:31:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean DomainInfo single_domain_data domain=mrsclean.co.in return_https_redirect_status=1 --output=json Dec 27 02:31:40 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:31:40 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:31:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean Mime list_redirects --output=json Dec 27 02:31:40 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:31:40 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:31:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/public_html/backup/wp-includes/version.php Dec 27 02:31:40 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 27 02:31:40 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 27 02:31:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/public_html/backup/wp-includes/version.php Dec 27 02:31:40 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 27 02:31:40 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 27 02:31:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 27 02:31:40 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 27 02:31:40 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 27 02:31:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean LangPHP php_get_vhost_versions --output=json Dec 27 02:31:40 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:31:41 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:31:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 27 02:31:41 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:31:41 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:31:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/blog --no-color instance info --format=json --check-updates=true Dec 27 02:31:41 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 27 02:31:41 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 27 02:31:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/public_html/blog/wp-includes/version.php Dec 27 02:31:41 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 27 02:31:41 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 27 02:31:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/public_html/blog/wp-includes/version.php Dec 27 02:31:41 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 27 02:31:41 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 27 02:31:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 27 02:31:41 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 27 02:31:41 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 27 02:31:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=shalinijames --output=json Dec 27 02:31:41 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:31:41 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:31:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color instance info --format=json --check-updates=true Dec 27 02:31:41 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 02:31:49 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 02:31:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_plugins --format=json Dec 27 02:31:49 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 02:31:49 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 02:31:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_themes --format=json Dec 27 02:31:49 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 02:31:50 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 02:31:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 27 02:31:50 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 02:31:50 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 02:31:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames LangPHP php_get_vhost_versions --output=json Dec 27 02:31:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:31:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:31:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color instance login-url --skip-plugins=false --format=json Dec 27 02:31:50 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 02:31:50 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 02:31:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DomainInfo single_domain_data domain=shalinijames.com return_https_redirect_status=1 --output=json Dec 27 02:31:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:31:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:31:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames Mime list_redirects --output=json Dec 27 02:31:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:31:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:31:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 27 02:31:51 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 02:31:52 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 02:31:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_plugins --format=json Dec 27 02:31:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 02:31:53 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 02:31:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 27 02:31:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 02:31:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 02:31:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_themes --format=json Dec 27 02:31:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 02:31:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 02:31:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/wp-config.php Dec 27 02:31:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 02:31:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 02:31:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:31:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 02:31:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 02:31:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/.maintenance Dec 27 02:31:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 02:31:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 02:31:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color db-prefix get Dec 27 02:31:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 02:31:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 02:31:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DirectoryPrivacy is_directory_protected dir=/home/shalinijames/public_html --output=json Dec 27 02:31:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:31:59 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:31:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:31:59 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 02:31:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 02:31:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 27 02:31:59 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 02:32:00 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 02:32:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 27 02:32:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 02:32:00 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 02:32:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 27 02:32:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 02:32:01 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 02:32:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 27 02:32:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 02:32:01 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 02:32:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color admin-username is-secure Dec 27 02:32:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 02:32:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 02:32:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:32:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 02:32:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 02:32:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/wp-config.php Dec 27 02:32:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 02:32:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 02:32:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/stat -c %a /home/shalinijames/public_html/wp-config.php Dec 27 02:32:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 02:32:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 02:32:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color pingbacks is_disabled Dec 27 02:32:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 02:32:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 02:32:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:32:03 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 02:32:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 02:32:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color security-keys are_keys_correct Dec 27 02:32:03 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 02:32:04 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 02:32:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwtestugo --output=json Dec 27 02:32:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:32:04 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:32:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color instance info --format=json --check-updates=true Dec 27 02:32:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_plugins --format=json Dec 27 02:32:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_themes --format=json Dec 27 02:32:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 27 02:32:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo LangPHP php_get_vhost_versions --output=json Dec 27 02:32:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:32:10 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:32:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color instance login-url --skip-plugins=false --format=json Dec 27 02:32:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DomainInfo single_domain_data domain=testugo.in return_https_redirect_status=1 --output=json Dec 27 02:32:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:32:11 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:32:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo Mime list_redirects --output=json Dec 27 02:32:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:32:11 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:32:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 27 02:32:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_plugins --format=json Dec 27 02:32:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 27 02:32:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_themes --format=json Dec 27 02:32:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/wp-config.php Dec 27 02:32:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:32:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/.maintenance Dec 27 02:32:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color db-prefix get Dec 27 02:32:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt1 --output=json Dec 27 02:32:17 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:32:17 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:32:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:32:18 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:18 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 27 02:32:18 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:19 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 27 02:32:19 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:19 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 27 02:32:19 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:19 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 27 02:32:19 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:20 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color admin-username is-secure Dec 27 02:32:20 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:20 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:32:20 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:21 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/wp-config.php Dec 27 02:32:21 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:21 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/tt1/wp-config.php Dec 27 02:32:21 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:21 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color pingbacks is_disabled Dec 27 02:32:21 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:21 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:32:21 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color security-keys are_keys_correct Dec 27 02:32:22 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color instance info --format=json --check-updates=true Dec 27 02:32:22 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:26 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_plugins --format=json Dec 27 02:32:26 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_themes --format=json Dec 27 02:32:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 27 02:32:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color instance login-url --skip-plugins=false --format=json Dec 27 02:32:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:28 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 27 02:32:28 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:28 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_plugins --format=json Dec 27 02:32:28 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:29 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 27 02:32:29 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:32 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_themes --format=json Dec 27 02:32:32 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:33 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/wp-config.php Dec 27 02:32:33 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:33 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:32:33 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:33 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/.maintenance Dec 27 02:32:33 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:33 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color db-prefix get Dec 27 02:32:33 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:34 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt --output=json Dec 27 02:32:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:32:34 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:32:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:32:34 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:34 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 27 02:32:34 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:35 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 27 02:32:35 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:35 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 27 02:32:35 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:36 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 27 02:32:36 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:36 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color admin-username is-secure Dec 27 02:32:36 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:36 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:32:36 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:37 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/wp-config.php Dec 27 02:32:37 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:37 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/tt/wp-config.php Dec 27 02:32:37 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:37 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color pingbacks is_disabled Dec 27 02:32:37 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:37 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:32:37 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:38 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color security-keys are_keys_correct Dec 27 02:32:38 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:38 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color instance info --format=json --check-updates=true Dec 27 02:32:38 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:43 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_plugins --format=json Dec 27 02:32:43 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:43 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_themes --format=json Dec 27 02:32:43 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:44 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 27 02:32:44 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:44 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color instance login-url --skip-plugins=false --format=json Dec 27 02:32:44 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:45 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 27 02:32:45 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_plugins --format=json Dec 27 02:32:46 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 27 02:32:46 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_themes --format=json Dec 27 02:32:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/wp-config.php Dec 27 02:32:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:32:51 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:51 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/.maintenance Dec 27 02:32:51 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:51 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color db-prefix get Dec 27 02:32:51 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:51 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/HYPE --output=json Dec 27 02:32:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:32:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:32:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:32:52 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:52 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 27 02:32:52 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:52 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 27 02:32:52 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:53 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 27 02:32:53 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:53 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 27 02:32:53 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:54 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color admin-username is-secure Dec 27 02:32:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:54 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:32:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:54 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/wp-config.php Dec 27 02:32:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/HYPE/wp-config.php Dec 27 02:32:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color pingbacks is_disabled Dec 27 02:32:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:32:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color security-keys are_keys_correct Dec 27 02:32:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:32:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:32:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=ugotscom --output=json Dec 27 02:32:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:32:56 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:32:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/boniface/blog --no-color instance info --format=json --check-updates=true Dec 27 02:32:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:32:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:32:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DomainInfo single_domain_data domain=ugotechnologies.com return_https_redirect_status=1 --output=json Dec 27 02:32:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:32:56 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:32:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom Mime list_redirects --output=json Dec 27 02:32:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:32:56 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:32:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/boniface/blog/wp-includes/version.php Dec 27 02:32:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:32:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:32:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/public_html/boniface/blog/wp-includes/version.php Dec 27 02:32:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:32:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:32:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 27 02:32:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:32:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:32:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom LangPHP php_get_vhost_versions --output=json Dec 27 02:32:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:32:57 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:32:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color instance info --format=json --check-updates=true Dec 27 02:32:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_plugins --format=json Dec 27 02:33:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_themes --format=json Dec 27 02:33:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 27 02:33:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color instance login-url --skip-plugins=false --format=json Dec 27 02:33:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 27 02:33:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_plugins --format=json Dec 27 02:33:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 27 02:33:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_themes --format=json Dec 27 02:33:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php Dec 27 02:33:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:33:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/.maintenance Dec 27 02:33:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color db-prefix get Dec 27 02:33:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --output=json Dec 27 02:33:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:33:13 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:33:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:33:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 27 02:33:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 27 02:33:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 27 02:33:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 27 02:33:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color admin-username is-secure Dec 27 02:33:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:33:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php Dec 27 02:33:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/stat -c %a /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php Dec 27 02:33:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color pingbacks is_disabled Dec 27 02:33:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:33:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color security-keys are_keys_correct Dec 27 02:33:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color instance info --format=json --check-updates=true Dec 27 02:33:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_plugins --format=json Dec 27 02:33:20 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_themes --format=json Dec 27 02:33:21 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 27 02:33:21 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color instance login-url --skip-plugins=false --format=json Dec 27 02:33:21 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 27 02:33:22 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_plugins --format=json Dec 27 02:33:23 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 27 02:33:23 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:25 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_themes --format=json Dec 27 02:33:25 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:25 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/wp-config.php Dec 27 02:33:25 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:25 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:33:25 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:26 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/.maintenance Dec 27 02:33:26 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:26 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color db-prefix get Dec 27 02:33:26 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:26 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/site --output=json Dec 27 02:33:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:33:26 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:33:26 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:27 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 27 02:33:27 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:27 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 27 02:33:27 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:27 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 27 02:33:28 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:28 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 27 02:33:28 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:28 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color admin-username is-secure Dec 27 02:33:28 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:29 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:33:29 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:29 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/wp-config.php Dec 27 02:33:29 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:29 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/stat -c %a /home/ugotscom/public_html/old/site/wp-config.php Dec 27 02:33:29 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:29 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color pingbacks is_disabled Dec 27 02:33:29 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:29 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:33:29 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:30 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color security-keys are_keys_correct Dec 27 02:33:30 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:33:30 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=woodpeck --output=json Dec 27 02:33:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:33:30 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/woodpeck/public_html/wp --no-color instance info --format=json --check-updates=true Dec 27 02:33:30 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 27 02:33:30 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 27 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck DomainInfo single_domain_data domain=woodpeckerindia.com return_https_redirect_status=1 --output=json Dec 27 02:33:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck Mime list_redirects --output=json Dec 27 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/public_html/wp/wp-includes/version.php Dec 27 02:33:31 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 27 02:33:31 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 27 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 27 02:33:31 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 27 02:33:31 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 27 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck LangPHP php_get_vhost_versions --output=json Dec 27 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=palco123 --output=json Dec 27 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color instance info --format=json --check-updates=true Dec 27 02:33:31 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 27 02:33:38 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 27 02:33:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 27 02:33:38 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 27 02:33:39 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 27 02:33:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 27 02:33:39 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 27 02:33:44 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 27 02:33:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 27 02:33:44 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 27 02:33:44 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 27 02:33:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 LangPHP php_get_vhost_versions --output=json Dec 27 02:33:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:33:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:33:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color instance login-url --skip-plugins=false --format=json Dec 27 02:33:45 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 27 02:33:45 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 27 02:33:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DomainInfo single_domain_data domain=panlys.com return_https_redirect_status=1 --output=json Dec 27 02:33:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:33:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:33:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 Mime list_redirects --output=json Dec 27 02:33:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:33:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:33:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 27 02:33:46 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 27 02:33:47 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 27 02:33:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 27 02:33:47 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 27 02:33:47 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 27 02:33:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 27 02:33:48 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 27 02:33:53 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 27 02:33:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 27 02:33:53 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 27 02:33:58 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 27 02:33:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/wp-config.php Dec 27 02:33:58 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 27 02:33:58 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 27 02:33:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:33:58 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 27 02:33:59 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 27 02:33:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/.maintenance Dec 27 02:33:59 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 27 02:33:59 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 27 02:33:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color db-prefix get Dec 27 02:33:59 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 27 02:33:59 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 27 02:33:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DirectoryPrivacy is_directory_protected dir=/home/palco123/public_html --output=json Dec 27 02:33:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:00 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:34:00 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 27 02:34:00 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 27 02:34:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color option get auto_update_core_major Dec 27 02:34:00 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 27 02:34:01 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 27 02:34:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 27 02:34:01 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 27 02:34:02 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 27 02:34:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 27 02:34:02 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 27 02:34:02 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 27 02:34:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color admin-username is-secure Dec 27 02:34:02 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 27 02:34:03 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 27 02:34:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:34:03 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 27 02:34:03 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 27 02:34:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/wp-config.php Dec 27 02:34:03 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 27 02:34:03 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 27 02:34:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/stat -c %a /home/palco123/public_html/wp-config.php Dec 27 02:34:03 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 27 02:34:03 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 27 02:34:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color pingbacks is_disabled Dec 27 02:34:03 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 27 02:34:04 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 27 02:34:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:34:04 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 27 02:34:04 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 27 02:34:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color security-keys are_keys_correct Dec 27 02:34:04 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 27 02:34:05 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 27 02:34:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwresourcehunte --output=json Dec 27 02:34:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:05 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color instance info --format=json --check-updates=true Dec 27 02:34:05 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 02:34:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 02:34:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_plugins --format=json Dec 27 02:34:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 02:34:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 02:34:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_themes --format=json Dec 27 02:34:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 02:34:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 02:34:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 27 02:34:12 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 02:34:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 02:34:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte LangPHP php_get_vhost_versions --output=json Dec 27 02:34:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:12 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color instance login-url --skip-plugins=false --format=json Dec 27 02:34:12 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 02:34:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 02:34:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DomainInfo single_domain_data domain=resourcehunters.com return_https_redirect_status=1 --output=json Dec 27 02:34:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:13 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte Mime list_redirects --output=json Dec 27 02:34:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:13 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 27 02:34:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 02:34:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 02:34:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_plugins --format=json Dec 27 02:34:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 02:34:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 02:34:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 27 02:34:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 02:34:18 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 02:34:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_themes --format=json Dec 27 02:34:18 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 02:34:18 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 02:34:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/wp-config.php Dec 27 02:34:19 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 02:34:19 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 02:34:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:34:19 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 02:34:19 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 02:34:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/.maintenance Dec 27 02:34:19 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 02:34:19 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 02:34:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color db-prefix get Dec 27 02:34:19 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 02:34:19 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 02:34:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DirectoryPrivacy is_directory_protected dir=/home/wwwresourcehunte/public_html --output=json Dec 27 02:34:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:19 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:34:19 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 02:34:20 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 02:34:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 27 02:34:20 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 02:34:20 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 02:34:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 27 02:34:20 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 02:34:21 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 02:34:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 27 02:34:21 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 02:34:21 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 02:34:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 27 02:34:21 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 02:34:21 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 02:34:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color admin-username is-secure Dec 27 02:34:21 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 02:34:22 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 02:34:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:34:22 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 02:34:22 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 02:34:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/wp-config.php Dec 27 02:34:22 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 02:34:22 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 02:34:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/stat -c %a /home/wwwresourcehunte/public_html/wp-config.php Dec 27 02:34:22 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 02:34:22 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 02:34:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color pingbacks is_disabled Dec 27 02:34:22 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 02:34:22 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 27 02:34:23 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 02:34:23 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color security-keys are_keys_correct Dec 27 02:34:23 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 02:34:23 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck WpToolkitNotification send_admin_auto_updates_notification available_updates_text= available_updates_list= installed_updates_text= installed_updates_list= 'failure_updates_text=Updates were not installed for the following items:<br/><br/>' 'failure_updates_list=1. Website "EVM Honda Cochin" (http://www.evmhonda.com): Failed to reset cache for the instance #1: Fatal error: Uncaught Error: Call to undefined function cardealer_is_wpml_active() in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php:1041#012Stack trace:#012#0 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-init.php(22): require_once()#012#1 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/cardealer-helper-library.php(183): Dec 27 02:34:23 host sudo: wp-toolkit : (command continued) require_once('"'"'/home/wwwevmhon...'"'"')#012#2 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(287): cdhl_include_admin_files('"'"''"'"')#012#3 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(311): WP_Hook->apply_filters(NULL, Array)#012#4 /home/wwwevmhonda/public_html/wp-includes/plugin.php(478): WP_Hook->do_action(Array)#012#5 /home/wwwevmhonda/public_html/wp-settings.php(546): do_action('"'"'init'"'"')#012#6 /usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/vendor/wp-cli/wp-cli/php/WP_CLI/Runner.php(1356): require('"'"'/home/wwwevmhon...'"'"')#012#7 /usr/local/cpanel/3rdparty/wp-toolkit/plib/ve in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php on line 1041#012Error: There has been a critical error on your website.Learn more about debugging in WordPress. There has been a critical error on your website.#012<br/><br/>2. Website Dec 27 02:34:23 host sudo: wp-toolkit : (command continued) "/home/mrsclean/public_html/backup" (http://mrsclean.co.in/backup): Failed to reset cache for the instance #5: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012<br/><br/>3. Website "/home/mrsclean/public_html/blog" (http://mrsclean.co.in/blog): Failed to reset cache for the instance #6: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012<br/><br/>4. Website "/home/ugotscom/public_html/boniface/blog" (http://ugotechnologies.com/boniface/blog): Failed to reset cache for the instance #13: Dec 27 02:34:23 host sudo: wp-toolkit : (command continued) Error: Error establishing a database connection.#012<br/><br/>5. Website "/home/woodpeck/public_html/wp" (http://woodpeckerindia.com/wp): Failed to reset cache for the instance #16: /bin/sh: line 0: cd: /home/woodpeck/public_html/wp: No such file or directory#012<br/><br/>' --output=json Dec 27 02:34:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color cli cache clear Dec 27 02:34:23 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 27 02:34:24 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 27 02:34:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color cli cache clear Dec 27 02:34:24 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 02:34:24 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 02:34:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/backup --no-color cli cache clear Dec 27 02:34:24 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 27 02:34:24 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 27 02:34:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/blog --no-color cli cache clear Dec 27 02:34:24 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 27 02:34:24 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 27 02:34:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color cli cache clear Dec 27 02:34:24 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 02:34:24 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 02:34:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color cli cache clear Dec 27 02:34:24 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:34:25 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:34:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color cli cache clear Dec 27 02:34:25 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:34:25 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:34:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color cli cache clear Dec 27 02:34:25 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:34:25 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:34:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/boniface/blog --no-color cli cache clear Dec 27 02:34:25 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:34:25 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:34:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color cli cache clear Dec 27 02:34:25 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:34:25 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:34:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color cli cache clear Dec 27 02:34:25 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:34:26 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:34:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/woodpeck/public_html/wp --no-color cli cache clear Dec 27 02:34:26 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 27 02:34:26 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 27 02:34:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color cli cache clear Dec 27 02:34:26 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 27 02:34:26 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 27 02:34:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color cli cache clear Dec 27 02:34:26 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 02:34:26 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 02:34:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 27 02:34:26 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 27 02:34:26 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 27 02:34:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 27 02:34:27 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 02:34:27 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 02:34:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 27 02:34:27 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 02:34:28 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 02:34:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 27 02:34:28 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:34:28 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:34:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 27 02:34:28 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:34:29 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:34:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 27 02:34:29 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 02:34:29 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 02:34:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 27 02:34:29 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:34:29 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:34:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 27 02:34:30 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 02:34:30 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 27 02:34:30 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 27 02:34:30 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 27 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 27 02:34:30 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c httpd -v Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 27 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/palco123/panlys.com/wp-toolkit.conf Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/palco123/panlys.com/wp-toolkit.conf Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:34:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:34:32 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:36:22 host sshd[31347]: User root from 210.209.125.142 not allowed because not listed in AllowUsers Dec 27 02:36:22 host sshd[31347]: input_userauth_request: invalid user root [preauth] Dec 27 02:36:22 host unix_chkpwd[31352]: password check failed for user (root) Dec 27 02:36:22 host sshd[31347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.209.125.142 user=root Dec 27 02:36:22 host sshd[31347]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 02:36:25 host sshd[31347]: Failed password for invalid user root from 210.209.125.142 port 43498 ssh2 Dec 27 02:36:25 host sshd[31347]: Received disconnect from 210.209.125.142 port 43498:11: Bye Bye [preauth] Dec 27 02:36:25 host sshd[31347]: Disconnected from 210.209.125.142 port 43498 [preauth] Dec 27 02:41:48 host sshd[32636]: Connection closed by 210.209.125.142 port 41412 [preauth] Dec 27 02:42:58 host sshd[472]: User root from 123.140.114.196 not allowed because not listed in AllowUsers Dec 27 02:42:58 host sshd[472]: input_userauth_request: invalid user root [preauth] Dec 27 02:42:58 host unix_chkpwd[475]: password check failed for user (root) Dec 27 02:42:58 host sshd[472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.140.114.196 user=root Dec 27 02:42:58 host sshd[472]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 02:42:59 host sshd[472]: Failed password for invalid user root from 123.140.114.196 port 50324 ssh2 Dec 27 02:43:00 host sshd[472]: Received disconnect from 123.140.114.196 port 50324:11: Bye Bye [preauth] Dec 27 02:43:00 host sshd[472]: Disconnected from 123.140.114.196 port 50324 [preauth] Dec 27 02:44:43 host sshd[944]: User root from 210.209.125.142 not allowed because not listed in AllowUsers Dec 27 02:44:43 host sshd[944]: input_userauth_request: invalid user root [preauth] Dec 27 02:44:43 host unix_chkpwd[950]: password check failed for user (root) Dec 27 02:44:43 host sshd[944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.209.125.142 user=root Dec 27 02:44:43 host sshd[944]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 02:44:45 host sshd[944]: Failed password for invalid user root from 210.209.125.142 port 42354 ssh2 Dec 27 02:44:55 host sshd[1116]: User root from 92.205.40.41 not allowed because not listed in AllowUsers Dec 27 02:44:55 host sshd[1116]: input_userauth_request: invalid user root [preauth] Dec 27 02:44:55 host unix_chkpwd[1123]: password check failed for user (root) Dec 27 02:44:55 host sshd[1116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.205.40.41 user=root Dec 27 02:44:55 host sshd[1116]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 02:44:57 host sshd[1116]: Failed password for invalid user root from 92.205.40.41 port 37964 ssh2 Dec 27 02:44:57 host sshd[1116]: Received disconnect from 92.205.40.41 port 37964:11: Bye Bye [preauth] Dec 27 02:44:57 host sshd[1116]: Disconnected from 92.205.40.41 port 37964 [preauth] Dec 27 02:45:45 host sshd[1345]: User root from 198.12.121.207 not allowed because not listed in AllowUsers Dec 27 02:45:45 host sshd[1345]: input_userauth_request: invalid user root [preauth] Dec 27 02:45:45 host unix_chkpwd[1350]: password check failed for user (root) Dec 27 02:45:45 host sshd[1345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.12.121.207 user=root Dec 27 02:45:45 host sshd[1345]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 02:45:47 host sshd[1345]: Failed password for invalid user root from 198.12.121.207 port 56062 ssh2 Dec 27 02:45:47 host sshd[1345]: Received disconnect from 198.12.121.207 port 56062:11: Bye Bye [preauth] Dec 27 02:45:47 host sshd[1345]: Disconnected from 198.12.121.207 port 56062 [preauth] Dec 27 02:45:54 host sshd[1381]: User root from 109.80.164.62 not allowed because not listed in AllowUsers Dec 27 02:45:54 host sshd[1381]: input_userauth_request: invalid user root [preauth] Dec 27 02:45:54 host unix_chkpwd[1385]: password check failed for user (root) Dec 27 02:45:54 host sshd[1381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.80.164.62 user=root Dec 27 02:45:54 host sshd[1381]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 02:45:56 host sshd[1381]: Failed password for invalid user root from 109.80.164.62 port 60787 ssh2 Dec 27 02:45:56 host sshd[1381]: Received disconnect from 109.80.164.62 port 60787:11: Bye Bye [preauth] Dec 27 02:45:56 host sshd[1381]: Disconnected from 109.80.164.62 port 60787 [preauth] Dec 27 02:47:17 host sshd[1732]: User root from 119.73.179.114 not allowed because not listed in AllowUsers Dec 27 02:47:17 host sshd[1732]: input_userauth_request: invalid user root [preauth] Dec 27 02:47:17 host unix_chkpwd[1735]: password check failed for user (root) Dec 27 02:47:17 host sshd[1732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.73.179.114 user=root Dec 27 02:47:17 host sshd[1732]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 02:47:19 host sshd[1732]: Failed password for invalid user root from 119.73.179.114 port 1380 ssh2 Dec 27 02:47:19 host sshd[1732]: Received disconnect from 119.73.179.114 port 1380:11: Bye Bye [preauth] Dec 27 02:47:19 host sshd[1732]: Disconnected from 119.73.179.114 port 1380 [preauth] Dec 27 02:47:43 host sshd[1868]: User root from 92.205.40.41 not allowed because not listed in AllowUsers Dec 27 02:47:43 host sshd[1868]: input_userauth_request: invalid user root [preauth] Dec 27 02:47:43 host unix_chkpwd[1875]: password check failed for user (root) Dec 27 02:47:43 host sshd[1868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.205.40.41 user=root Dec 27 02:47:43 host sshd[1868]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 02:47:46 host sshd[1868]: Failed password for invalid user root from 92.205.40.41 port 45848 ssh2 Dec 27 02:48:11 host sshd[2002]: User root from 123.140.114.196 not allowed because not listed in AllowUsers Dec 27 02:48:11 host sshd[2002]: input_userauth_request: invalid user root [preauth] Dec 27 02:48:11 host unix_chkpwd[2008]: password check failed for user (root) Dec 27 02:48:11 host sshd[2002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.140.114.196 user=root Dec 27 02:48:11 host sshd[2002]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 02:48:13 host sshd[2002]: Failed password for invalid user root from 123.140.114.196 port 44486 ssh2 Dec 27 02:48:13 host sshd[2002]: Received disconnect from 123.140.114.196 port 44486:11: Bye Bye [preauth] Dec 27 02:48:13 host sshd[2002]: Disconnected from 123.140.114.196 port 44486 [preauth] Dec 27 02:48:24 host sshd[2073]: User root from 109.80.164.62 not allowed because not listed in AllowUsers Dec 27 02:48:24 host sshd[2073]: input_userauth_request: invalid user root [preauth] Dec 27 02:48:24 host unix_chkpwd[2077]: password check failed for user (root) Dec 27 02:48:24 host sshd[2073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.80.164.62 user=root Dec 27 02:48:24 host sshd[2073]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 02:48:26 host sshd[2073]: Failed password for invalid user root from 109.80.164.62 port 49820 ssh2 Dec 27 02:48:49 host sshd[2211]: User root from 198.12.121.207 not allowed because not listed in AllowUsers Dec 27 02:48:49 host sshd[2211]: input_userauth_request: invalid user root [preauth] Dec 27 02:48:49 host unix_chkpwd[2216]: password check failed for user (root) Dec 27 02:48:49 host sshd[2211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.12.121.207 user=root Dec 27 02:48:49 host sshd[2211]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 02:48:52 host sshd[2211]: Failed password for invalid user root from 198.12.121.207 port 34606 ssh2 Dec 27 02:49:13 host sshd[2340]: User root from 119.73.179.114 not allowed because not listed in AllowUsers Dec 27 02:49:13 host sshd[2340]: input_userauth_request: invalid user root [preauth] Dec 27 02:49:13 host unix_chkpwd[2344]: password check failed for user (root) Dec 27 02:49:13 host sshd[2340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.73.179.114 user=root Dec 27 02:49:13 host sshd[2340]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 02:49:16 host sshd[2340]: Failed password for invalid user root from 119.73.179.114 port 36004 ssh2 Dec 27 02:51:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 02:51:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:51:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:51:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 02:51:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:51:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:51:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 02:51:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:51:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:51:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 27 02:51:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:51:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:51:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 27 02:51:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:51:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:51:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 27 02:51:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:51:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:51:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 27 02:51:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 02:51:02 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 02:53:27 host sshd[3533]: Invalid user user1 from 103.13.40.2 port 52666 Dec 27 02:53:27 host sshd[3533]: input_userauth_request: invalid user user1 [preauth] Dec 27 02:53:27 host sshd[3533]: pam_unix(sshd:auth): check pass; user unknown Dec 27 02:53:27 host sshd[3533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 27 02:53:28 host sshd[3533]: Failed password for invalid user user1 from 103.13.40.2 port 52666 ssh2 Dec 27 02:53:28 host sshd[3533]: Connection closed by 103.13.40.2 port 52666 [preauth] Dec 27 03:04:37 host sshd[6305]: User root from 43.153.17.76 not allowed because not listed in AllowUsers Dec 27 03:04:37 host sshd[6305]: input_userauth_request: invalid user root [preauth] Dec 27 03:04:37 host unix_chkpwd[6311]: password check failed for user (root) Dec 27 03:04:37 host sshd[6305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.17.76 user=root Dec 27 03:04:37 host sshd[6305]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 03:04:39 host sshd[6305]: Failed password for invalid user root from 43.153.17.76 port 38652 ssh2 Dec 27 03:04:39 host sshd[6305]: Received disconnect from 43.153.17.76 port 38652:11: Bye Bye [preauth] Dec 27 03:04:39 host sshd[6305]: Disconnected from 43.153.17.76 port 38652 [preauth] Dec 27 03:05:07 host sshd[6416]: User root from 146.190.60.90 not allowed because not listed in AllowUsers Dec 27 03:05:07 host sshd[6416]: input_userauth_request: invalid user root [preauth] Dec 27 03:05:07 host unix_chkpwd[6424]: password check failed for user (root) Dec 27 03:05:07 host sshd[6416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.60.90 user=root Dec 27 03:05:07 host sshd[6416]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 03:05:09 host sshd[6416]: Failed password for invalid user root from 146.190.60.90 port 33518 ssh2 Dec 27 03:05:10 host sshd[6416]: Received disconnect from 146.190.60.90 port 33518:11: Bye Bye [preauth] Dec 27 03:05:10 host sshd[6416]: Disconnected from 146.190.60.90 port 33518 [preauth] Dec 27 03:05:52 host sshd[6607]: User root from 103.250.10.186 not allowed because not listed in AllowUsers Dec 27 03:05:52 host sshd[6607]: input_userauth_request: invalid user root [preauth] Dec 27 03:05:52 host unix_chkpwd[6609]: password check failed for user (root) Dec 27 03:05:52 host sshd[6607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.250.10.186 user=root Dec 27 03:05:52 host sshd[6607]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 03:05:54 host sshd[6607]: Failed password for invalid user root from 103.250.10.186 port 60630 ssh2 Dec 27 03:05:54 host sshd[6607]: Received disconnect from 103.250.10.186 port 60630:11: Bye Bye [preauth] Dec 27 03:05:54 host sshd[6607]: Disconnected from 103.250.10.186 port 60630 [preauth] Dec 27 03:05:55 host sshd[6612]: User root from 213.108.200.11 not allowed because not listed in AllowUsers Dec 27 03:05:55 host sshd[6612]: input_userauth_request: invalid user root [preauth] Dec 27 03:05:55 host unix_chkpwd[6616]: password check failed for user (root) Dec 27 03:05:55 host sshd[6612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.108.200.11 user=root Dec 27 03:05:55 host sshd[6612]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 03:05:57 host sshd[6612]: Failed password for invalid user root from 213.108.200.11 port 47442 ssh2 Dec 27 03:05:58 host sshd[6612]: Received disconnect from 213.108.200.11 port 47442:11: Bye Bye [preauth] Dec 27 03:05:58 host sshd[6612]: Disconnected from 213.108.200.11 port 47442 [preauth] Dec 27 03:06:23 host sshd[6710]: User root from 103.240.110.92 not allowed because not listed in AllowUsers Dec 27 03:06:23 host sshd[6710]: input_userauth_request: invalid user root [preauth] Dec 27 03:06:23 host unix_chkpwd[6713]: password check failed for user (root) Dec 27 03:06:23 host sshd[6710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.240.110.92 user=root Dec 27 03:06:23 host sshd[6710]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 03:06:25 host sshd[6710]: Failed password for invalid user root from 103.240.110.92 port 60676 ssh2 Dec 27 03:06:25 host sshd[6710]: Received disconnect from 103.240.110.92 port 60676:11: Bye Bye [preauth] Dec 27 03:06:25 host sshd[6710]: Disconnected from 103.240.110.92 port 60676 [preauth] Dec 27 03:06:44 host sshd[6790]: User root from 69.49.230.44 not allowed because not listed in AllowUsers Dec 27 03:06:44 host sshd[6790]: input_userauth_request: invalid user root [preauth] Dec 27 03:06:44 host unix_chkpwd[6795]: password check failed for user (root) Dec 27 03:06:44 host sshd[6790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.49.230.44 user=root Dec 27 03:06:44 host sshd[6790]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 03:06:46 host sshd[6790]: Failed password for invalid user root from 69.49.230.44 port 37444 ssh2 Dec 27 03:06:46 host sshd[6790]: Received disconnect from 69.49.230.44 port 37444:11: Bye Bye [preauth] Dec 27 03:06:46 host sshd[6790]: Disconnected from 69.49.230.44 port 37444 [preauth] Dec 27 03:09:51 host sshd[7699]: User root from 213.108.200.11 not allowed because not listed in AllowUsers Dec 27 03:09:51 host sshd[7699]: input_userauth_request: invalid user root [preauth] Dec 27 03:09:51 host unix_chkpwd[7704]: password check failed for user (root) Dec 27 03:09:51 host sshd[7699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.108.200.11 user=root Dec 27 03:09:51 host sshd[7699]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 03:09:53 host sshd[7699]: Failed password for invalid user root from 213.108.200.11 port 40324 ssh2 Dec 27 03:09:53 host sshd[7699]: Received disconnect from 213.108.200.11 port 40324:11: Bye Bye [preauth] Dec 27 03:09:53 host sshd[7699]: Disconnected from 213.108.200.11 port 40324 [preauth] Dec 27 03:10:22 host sshd[7899]: User root from 69.49.230.44 not allowed because not listed in AllowUsers Dec 27 03:10:22 host sshd[7899]: input_userauth_request: invalid user root [preauth] Dec 27 03:10:22 host unix_chkpwd[7907]: password check failed for user (root) Dec 27 03:10:22 host sshd[7899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.49.230.44 user=root Dec 27 03:10:22 host sshd[7899]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 03:10:23 host sshd[7899]: Failed password for invalid user root from 69.49.230.44 port 51196 ssh2 Dec 27 03:10:23 host sshd[7899]: Received disconnect from 69.49.230.44 port 51196:11: Bye Bye [preauth] Dec 27 03:10:23 host sshd[7899]: Disconnected from 69.49.230.44 port 51196 [preauth] Dec 27 03:10:46 host sshd[8032]: User root from 103.250.10.186 not allowed because not listed in AllowUsers Dec 27 03:10:46 host sshd[8032]: input_userauth_request: invalid user root [preauth] Dec 27 03:10:46 host unix_chkpwd[8035]: password check failed for user (root) Dec 27 03:10:46 host sshd[8032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.250.10.186 user=root Dec 27 03:10:46 host sshd[8032]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 03:10:47 host sshd[8032]: Failed password for invalid user root from 103.250.10.186 port 37622 ssh2 Dec 27 03:10:48 host sshd[8032]: Received disconnect from 103.250.10.186 port 37622:11: Bye Bye [preauth] Dec 27 03:10:48 host sshd[8032]: Disconnected from 103.250.10.186 port 37622 [preauth] Dec 27 03:11:11 host sshd[8162]: User root from 103.240.110.92 not allowed because not listed in AllowUsers Dec 27 03:11:11 host sshd[8162]: input_userauth_request: invalid user root [preauth] Dec 27 03:11:11 host unix_chkpwd[8165]: password check failed for user (root) Dec 27 03:11:11 host sshd[8162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.240.110.92 user=root Dec 27 03:11:11 host sshd[8162]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 03:11:13 host sshd[8162]: Failed password for invalid user root from 103.240.110.92 port 60872 ssh2 Dec 27 03:11:13 host sshd[8162]: Received disconnect from 103.240.110.92 port 60872:11: Bye Bye [preauth] Dec 27 03:11:13 host sshd[8162]: Disconnected from 103.240.110.92 port 60872 [preauth] Dec 27 03:11:20 host sshd[8224]: User root from 146.190.60.90 not allowed because not listed in AllowUsers Dec 27 03:11:20 host sshd[8224]: input_userauth_request: invalid user root [preauth] Dec 27 03:11:20 host unix_chkpwd[8231]: password check failed for user (root) Dec 27 03:11:20 host sshd[8224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.60.90 user=root Dec 27 03:11:20 host sshd[8224]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 03:11:22 host sshd[8224]: Failed password for invalid user root from 146.190.60.90 port 37186 ssh2 Dec 27 03:11:22 host sshd[8224]: Received disconnect from 146.190.60.90 port 37186:11: Bye Bye [preauth] Dec 27 03:11:22 host sshd[8224]: Disconnected from 146.190.60.90 port 37186 [preauth] Dec 27 03:15:04 host sshd[9210]: User root from 43.153.17.76 not allowed because not listed in AllowUsers Dec 27 03:15:04 host sshd[9210]: input_userauth_request: invalid user root [preauth] Dec 27 03:15:04 host unix_chkpwd[9216]: password check failed for user (root) Dec 27 03:15:04 host sshd[9210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.17.76 user=root Dec 27 03:15:04 host sshd[9210]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 03:15:07 host sshd[9210]: Failed password for invalid user root from 43.153.17.76 port 40496 ssh2 Dec 27 03:20:09 host sshd[10556]: Invalid user zxc from 92.46.108.20 port 57798 Dec 27 03:20:09 host sshd[10556]: input_userauth_request: invalid user zxc [preauth] Dec 27 03:20:10 host sshd[10556]: pam_unix(sshd:auth): check pass; user unknown Dec 27 03:20:10 host sshd[10556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 27 03:20:12 host sshd[10556]: Failed password for invalid user zxc from 92.46.108.20 port 57798 ssh2 Dec 27 03:20:12 host sshd[10556]: Connection closed by 92.46.108.20 port 57798 [preauth] Dec 27 03:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 03:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 03:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 27 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 27 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 27 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 27 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 27 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 27 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 27 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 27 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 03:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 03:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 03:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 03:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 27 03:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 03:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 03:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=wwwrmswll user-4=wwwresourcehunte user-5=keralaholi user-6=ugotscom user-7=cochintaxi user-8=wwwkaretakers user-9=dartsimp user-10=a2zgroup user-11=laundryboniface user-12=bonifacegroup user-13=wwwevmhonda user-14=straightcurve user-15=wwwletsstalkfood user-16=gifterman user-17=palco123 user-18=kottayamcalldriv user-19=phmetals user-20=mrsclean user-21=wwwnexidigital user-22=remysagr user-23=disposeat user-24=wwwkmaorg user-25=woodpeck user-26=wwwkapin user-27=vfmassets user-28=wwwtestugo user-29=shalinijames user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 27 03:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 27 03:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 03:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 03:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 03:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 03:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 03:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-s357aWmbRWk21GbE.~ Dec 27 03:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 03:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 03:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-s357aWmbRWk21GbE.~' Dec 27 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-s357aWmbRWk21GbE.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 27 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 27 03:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 03:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 27 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 03:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 03:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 03:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 03:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 27 03:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 27 03:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 27 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 27 03:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 03:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 03:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 27 03:21:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 03:21:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 27 03:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 03:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 03:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 27 03:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 03:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 03:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 27 03:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 03:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 03:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 27 03:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 03:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 03:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 27 03:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 03:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 03:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 27 03:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 03:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 03:38:51 host sshd[15482]: Invalid user dh from 45.93.201.90 port 34588 Dec 27 03:38:51 host sshd[15482]: input_userauth_request: invalid user dh [preauth] Dec 27 03:38:51 host sshd[15482]: pam_unix(sshd:auth): check pass; user unknown Dec 27 03:38:51 host sshd[15482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 27 03:38:54 host sshd[15482]: Failed password for invalid user dh from 45.93.201.90 port 34588 ssh2 Dec 27 03:38:57 host sshd[15482]: pam_unix(sshd:auth): check pass; user unknown Dec 27 03:38:59 host sshd[15482]: Failed password for invalid user dh from 45.93.201.90 port 34588 ssh2 Dec 27 03:39:02 host sshd[15482]: pam_unix(sshd:auth): check pass; user unknown Dec 27 03:39:04 host sshd[15482]: Failed password for invalid user dh from 45.93.201.90 port 34588 ssh2 Dec 27 03:39:08 host sshd[15482]: Connection closed by 45.93.201.90 port 34588 [preauth] Dec 27 03:39:08 host sshd[15482]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 27 03:44:10 host sshd[16304]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Dec 27 03:44:10 host sshd[16304]: input_userauth_request: invalid user root [preauth] Dec 27 03:44:10 host unix_chkpwd[16307]: password check failed for user (root) Dec 27 03:44:10 host sshd[16304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Dec 27 03:44:10 host sshd[16304]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 03:44:12 host sshd[16304]: Failed password for invalid user root from 162.218.126.136 port 59432 ssh2 Dec 27 03:44:12 host sshd[16304]: Connection closed by 162.218.126.136 port 59432 [preauth] Dec 27 03:51:37 host sshd[17515]: Invalid user user1 from 106.10.122.53 port 41324 Dec 27 03:51:37 host sshd[17515]: input_userauth_request: invalid user user1 [preauth] Dec 27 03:51:37 host sshd[17515]: pam_unix(sshd:auth): check pass; user unknown Dec 27 03:51:37 host sshd[17515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 27 03:51:39 host sshd[17515]: Failed password for invalid user user1 from 106.10.122.53 port 41324 ssh2 Dec 27 03:51:39 host sshd[17515]: Connection closed by 106.10.122.53 port 41324 [preauth] Dec 27 04:00:17 host sshd[18800]: Invalid user user from 41.197.31.178 port 40970 Dec 27 04:00:17 host sshd[18800]: input_userauth_request: invalid user user [preauth] Dec 27 04:00:17 host sshd[18800]: pam_unix(sshd:auth): check pass; user unknown Dec 27 04:00:17 host sshd[18800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 27 04:00:19 host sshd[18800]: Failed password for invalid user user from 41.197.31.178 port 40970 ssh2 Dec 27 04:00:19 host sshd[18800]: Connection closed by 41.197.31.178 port 40970 [preauth] Dec 27 04:21:44 host sshd[22306]: Invalid user lizhangming from 103.13.40.2 port 35918 Dec 27 04:21:44 host sshd[22306]: input_userauth_request: invalid user lizhangming [preauth] Dec 27 04:21:44 host sshd[22306]: pam_unix(sshd:auth): check pass; user unknown Dec 27 04:21:44 host sshd[22306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 27 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 27 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 27 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 27 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 27 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 27 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 27 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 27 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 27 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 04:21:46 host sshd[22306]: Failed password for invalid user lizhangming from 103.13.40.2 port 35918 ssh2 Dec 27 04:21:46 host sshd[22306]: Connection closed by 103.13.40.2 port 35918 [preauth] Dec 27 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 04:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 27 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 04:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=wwwresourcehunte user-3=keralaholi user-4=wwwrmswll user-5=ugotscom user-6=travelboniface user-7=cochintaxi user-8=wwwkaretakers user-9=laundryboniface user-10=a2zgroup user-11=dartsimp user-12=wwwletsstalkfood user-13=straightcurve user-14=bonifacegroup user-15=wwwevmhonda user-16=mrsclean user-17=wwwnexidigital user-18=palco123 user-19=gifterman user-20=kottayamcalldriv user-21=phmetals user-22=wwwkapin user-23=woodpeck user-24=remysagr user-25=disposeat user-26=wwwkmaorg user-27=pmcresources user-28=vfmassets user-29=shalinijames user-30=wwwtestugo feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 27 04:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 27 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 04:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 04:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bR0CMHOw4qGcc9fX.~ Dec 27 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 04:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bR0CMHOw4qGcc9fX.~' Dec 27 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 04:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bR0CMHOw4qGcc9fX.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 04:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 27 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 04:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 27 04:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 04:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 04:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 04:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 04:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 04:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 04:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 04:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 04:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 04:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 04:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 04:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 27 04:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 04:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 04:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 04:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 27 04:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 27 04:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 27 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 27 04:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 04:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 27 04:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 04:21:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 04:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 27 04:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 04:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 04:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 27 04:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 04:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 04:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 27 04:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 04:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 27 04:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 04:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 04:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 27 04:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 04:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 04:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 27 04:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 04:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 04:47:16 host sshd[26376]: Did not receive identification string from 60.15.251.94 port 56688 Dec 27 04:56:47 host sshd[27772]: Did not receive identification string from 205.210.31.13 port 52861 Dec 27 04:57:11 host sshd[27815]: User tomcat from 162.218.126.136 not allowed because not listed in AllowUsers Dec 27 04:57:11 host sshd[27815]: input_userauth_request: invalid user tomcat [preauth] Dec 27 04:57:11 host unix_chkpwd[27818]: password check failed for user (tomcat) Dec 27 04:57:11 host sshd[27815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=tomcat Dec 27 04:57:11 host sshd[27815]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "tomcat" Dec 27 04:57:12 host sshd[27815]: Failed password for invalid user tomcat from 162.218.126.136 port 39226 ssh2 Dec 27 04:57:13 host sshd[27815]: Connection closed by 162.218.126.136 port 39226 [preauth] Dec 27 04:59:27 host sshd[28195]: Did not receive identification string from 139.59.29.232 port 50676 Dec 27 05:00:02 host sshd[28266]: User root from 139.59.29.232 not allowed because not listed in AllowUsers Dec 27 05:00:02 host sshd[28266]: input_userauth_request: invalid user root [preauth] Dec 27 05:00:02 host unix_chkpwd[28268]: password check failed for user (root) Dec 27 05:00:02 host sshd[28266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.29.232 user=root Dec 27 05:00:02 host sshd[28266]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:00:04 host sshd[28266]: Failed password for invalid user root from 139.59.29.232 port 51036 ssh2 Dec 27 05:00:04 host sshd[28266]: Connection closed by 139.59.29.232 port 51036 [preauth] Dec 27 05:00:35 host sshd[28339]: Invalid user admin from 139.59.29.232 port 51914 Dec 27 05:00:35 host sshd[28339]: input_userauth_request: invalid user admin [preauth] Dec 27 05:00:35 host sshd[28339]: pam_unix(sshd:auth): check pass; user unknown Dec 27 05:00:35 host sshd[28339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.29.232 Dec 27 05:00:37 host sshd[28339]: Failed password for invalid user admin from 139.59.29.232 port 51914 ssh2 Dec 27 05:00:37 host sshd[28339]: Connection closed by 139.59.29.232 port 51914 [preauth] Dec 27 05:18:40 host sshd[30891]: User root from 51.68.198.62 not allowed because not listed in AllowUsers Dec 27 05:18:40 host sshd[30891]: input_userauth_request: invalid user root [preauth] Dec 27 05:18:40 host unix_chkpwd[30894]: password check failed for user (root) Dec 27 05:18:40 host sshd[30891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.198.62 user=root Dec 27 05:18:40 host sshd[30891]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:18:42 host sshd[30891]: Failed password for invalid user root from 51.68.198.62 port 46030 ssh2 Dec 27 05:18:42 host sshd[30891]: Received disconnect from 51.68.198.62 port 46030:11: Bye Bye [preauth] Dec 27 05:18:42 host sshd[30891]: Disconnected from 51.68.198.62 port 46030 [preauth] Dec 27 05:20:18 host sshd[31109]: User root from 171.244.39.233 not allowed because not listed in AllowUsers Dec 27 05:20:18 host sshd[31109]: input_userauth_request: invalid user root [preauth] Dec 27 05:20:18 host unix_chkpwd[31112]: password check failed for user (root) Dec 27 05:20:18 host sshd[31109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.39.233 user=root Dec 27 05:20:18 host sshd[31109]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:20:20 host sshd[31109]: Failed password for invalid user root from 171.244.39.233 port 52274 ssh2 Dec 27 05:20:20 host sshd[31109]: Received disconnect from 171.244.39.233 port 52274:11: Bye Bye [preauth] Dec 27 05:20:20 host sshd[31109]: Disconnected from 171.244.39.233 port 52274 [preauth] Dec 27 05:20:25 host sshd[31158]: User root from 183.98.20.180 not allowed because not listed in AllowUsers Dec 27 05:20:25 host sshd[31158]: input_userauth_request: invalid user root [preauth] Dec 27 05:20:26 host unix_chkpwd[31196]: password check failed for user (root) Dec 27 05:20:26 host sshd[31158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.98.20.180 user=root Dec 27 05:20:26 host sshd[31158]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:20:28 host sshd[31158]: Failed password for invalid user root from 183.98.20.180 port 45746 ssh2 Dec 27 05:20:28 host sshd[31158]: Received disconnect from 183.98.20.180 port 45746:11: Bye Bye [preauth] Dec 27 05:20:28 host sshd[31158]: Disconnected from 183.98.20.180 port 45746 [preauth] Dec 27 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 27 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 27 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 27 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 27 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 27 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 27 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 27 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 27 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:21:51 host sshd[31445]: User root from 41.169.26.227 not allowed because not listed in AllowUsers Dec 27 05:21:51 host sshd[31445]: input_userauth_request: invalid user root [preauth] Dec 27 05:21:51 host unix_chkpwd[31450]: password check failed for user (root) Dec 27 05:21:51 host sshd[31445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.169.26.227 user=root Dec 27 05:21:51 host sshd[31445]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 27 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=disposeat user-2=wwwkmaorg user-3=remysagr user-4=woodpeck user-5=wwwkapin user-6=vfmassets user-7=shalinijames user-8=wwwtestugo user-9=pmcresources user-10=bonifacegroup user-11=wwwevmhonda user-12=wwwletsstalkfood user-13=straightcurve user-14=palco123 user-15=gifterman user-16=phmetals user-17=kottayamcalldriv user-18=wwwnexidigital user-19=mrsclean user-20=cochintaxi user-21=wwwkaretakers user-22=a2zgroup user-23=dartsimp user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=wwwresourcehunte user-28=keralaholi user-29=wwwrmswll user-30=ugotscom feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 27 05:21:53 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 27 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 27 05:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 05:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=evmhonda.com --output=json Dec 27 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/test -e /home/wwwevmhonda/wordpress-backups Dec 27 05:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 27 05:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 27 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && find -H /home/wwwevmhonda/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 27 05:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 27 05:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 27 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=letsstalkfood.com --output=json Dec 27 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/wordpress-backups Dec 27 05:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 05:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && find -H /home/wwwletsstalkfood/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 27 05:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 05:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=mrsclean.co.in --output=json Dec 27 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:21:53 host sshd[31445]: Failed password for invalid user root from 41.169.26.227 port 33190 ssh2 Dec 27 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Dec 27 05:21:53 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 27 05:21:53 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 27 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 27 05:21:53 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 27 05:21:53 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 27 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Dec 27 05:21:53 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 27 05:21:53 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 27 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 27 05:21:53 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 27 05:21:53 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 27 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=shalinijames.com --output=json Dec 27 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/wordpress-backups Dec 27 05:21:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 05:21:53 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 05:21:53 host sshd[31445]: Received disconnect from 41.169.26.227 port 33190:11: Bye Bye [preauth] Dec 27 05:21:53 host sshd[31445]: Disconnected from 41.169.26.227 port 33190 [preauth] Dec 27 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && find -H /home/shalinijames/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 27 05:21:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 05:21:53 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=testugo.in --output=json Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=ugotechnologies.com --output=json Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=woodpeckerindia.com --output=json Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/wordpress-backups Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 27 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && find -H /home/woodpeck/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 27 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=panlys.com --output=json Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/wordpress-backups Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 27 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && find -H /home/palco123/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 27 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=resourcehunters.com --output=json Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/wordpress-backups Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && find -H /home/wwwresourcehunte/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /var/cpanel/licenseid_credentials.json Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=disposeat ; COMMAND=/bin/cat /home/disposeat/.wp-toolkit-identifier Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session opened for user disposeat by (uid=0) Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session closed for user disposeat Dec 27 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkmaorg ; COMMAND=/bin/cat /home/wwwkmaorg/.wp-toolkit-identifier Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwkmaorg by (uid=0) Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwkmaorg Dec 27 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=remysagr ; COMMAND=/bin/cat /home/remysagr/.wp-toolkit-identifier Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session opened for user remysagr by (uid=0) Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session closed for user remysagr Dec 27 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/cat /home/woodpeck/.wp-toolkit-identifier Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 27 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkapin ; COMMAND=/bin/cat /home/wwwkapin/.wp-toolkit-identifier Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwkapin by (uid=0) Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwkapin Dec 27 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=vfmassets ; COMMAND=/bin/cat /home/vfmassets/.wp-toolkit-identifier Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session opened for user vfmassets by (uid=0) Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session closed for user vfmassets Dec 27 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/cat /home/shalinijames/.wp-toolkit-identifier Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/cat /home/wwwtestugo/.wp-toolkit-identifier Dec 27 05:21:55 host sshd[31637]: User root from 106.10.122.53 not allowed because not listed in AllowUsers Dec 27 05:21:55 host sshd[31637]: input_userauth_request: invalid user root [preauth] Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=pmcresources ; COMMAND=/bin/cat /home/pmcresources/.wp-toolkit-identifier Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session opened for user pmcresources by (uid=0) Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session closed for user pmcresources Dec 27 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=bonifacegroup ; COMMAND=/bin/cat /home/bonifacegroup/.wp-toolkit-identifier Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session opened for user bonifacegroup by (uid=0) Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session closed for user bonifacegroup Dec 27 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/cat /home/wwwevmhonda/.wp-toolkit-identifier Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 27 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/cat /home/wwwletsstalkfood/.wp-toolkit-identifier Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 05:21:55 host unix_chkpwd[31716]: password check failed for user (root) Dec 27 05:21:55 host sshd[31637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 user=root Dec 27 05:21:55 host sshd[31637]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=straightcurve ; COMMAND=/bin/cat /home/straightcurve/.wp-toolkit-identifier Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session opened for user straightcurve by (uid=0) Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session closed for user straightcurve Dec 27 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/cat /home/palco123/.wp-toolkit-identifier Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 27 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=gifterman ; COMMAND=/bin/cat /home/gifterman/.wp-toolkit-identifier Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session opened for user gifterman by (uid=0) Dec 27 05:21:55 host sudo: pam_unix(sudo:session): session closed for user gifterman Dec 27 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=phmetals ; COMMAND=/bin/cat /home/phmetals/.wp-toolkit-identifier Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session opened for user phmetals by (uid=0) Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session closed for user phmetals Dec 27 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=kottayamcalldriv ; COMMAND=/bin/cat /home/kottayamcalldriv/.wp-toolkit-identifier Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session opened for user kottayamcalldriv by (uid=0) Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session closed for user kottayamcalldriv Dec 27 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwnexidigital ; COMMAND=/bin/cat /home/wwwnexidigital/.wp-toolkit-identifier Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwnexidigital by (uid=0) Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwnexidigital Dec 27 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/.wp-toolkit-identifier Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 27 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=cochintaxi ; COMMAND=/bin/cat /home/cochintaxi/.wp-toolkit-identifier Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session opened for user cochintaxi by (uid=0) Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session closed for user cochintaxi Dec 27 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkaretakers ; COMMAND=/bin/cat /home/wwwkaretakers/.wp-toolkit-identifier Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwkaretakers by (uid=0) Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwkaretakers Dec 27 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=a2zgroup ; COMMAND=/bin/cat /home/a2zgroup/.wp-toolkit-identifier Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session opened for user a2zgroup by (uid=0) Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session closed for user a2zgroup Dec 27 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=dartsimp ; COMMAND=/bin/cat /home/dartsimp/.wp-toolkit-identifier Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session opened for user dartsimp by (uid=0) Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session closed for user dartsimp Dec 27 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=laundryboniface ; COMMAND=/bin/cat /home/laundryboniface/.wp-toolkit-identifier Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session opened for user laundryboniface by (uid=0) Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session closed for user laundryboniface Dec 27 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwpmcresource ; COMMAND=/bin/cat /home/wwwpmcresource/.wp-toolkit-identifier Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwpmcresource by (uid=0) Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwpmcresource Dec 27 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=travelboniface ; COMMAND=/bin/cat /home/travelboniface/.wp-toolkit-identifier Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session opened for user travelboniface by (uid=0) Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session closed for user travelboniface Dec 27 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/cat /home/wwwresourcehunte/.wp-toolkit-identifier Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 27 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 27 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-KgdeUSEZyfpEWIFJ.wp-toolkit-identifier Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 27 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-KgdeUSEZyfpEWIFJ.wp-toolkit-identifier Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 27 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwrmswll ; COMMAND=/bin/cat /home/wwwrmswll/.wp-toolkit-identifier Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwrmswll by (uid=0) Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwrmswll Dec 27 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 27 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 27 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-RAmJFxP569Em3tLC.wp-toolkit-identifier Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 27 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-RAmJFxP569Em3tLC.wp-toolkit-identifier Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 27 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_shared_ip --output=json Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_public_ip ip=167.71.234.10 --output=json Dec 27 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:21:57 host sshd[31637]: Failed password for invalid user root from 106.10.122.53 port 38048 ssh2 Dec 27 05:21:57 host sshd[31637]: Connection closed by 106.10.122.53 port 38048 [preauth] Dec 27 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-RadPv7AeSFBRtdhz.~ Dec 27 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-RadPv7AeSFBRtdhz.~' Dec 27 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-RadPv7AeSFBRtdhz.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 27 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 27 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 05:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 05:22:02 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 27 05:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 27 05:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 27 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 27 05:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 05:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 27 05:22:05 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 05:22:07 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 05:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 27 05:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 05:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 05:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 27 05:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 05:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 05:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 27 05:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 05:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 05:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 27 05:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 05:22:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 05:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 27 05:22:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 05:22:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 05:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 27 05:22:15 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 05:22:16 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 05:23:23 host sshd[32150]: User root from 14.160.24.21 not allowed because not listed in AllowUsers Dec 27 05:23:23 host sshd[32150]: input_userauth_request: invalid user root [preauth] Dec 27 05:23:23 host unix_chkpwd[32152]: password check failed for user (root) Dec 27 05:23:23 host sshd[32150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.160.24.21 user=root Dec 27 05:23:23 host sshd[32150]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:23:25 host sshd[32150]: Failed password for invalid user root from 14.160.24.21 port 34553 ssh2 Dec 27 05:23:25 host sshd[32150]: Received disconnect from 14.160.24.21 port 34553:11: Bye Bye [preauth] Dec 27 05:23:25 host sshd[32150]: Disconnected from 14.160.24.21 port 34553 [preauth] Dec 27 05:23:50 host sshd[32207]: User root from 51.68.198.62 not allowed because not listed in AllowUsers Dec 27 05:23:50 host sshd[32207]: input_userauth_request: invalid user root [preauth] Dec 27 05:23:50 host unix_chkpwd[32210]: password check failed for user (root) Dec 27 05:23:50 host sshd[32207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.198.62 user=root Dec 27 05:23:50 host sshd[32207]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:23:52 host sshd[32207]: Failed password for invalid user root from 51.68.198.62 port 54636 ssh2 Dec 27 05:23:52 host sshd[32207]: Received disconnect from 51.68.198.62 port 54636:11: Bye Bye [preauth] Dec 27 05:23:52 host sshd[32207]: Disconnected from 51.68.198.62 port 54636 [preauth] Dec 27 05:24:50 host sshd[32364]: Invalid user di from 45.93.201.90 port 59586 Dec 27 05:24:50 host sshd[32364]: input_userauth_request: invalid user di [preauth] Dec 27 05:24:50 host sshd[32364]: pam_unix(sshd:auth): check pass; user unknown Dec 27 05:24:50 host sshd[32364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 27 05:24:52 host sshd[32364]: Failed password for invalid user di from 45.93.201.90 port 59586 ssh2 Dec 27 05:24:55 host sshd[32364]: pam_unix(sshd:auth): check pass; user unknown Dec 27 05:24:57 host sshd[32364]: Failed password for invalid user di from 45.93.201.90 port 59586 ssh2 Dec 27 05:25:00 host sshd[32364]: pam_unix(sshd:auth): check pass; user unknown Dec 27 05:25:02 host sshd[32364]: Failed password for invalid user di from 45.93.201.90 port 59586 ssh2 Dec 27 05:25:05 host sshd[32364]: Connection closed by 45.93.201.90 port 59586 [preauth] Dec 27 05:25:05 host sshd[32364]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 27 05:25:22 host sshd[32444]: User root from 183.98.20.180 not allowed because not listed in AllowUsers Dec 27 05:25:22 host sshd[32444]: input_userauth_request: invalid user root [preauth] Dec 27 05:25:22 host unix_chkpwd[32447]: password check failed for user (root) Dec 27 05:25:22 host sshd[32444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.98.20.180 user=root Dec 27 05:25:22 host sshd[32444]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:25:24 host sshd[32444]: Failed password for invalid user root from 183.98.20.180 port 34914 ssh2 Dec 27 05:25:24 host sshd[32448]: User root from 41.169.26.227 not allowed because not listed in AllowUsers Dec 27 05:25:24 host sshd[32448]: input_userauth_request: invalid user root [preauth] Dec 27 05:25:24 host unix_chkpwd[32451]: password check failed for user (root) Dec 27 05:25:24 host sshd[32448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.169.26.227 user=root Dec 27 05:25:24 host sshd[32448]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:25:24 host sshd[32444]: Received disconnect from 183.98.20.180 port 34914:11: Bye Bye [preauth] Dec 27 05:25:24 host sshd[32444]: Disconnected from 183.98.20.180 port 34914 [preauth] Dec 27 05:25:26 host sshd[32448]: Failed password for invalid user root from 41.169.26.227 port 50136 ssh2 Dec 27 05:25:45 host sshd[32664]: User root from 171.244.39.233 not allowed because not listed in AllowUsers Dec 27 05:25:45 host sshd[32664]: input_userauth_request: invalid user root [preauth] Dec 27 05:25:45 host unix_chkpwd[32666]: password check failed for user (root) Dec 27 05:25:45 host sshd[32664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.39.233 user=root Dec 27 05:25:45 host sshd[32664]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:25:47 host sshd[32664]: Failed password for invalid user root from 171.244.39.233 port 46404 ssh2 Dec 27 05:25:47 host sshd[32664]: Received disconnect from 171.244.39.233 port 46404:11: Bye Bye [preauth] Dec 27 05:25:47 host sshd[32664]: Disconnected from 171.244.39.233 port 46404 [preauth] Dec 27 05:26:18 host sshd[32766]: User root from 14.160.24.21 not allowed because not listed in AllowUsers Dec 27 05:26:18 host sshd[32766]: input_userauth_request: invalid user root [preauth] Dec 27 05:26:18 host unix_chkpwd[301]: password check failed for user (root) Dec 27 05:26:18 host sshd[32766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.160.24.21 user=root Dec 27 05:26:18 host sshd[32766]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:26:19 host sshd[32766]: Failed password for invalid user root from 14.160.24.21 port 60455 ssh2 Dec 27 05:26:19 host sshd[32766]: Received disconnect from 14.160.24.21 port 60455:11: Bye Bye [preauth] Dec 27 05:26:19 host sshd[32766]: Disconnected from 14.160.24.21 port 60455 [preauth] Dec 27 05:29:54 host sshd[807]: User root from 138.68.75.47 not allowed because not listed in AllowUsers Dec 27 05:29:54 host sshd[807]: input_userauth_request: invalid user root [preauth] Dec 27 05:29:54 host unix_chkpwd[810]: password check failed for user (root) Dec 27 05:29:54 host sshd[807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.75.47 user=root Dec 27 05:29:54 host sshd[807]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:29:56 host sshd[807]: Failed password for invalid user root from 138.68.75.47 port 53416 ssh2 Dec 27 05:29:57 host sshd[807]: Received disconnect from 138.68.75.47 port 53416:11: Bye Bye [preauth] Dec 27 05:29:57 host sshd[807]: Disconnected from 138.68.75.47 port 53416 [preauth] Dec 27 05:30:18 host sshd[874]: User root from 134.209.104.221 not allowed because not listed in AllowUsers Dec 27 05:30:18 host sshd[874]: input_userauth_request: invalid user root [preauth] Dec 27 05:30:18 host unix_chkpwd[876]: password check failed for user (root) Dec 27 05:30:18 host sshd[874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.104.221 user=root Dec 27 05:30:18 host sshd[874]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:30:20 host sshd[874]: Failed password for invalid user root from 134.209.104.221 port 45188 ssh2 Dec 27 05:30:20 host sshd[874]: Received disconnect from 134.209.104.221 port 45188:11: Bye Bye [preauth] Dec 27 05:30:20 host sshd[874]: Disconnected from 134.209.104.221 port 45188 [preauth] Dec 27 05:30:36 host sshd[918]: User root from 168.121.105.170 not allowed because not listed in AllowUsers Dec 27 05:30:36 host sshd[918]: input_userauth_request: invalid user root [preauth] Dec 27 05:30:36 host unix_chkpwd[922]: password check failed for user (root) Dec 27 05:30:36 host sshd[918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.121.105.170 user=root Dec 27 05:30:36 host sshd[918]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:30:38 host sshd[918]: Failed password for invalid user root from 168.121.105.170 port 17942 ssh2 Dec 27 05:30:39 host sshd[918]: Received disconnect from 168.121.105.170 port 17942:11: Bye Bye [preauth] Dec 27 05:30:39 host sshd[918]: Disconnected from 168.121.105.170 port 17942 [preauth] Dec 27 05:31:24 host sshd[994]: User root from 138.68.75.47 not allowed because not listed in AllowUsers Dec 27 05:31:24 host sshd[994]: input_userauth_request: invalid user root [preauth] Dec 27 05:31:24 host unix_chkpwd[997]: password check failed for user (root) Dec 27 05:31:24 host sshd[994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.75.47 user=root Dec 27 05:31:24 host sshd[994]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:31:26 host sshd[994]: Failed password for invalid user root from 138.68.75.47 port 56094 ssh2 Dec 27 05:31:55 host sshd[1193]: User root from 134.209.104.221 not allowed because not listed in AllowUsers Dec 27 05:31:55 host sshd[1193]: input_userauth_request: invalid user root [preauth] Dec 27 05:31:55 host unix_chkpwd[1195]: password check failed for user (root) Dec 27 05:31:55 host sshd[1193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.104.221 user=root Dec 27 05:31:55 host sshd[1193]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:31:57 host sshd[1193]: Failed password for invalid user root from 134.209.104.221 port 36510 ssh2 Dec 27 05:31:57 host sshd[1193]: Received disconnect from 134.209.104.221 port 36510:11: Bye Bye [preauth] Dec 27 05:31:57 host sshd[1193]: Disconnected from 134.209.104.221 port 36510 [preauth] Dec 27 05:31:57 host sshd[1196]: User root from 168.121.105.170 not allowed because not listed in AllowUsers Dec 27 05:31:57 host sshd[1196]: input_userauth_request: invalid user root [preauth] Dec 27 05:31:57 host unix_chkpwd[1201]: password check failed for user (root) Dec 27 05:31:57 host sshd[1196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.121.105.170 user=root Dec 27 05:31:57 host sshd[1196]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:32:00 host sshd[1196]: Failed password for invalid user root from 168.121.105.170 port 12313 ssh2 Dec 27 05:32:00 host sshd[1196]: Received disconnect from 168.121.105.170 port 12313:11: Bye Bye [preauth] Dec 27 05:32:00 host sshd[1196]: Disconnected from 168.121.105.170 port 12313 [preauth] Dec 27 05:46:27 host sshd[3350]: User root from 92.46.108.20 not allowed because not listed in AllowUsers Dec 27 05:46:27 host sshd[3350]: input_userauth_request: invalid user root [preauth] Dec 27 05:46:28 host unix_chkpwd[3379]: password check failed for user (root) Dec 27 05:46:28 host sshd[3350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 user=root Dec 27 05:46:28 host sshd[3350]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:46:29 host sshd[3350]: Failed password for invalid user root from 92.46.108.20 port 36578 ssh2 Dec 27 05:46:30 host sshd[3350]: Connection closed by 92.46.108.20 port 36578 [preauth] Dec 27 05:50:05 host sshd[3902]: Invalid user user from 103.13.40.2 port 51234 Dec 27 05:50:05 host sshd[3902]: input_userauth_request: invalid user user [preauth] Dec 27 05:50:05 host sshd[3902]: pam_unix(sshd:auth): check pass; user unknown Dec 27 05:50:05 host sshd[3902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 27 05:50:07 host sshd[3902]: Failed password for invalid user user from 103.13.40.2 port 51234 ssh2 Dec 27 05:50:07 host sshd[3902]: Connection closed by 103.13.40.2 port 51234 [preauth] Dec 27 05:50:51 host sshd[4000]: User root from 51.250.89.156 not allowed because not listed in AllowUsers Dec 27 05:50:51 host sshd[4000]: input_userauth_request: invalid user root [preauth] Dec 27 05:50:51 host unix_chkpwd[4004]: password check failed for user (root) Dec 27 05:50:51 host sshd[4000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.89.156 user=root Dec 27 05:50:51 host sshd[4000]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:50:53 host sshd[4000]: Failed password for invalid user root from 51.250.89.156 port 60620 ssh2 Dec 27 05:50:53 host sshd[4000]: Received disconnect from 51.250.89.156 port 60620:11: Bye Bye [preauth] Dec 27 05:50:53 host sshd[4000]: Disconnected from 51.250.89.156 port 60620 [preauth] Dec 27 05:51:06 host sshd[4037]: Invalid user lyh from 41.197.31.178 port 47178 Dec 27 05:51:06 host sshd[4037]: input_userauth_request: invalid user lyh [preauth] Dec 27 05:51:06 host sshd[4037]: pam_unix(sshd:auth): check pass; user unknown Dec 27 05:51:06 host sshd[4037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 27 05:51:08 host sshd[4041]: User root from 165.22.81.56 not allowed because not listed in AllowUsers Dec 27 05:51:08 host sshd[4041]: input_userauth_request: invalid user root [preauth] Dec 27 05:51:08 host unix_chkpwd[4044]: password check failed for user (root) Dec 27 05:51:08 host sshd[4041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.81.56 user=root Dec 27 05:51:08 host sshd[4041]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:51:08 host sshd[4037]: Failed password for invalid user lyh from 41.197.31.178 port 47178 ssh2 Dec 27 05:51:08 host sshd[4037]: Connection closed by 41.197.31.178 port 47178 [preauth] Dec 27 05:51:10 host sshd[4041]: Failed password for invalid user root from 165.22.81.56 port 47140 ssh2 Dec 27 05:51:10 host sshd[4041]: Received disconnect from 165.22.81.56 port 47140:11: Bye Bye [preauth] Dec 27 05:51:10 host sshd[4041]: Disconnected from 165.22.81.56 port 47140 [preauth] Dec 27 05:52:02 host sshd[4156]: User root from 200.16.132.42 not allowed because not listed in AllowUsers Dec 27 05:52:02 host sshd[4156]: input_userauth_request: invalid user root [preauth] Dec 27 05:52:02 host unix_chkpwd[4169]: password check failed for user (root) Dec 27 05:52:02 host sshd[4156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.16.132.42 user=root Dec 27 05:52:02 host sshd[4156]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:52:04 host sshd[4156]: Failed password for invalid user root from 200.16.132.42 port 39746 ssh2 Dec 27 05:52:04 host sshd[4156]: Received disconnect from 200.16.132.42 port 39746:11: Bye Bye [preauth] Dec 27 05:52:04 host sshd[4156]: Disconnected from 200.16.132.42 port 39746 [preauth] Dec 27 05:53:06 host sshd[4346]: User root from 198.199.93.112 not allowed because not listed in AllowUsers Dec 27 05:53:06 host sshd[4346]: input_userauth_request: invalid user root [preauth] Dec 27 05:53:06 host unix_chkpwd[4350]: password check failed for user (root) Dec 27 05:53:06 host sshd[4346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.93.112 user=root Dec 27 05:53:06 host sshd[4346]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:53:08 host sshd[4346]: Failed password for invalid user root from 198.199.93.112 port 55942 ssh2 Dec 27 05:53:08 host sshd[4346]: Received disconnect from 198.199.93.112 port 55942:11: Bye Bye [preauth] Dec 27 05:53:08 host sshd[4346]: Disconnected from 198.199.93.112 port 55942 [preauth] Dec 27 05:55:14 host sshd[4775]: User root from 49.51.95.233 not allowed because not listed in AllowUsers Dec 27 05:55:14 host sshd[4775]: input_userauth_request: invalid user root [preauth] Dec 27 05:55:14 host unix_chkpwd[4778]: password check failed for user (root) Dec 27 05:55:14 host sshd[4775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.95.233 user=root Dec 27 05:55:14 host sshd[4775]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:55:17 host sshd[4775]: Failed password for invalid user root from 49.51.95.233 port 38154 ssh2 Dec 27 05:55:17 host sshd[4775]: Received disconnect from 49.51.95.233 port 38154:11: Bye Bye [preauth] Dec 27 05:55:17 host sshd[4775]: Disconnected from 49.51.95.233 port 38154 [preauth] Dec 27 05:55:49 host sshd[4905]: User root from 24.199.94.27 not allowed because not listed in AllowUsers Dec 27 05:55:49 host sshd[4905]: input_userauth_request: invalid user root [preauth] Dec 27 05:55:49 host unix_chkpwd[4908]: password check failed for user (root) Dec 27 05:55:49 host sshd[4905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.199.94.27 user=root Dec 27 05:55:49 host sshd[4905]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:55:51 host sshd[4905]: Failed password for invalid user root from 24.199.94.27 port 43916 ssh2 Dec 27 05:55:51 host sshd[4905]: Received disconnect from 24.199.94.27 port 43916:11: Bye Bye [preauth] Dec 27 05:55:51 host sshd[4905]: Disconnected from 24.199.94.27 port 43916 [preauth] Dec 27 05:56:15 host sshd[4948]: User root from 37.44.244.173 not allowed because not listed in AllowUsers Dec 27 05:56:15 host sshd[4948]: input_userauth_request: invalid user root [preauth] Dec 27 05:56:15 host unix_chkpwd[4950]: password check failed for user (root) Dec 27 05:56:15 host sshd[4948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.44.244.173 user=root Dec 27 05:56:15 host sshd[4948]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:56:17 host sshd[4948]: Failed password for invalid user root from 37.44.244.173 port 35148 ssh2 Dec 27 05:56:17 host sshd[4948]: Received disconnect from 37.44.244.173 port 35148:11: Bye Bye [preauth] Dec 27 05:56:17 host sshd[4948]: Disconnected from 37.44.244.173 port 35148 [preauth] Dec 27 05:56:55 host sshd[5025]: User root from 37.44.244.173 not allowed because not listed in AllowUsers Dec 27 05:56:55 host sshd[5025]: input_userauth_request: invalid user root [preauth] Dec 27 05:56:55 host unix_chkpwd[5028]: password check failed for user (root) Dec 27 05:56:55 host sshd[5025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.44.244.173 user=root Dec 27 05:56:55 host sshd[5025]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:56:57 host sshd[5025]: Failed password for invalid user root from 37.44.244.173 port 43866 ssh2 Dec 27 05:57:10 host sshd[5088]: User root from 51.250.89.156 not allowed because not listed in AllowUsers Dec 27 05:57:10 host sshd[5088]: input_userauth_request: invalid user root [preauth] Dec 27 05:57:10 host unix_chkpwd[5091]: password check failed for user (root) Dec 27 05:57:10 host sshd[5088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.89.156 user=root Dec 27 05:57:10 host sshd[5088]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:57:13 host sshd[5088]: Failed password for invalid user root from 51.250.89.156 port 34234 ssh2 Dec 27 05:57:14 host sshd[5128]: User root from 165.22.81.56 not allowed because not listed in AllowUsers Dec 27 05:57:14 host sshd[5128]: input_userauth_request: invalid user root [preauth] Dec 27 05:57:14 host unix_chkpwd[5134]: password check failed for user (root) Dec 27 05:57:14 host sshd[5128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.81.56 user=root Dec 27 05:57:14 host sshd[5128]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:57:16 host sshd[5128]: Failed password for invalid user root from 165.22.81.56 port 40220 ssh2 Dec 27 05:57:18 host sshd[5159]: User root from 24.199.94.27 not allowed because not listed in AllowUsers Dec 27 05:57:18 host sshd[5159]: input_userauth_request: invalid user root [preauth] Dec 27 05:57:18 host unix_chkpwd[5177]: password check failed for user (root) Dec 27 05:57:18 host sshd[5159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.199.94.27 user=root Dec 27 05:57:18 host sshd[5159]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:57:20 host sshd[5159]: Failed password for invalid user root from 24.199.94.27 port 44058 ssh2 Dec 27 05:57:20 host sshd[5159]: Received disconnect from 24.199.94.27 port 44058:11: Bye Bye [preauth] Dec 27 05:57:20 host sshd[5159]: Disconnected from 24.199.94.27 port 44058 [preauth] Dec 27 05:57:28 host sshd[5249]: User root from 198.199.93.112 not allowed because not listed in AllowUsers Dec 27 05:57:28 host sshd[5249]: input_userauth_request: invalid user root [preauth] Dec 27 05:57:28 host unix_chkpwd[5253]: password check failed for user (root) Dec 27 05:57:28 host sshd[5249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.93.112 user=root Dec 27 05:57:28 host sshd[5249]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:57:30 host sshd[5249]: Failed password for invalid user root from 198.199.93.112 port 47744 ssh2 Dec 27 05:57:30 host sshd[5249]: Received disconnect from 198.199.93.112 port 47744:11: Bye Bye [preauth] Dec 27 05:57:30 host sshd[5249]: Disconnected from 198.199.93.112 port 47744 [preauth] Dec 27 05:57:33 host sshd[5265]: User root from 200.16.132.42 not allowed because not listed in AllowUsers Dec 27 05:57:33 host sshd[5265]: input_userauth_request: invalid user root [preauth] Dec 27 05:57:33 host unix_chkpwd[5293]: password check failed for user (root) Dec 27 05:57:33 host sshd[5265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.16.132.42 user=root Dec 27 05:57:33 host sshd[5265]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:57:35 host sshd[5265]: Failed password for invalid user root from 200.16.132.42 port 39470 ssh2 Dec 27 05:57:35 host sshd[5265]: Received disconnect from 200.16.132.42 port 39470:11: Bye Bye [preauth] Dec 27 05:57:35 host sshd[5265]: Disconnected from 200.16.132.42 port 39470 [preauth] Dec 27 05:57:52 host sshd[5351]: User root from 177.102.11.86 not allowed because not listed in AllowUsers Dec 27 05:57:52 host sshd[5351]: input_userauth_request: invalid user root [preauth] Dec 27 05:57:52 host unix_chkpwd[5355]: password check failed for user (root) Dec 27 05:57:52 host sshd[5351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.102.11.86 user=root Dec 27 05:57:52 host sshd[5351]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:57:55 host sshd[5351]: Failed password for invalid user root from 177.102.11.86 port 56468 ssh2 Dec 27 05:57:55 host sshd[5351]: Received disconnect from 177.102.11.86 port 56468:11: Bye Bye [preauth] Dec 27 05:57:55 host sshd[5351]: Disconnected from 177.102.11.86 port 56468 [preauth] Dec 27 05:58:10 host sshd[5391]: User root from 112.64.33.38 not allowed because not listed in AllowUsers Dec 27 05:58:10 host sshd[5391]: input_userauth_request: invalid user root [preauth] Dec 27 05:58:10 host unix_chkpwd[5395]: password check failed for user (root) Dec 27 05:58:10 host sshd[5391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.64.33.38 user=root Dec 27 05:58:10 host sshd[5391]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:58:11 host sshd[5396]: User root from 49.51.95.233 not allowed because not listed in AllowUsers Dec 27 05:58:11 host sshd[5396]: input_userauth_request: invalid user root [preauth] Dec 27 05:58:11 host unix_chkpwd[5399]: password check failed for user (root) Dec 27 05:58:11 host sshd[5396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.95.233 user=root Dec 27 05:58:11 host sshd[5396]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:58:12 host sshd[5391]: Failed password for invalid user root from 112.64.33.38 port 50694 ssh2 Dec 27 05:58:12 host sshd[5391]: Received disconnect from 112.64.33.38 port 50694:11: Bye Bye [preauth] Dec 27 05:58:12 host sshd[5391]: Disconnected from 112.64.33.38 port 50694 [preauth] Dec 27 05:58:13 host sshd[5396]: Failed password for invalid user root from 49.51.95.233 port 46016 ssh2 Dec 27 05:58:13 host sshd[5396]: Received disconnect from 49.51.95.233 port 46016:11: Bye Bye [preauth] Dec 27 05:58:13 host sshd[5396]: Disconnected from 49.51.95.233 port 46016 [preauth] Dec 27 05:58:51 host sshd[5514]: User root from 2.226.152.85 not allowed because not listed in AllowUsers Dec 27 05:58:51 host sshd[5514]: input_userauth_request: invalid user root [preauth] Dec 27 05:58:51 host unix_chkpwd[5522]: password check failed for user (root) Dec 27 05:58:51 host sshd[5514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.226.152.85 user=root Dec 27 05:58:51 host sshd[5514]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:58:54 host sshd[5514]: Failed password for invalid user root from 2.226.152.85 port 49474 ssh2 Dec 27 05:58:54 host sshd[5514]: Received disconnect from 2.226.152.85 port 49474:11: Bye Bye [preauth] Dec 27 05:58:54 host sshd[5514]: Disconnected from 2.226.152.85 port 49474 [preauth] Dec 27 05:59:44 host sshd[5735]: User root from 68.183.225.151 not allowed because not listed in AllowUsers Dec 27 05:59:44 host sshd[5735]: input_userauth_request: invalid user root [preauth] Dec 27 05:59:44 host unix_chkpwd[5737]: password check failed for user (root) Dec 27 05:59:44 host sshd[5735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.225.151 user=root Dec 27 05:59:44 host sshd[5735]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 05:59:46 host sshd[5735]: Failed password for invalid user root from 68.183.225.151 port 44078 ssh2 Dec 27 05:59:46 host sshd[5735]: Received disconnect from 68.183.225.151 port 44078:11: Bye Bye [preauth] Dec 27 05:59:46 host sshd[5735]: Disconnected from 68.183.225.151 port 44078 [preauth] Dec 27 06:00:07 host sshd[5823]: User root from 177.102.11.86 not allowed because not listed in AllowUsers Dec 27 06:00:07 host sshd[5823]: input_userauth_request: invalid user root [preauth] Dec 27 06:00:07 host unix_chkpwd[5831]: password check failed for user (root) Dec 27 06:00:07 host sshd[5823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.102.11.86 user=root Dec 27 06:00:07 host sshd[5823]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 06:00:09 host sshd[5823]: Failed password for invalid user root from 177.102.11.86 port 38790 ssh2 Dec 27 06:00:10 host sshd[5823]: Received disconnect from 177.102.11.86 port 38790:11: Bye Bye [preauth] Dec 27 06:00:10 host sshd[5823]: Disconnected from 177.102.11.86 port 38790 [preauth] Dec 27 06:02:47 host sshd[6286]: User root from 68.183.225.151 not allowed because not listed in AllowUsers Dec 27 06:02:47 host sshd[6286]: input_userauth_request: invalid user root [preauth] Dec 27 06:02:47 host unix_chkpwd[6288]: password check failed for user (root) Dec 27 06:02:47 host sshd[6286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.225.151 user=root Dec 27 06:02:47 host sshd[6286]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 06:02:49 host sshd[6286]: Failed password for invalid user root from 68.183.225.151 port 57216 ssh2 Dec 27 06:02:49 host sshd[6286]: Received disconnect from 68.183.225.151 port 57216:11: Bye Bye [preauth] Dec 27 06:02:49 host sshd[6286]: Disconnected from 68.183.225.151 port 57216 [preauth] Dec 27 06:05:58 host sshd[6837]: User root from 200.69.196.27 not allowed because not listed in AllowUsers Dec 27 06:05:58 host sshd[6837]: input_userauth_request: invalid user root [preauth] Dec 27 06:05:58 host unix_chkpwd[6846]: password check failed for user (root) Dec 27 06:05:58 host sshd[6837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.69.196.27 user=root Dec 27 06:05:58 host sshd[6837]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 06:06:00 host sshd[6837]: Failed password for invalid user root from 200.69.196.27 port 55571 ssh2 Dec 27 06:06:01 host sshd[6837]: Received disconnect from 200.69.196.27 port 55571:11: Bye Bye [preauth] Dec 27 06:06:01 host sshd[6837]: Disconnected from 200.69.196.27 port 55571 [preauth] Dec 27 06:06:43 host sshd[6966]: User root from 2.226.152.85 not allowed because not listed in AllowUsers Dec 27 06:06:43 host sshd[6966]: input_userauth_request: invalid user root [preauth] Dec 27 06:06:43 host unix_chkpwd[6972]: password check failed for user (root) Dec 27 06:06:43 host sshd[6966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.226.152.85 user=root Dec 27 06:06:43 host sshd[6966]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 06:06:46 host sshd[6966]: Failed password for invalid user root from 2.226.152.85 port 41126 ssh2 Dec 27 06:06:46 host sshd[6966]: Received disconnect from 2.226.152.85 port 41126:11: Bye Bye [preauth] Dec 27 06:06:46 host sshd[6966]: Disconnected from 2.226.152.85 port 41126 [preauth] Dec 27 06:09:26 host sshd[7414]: Connection closed by 112.64.33.38 port 42346 [preauth] Dec 27 06:10:09 host sshd[7631]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Dec 27 06:10:09 host sshd[7631]: input_userauth_request: invalid user root [preauth] Dec 27 06:10:09 host unix_chkpwd[7635]: password check failed for user (root) Dec 27 06:10:09 host sshd[7631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Dec 27 06:10:09 host sshd[7631]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 06:10:11 host sshd[7631]: Failed password for invalid user root from 162.218.126.136 port 38106 ssh2 Dec 27 06:10:11 host sshd[7631]: Connection closed by 162.218.126.136 port 38106 [preauth] Dec 27 06:11:03 host sshd[7756]: User root from 112.64.33.38 not allowed because not listed in AllowUsers Dec 27 06:11:03 host sshd[7756]: input_userauth_request: invalid user root [preauth] Dec 27 06:11:04 host unix_chkpwd[7763]: password check failed for user (root) Dec 27 06:11:04 host sshd[7756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.64.33.38 user=root Dec 27 06:11:04 host sshd[7756]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 06:11:05 host sshd[7756]: Failed password for invalid user root from 112.64.33.38 port 54038 ssh2 Dec 27 06:11:06 host sshd[7756]: Received disconnect from 112.64.33.38 port 54038:11: Bye Bye [preauth] Dec 27 06:11:06 host sshd[7756]: Disconnected from 112.64.33.38 port 54038 [preauth] Dec 27 06:15:29 host sshd[8518]: Connection closed by 172.104.11.51 port 28814 [preauth] Dec 27 06:15:31 host sshd[8522]: Connection closed by 172.104.11.51 port 26930 [preauth] Dec 27 06:15:32 host sshd[8525]: Connection closed by 172.104.11.51 port 26938 [preauth] Dec 27 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 27 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 27 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 27 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 27 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 27 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 27 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 27 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 27 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 06:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 06:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 06:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 27 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=dartsimp user-4=a2zgroup user-5=laundryboniface user-6=wwwpmcresource user-7=travelboniface user-8=wwwrmswll user-9=wwwresourcehunte user-10=keralaholi user-11=ugotscom user-12=disposeat user-13=wwwkmaorg user-14=remysagr user-15=woodpeck user-16=wwwkapin user-17=vfmassets user-18=wwwtestugo user-19=shalinijames user-20=pmcresources user-21=bonifacegroup user-22=wwwevmhonda user-23=wwwletsstalkfood user-24=straightcurve user-25=gifterman user-26=palco123 user-27=phmetals user-28=kottayamcalldriv user-29=wwwnexidigital user-30=mrsclean feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 27 06:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 27 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-F1yk4HduaEHAyUin.~ Dec 27 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-F1yk4HduaEHAyUin.~' Dec 27 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-F1yk4HduaEHAyUin.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 27 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 27 06:21:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 06:21:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 27 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 06:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 06:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 06:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 06:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 27 06:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 27 06:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 27 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 27 06:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 06:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 27 06:21:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 06:21:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 27 06:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 06:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 06:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 27 06:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 06:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 06:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 27 06:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 06:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 06:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 27 06:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 06:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 06:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 27 06:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 06:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 06:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 27 06:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 06:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 06:25:39 host sshd[10177]: User root from 200.69.196.27 not allowed because not listed in AllowUsers Dec 27 06:25:39 host sshd[10177]: input_userauth_request: invalid user root [preauth] Dec 27 06:25:39 host unix_chkpwd[10181]: password check failed for user (root) Dec 27 06:25:39 host sshd[10177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.69.196.27 user=root Dec 27 06:25:39 host sshd[10177]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 06:25:41 host sshd[10177]: Failed password for invalid user root from 200.69.196.27 port 59539 ssh2 Dec 27 06:25:42 host sshd[10177]: Received disconnect from 200.69.196.27 port 59539:11: Bye Bye [preauth] Dec 27 06:25:42 host sshd[10177]: Disconnected from 200.69.196.27 port 59539 [preauth] Dec 27 06:29:21 host sshd[10612]: Invalid user admin from 121.131.45.153 port 39799 Dec 27 06:29:21 host sshd[10612]: input_userauth_request: invalid user admin [preauth] Dec 27 06:29:21 host sshd[10612]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:29:21 host sshd[10612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.131.45.153 Dec 27 06:29:23 host sshd[10612]: Failed password for invalid user admin from 121.131.45.153 port 39799 ssh2 Dec 27 06:29:23 host sshd[10612]: Connection closed by 121.131.45.153 port 39799 [preauth] Dec 27 06:41:24 host sshd[12497]: Invalid user joseph from 107.189.30.59 port 43244 Dec 27 06:41:24 host sshd[12497]: input_userauth_request: invalid user joseph [preauth] Dec 27 06:41:24 host sshd[12497]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:41:24 host sshd[12497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Dec 27 06:41:27 host sshd[12497]: Failed password for invalid user joseph from 107.189.30.59 port 43244 ssh2 Dec 27 06:41:27 host sshd[12497]: Connection closed by 107.189.30.59 port 43244 [preauth] Dec 27 06:49:14 host sshd[13737]: Did not receive identification string from 92.255.85.115 port 26030 Dec 27 06:52:47 host sshd[14351]: Invalid user admin from 106.10.122.53 port 59838 Dec 27 06:52:47 host sshd[14351]: input_userauth_request: invalid user admin [preauth] Dec 27 06:52:47 host sshd[14351]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:52:47 host sshd[14351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 27 06:52:49 host sshd[14351]: Failed password for invalid user admin from 106.10.122.53 port 59838 ssh2 Dec 27 06:52:50 host sshd[14351]: Connection closed by 106.10.122.53 port 59838 [preauth] Dec 27 06:53:06 host sshd[14407]: Invalid user username from 193.169.255.30 port 59428 Dec 27 06:53:06 host sshd[14407]: input_userauth_request: invalid user username [preauth] Dec 27 06:53:06 host sshd[14407]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:53:06 host sshd[14407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.169.255.30 Dec 27 06:53:08 host sshd[14407]: Failed password for invalid user username from 193.169.255.30 port 59428 ssh2 Dec 27 06:53:11 host sshd[14407]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:53:13 host sshd[14407]: Failed password for invalid user username from 193.169.255.30 port 59428 ssh2 Dec 27 06:53:16 host sshd[14407]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:53:18 host sshd[14407]: Failed password for invalid user username from 193.169.255.30 port 59428 ssh2 Dec 27 06:53:22 host sshd[14407]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:53:24 host sshd[14407]: Failed password for invalid user username from 193.169.255.30 port 59428 ssh2 Dec 27 06:53:27 host sshd[14407]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:53:28 host sshd[14407]: Failed password for invalid user username from 193.169.255.30 port 59428 ssh2 Dec 27 06:54:05 host sshd[14575]: Did not receive identification string from 178.88.161.82 port 49972 Dec 27 06:54:06 host sshd[14587]: Invalid user ftpuser from 178.88.161.82 port 50304 Dec 27 06:54:06 host sshd[14587]: input_userauth_request: invalid user ftpuser [preauth] Dec 27 06:54:06 host sshd[14589]: Invalid user mailadmin from 178.88.161.82 port 50200 Dec 27 06:54:06 host sshd[14589]: input_userauth_request: invalid user mailadmin [preauth] Dec 27 06:54:06 host sshd[14599]: Invalid user postgres from 178.88.161.82 port 50082 Dec 27 06:54:06 host sshd[14599]: input_userauth_request: invalid user postgres [preauth] Dec 27 06:54:06 host sshd[14586]: Invalid user ftpuser from 178.88.161.82 port 50044 Dec 27 06:54:06 host sshd[14586]: input_userauth_request: invalid user ftpuser [preauth] Dec 27 06:54:06 host sshd[14593]: Invalid user ansadmin from 178.88.161.82 port 50204 Dec 27 06:54:06 host sshd[14593]: input_userauth_request: invalid user ansadmin [preauth] Dec 27 06:54:06 host sshd[14591]: Invalid user vagrant from 178.88.161.82 port 50190 Dec 27 06:54:06 host sshd[14591]: input_userauth_request: invalid user vagrant [preauth] Dec 27 06:54:06 host sshd[14595]: Invalid user guest from 178.88.161.82 port 50092 Dec 27 06:54:06 host sshd[14595]: input_userauth_request: invalid user guest [preauth] Dec 27 06:54:06 host sshd[14590]: Invalid user mailadmin from 178.88.161.82 port 50096 Dec 27 06:54:06 host sshd[14590]: input_userauth_request: invalid user mailadmin [preauth] Dec 27 06:54:06 host sshd[14601]: Invalid user ubuntu from 178.88.161.82 port 50142 Dec 27 06:54:06 host sshd[14601]: input_userauth_request: invalid user ubuntu [preauth] Dec 27 06:54:06 host sshd[14582]: Invalid user posiflex from 178.88.161.82 port 50164 Dec 27 06:54:06 host sshd[14582]: input_userauth_request: invalid user posiflex [preauth] Dec 27 06:54:06 host sshd[14594]: Invalid user steam from 178.88.161.82 port 50050 Dec 27 06:54:06 host sshd[14594]: input_userauth_request: invalid user steam [preauth] Dec 27 06:54:06 host sshd[14583]: Invalid user hadoop from 178.88.161.82 port 50308 Dec 27 06:54:06 host sshd[14583]: input_userauth_request: invalid user hadoop [preauth] Dec 27 06:54:06 host sshd[14592]: Invalid user steam from 178.88.161.82 port 50242 Dec 27 06:54:06 host sshd[14592]: input_userauth_request: invalid user steam [preauth] Dec 27 06:54:06 host sshd[14596]: Invalid user user from 178.88.161.82 port 49990 Dec 27 06:54:06 host sshd[14596]: input_userauth_request: invalid user user [preauth] Dec 27 06:54:06 host sshd[14606]: Invalid user test from 178.88.161.82 port 50346 Dec 27 06:54:06 host sshd[14598]: Invalid user devops from 178.88.161.82 port 50100 Dec 27 06:54:06 host sshd[14606]: input_userauth_request: invalid user test [preauth] Dec 27 06:54:06 host sshd[14598]: input_userauth_request: invalid user devops [preauth] Dec 27 06:54:06 host sshd[14597]: Invalid user guest from 178.88.161.82 port 50108 Dec 27 06:54:06 host sshd[14608]: Invalid user ftpuser from 178.88.161.82 port 50342 Dec 27 06:54:06 host sshd[14597]: input_userauth_request: invalid user guest [preauth] Dec 27 06:54:06 host sshd[14600]: Invalid user steam from 178.88.161.82 port 50154 Dec 27 06:54:06 host sshd[14600]: input_userauth_request: invalid user steam [preauth] Dec 27 06:54:06 host sshd[14608]: input_userauth_request: invalid user ftpuser [preauth] Dec 27 06:54:06 host sshd[14604]: User centos from 178.88.161.82 not allowed because not listed in AllowUsers Dec 27 06:54:06 host sshd[14605]: User centos from 178.88.161.82 not allowed because not listed in AllowUsers Dec 27 06:54:06 host sshd[14605]: input_userauth_request: invalid user centos [preauth] Dec 27 06:54:06 host sshd[14604]: input_userauth_request: invalid user centos [preauth] Dec 27 06:54:06 host sshd[14607]: Invalid user ec2-user from 178.88.161.82 port 50344 Dec 27 06:54:06 host sshd[14607]: input_userauth_request: invalid user ec2-user [preauth] Dec 27 06:54:06 host sshd[14578]: Invalid user ftpuser from 178.88.161.82 port 50128 Dec 27 06:54:06 host sshd[14578]: input_userauth_request: invalid user ftpuser [preauth] Dec 27 06:54:06 host sshd[14609]: Invalid user linux from 178.88.161.82 port 49986 Dec 27 06:54:06 host sshd[14609]: input_userauth_request: invalid user linux [preauth] Dec 27 06:54:06 host sshd[14576]: Invalid user oracle from 178.88.161.82 port 50228 Dec 27 06:54:06 host sshd[14576]: input_userauth_request: invalid user oracle [preauth] Dec 27 06:54:06 host sshd[14581]: Invalid user test from 178.88.161.82 port 50318 Dec 27 06:54:06 host sshd[14581]: input_userauth_request: invalid user test [preauth] Dec 27 06:54:06 host sshd[14581]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:54:06 host sshd[14581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 27 06:54:07 host sshd[14580]: Invalid user posiflex from 178.88.161.82 port 50212 Dec 27 06:54:07 host sshd[14580]: input_userauth_request: invalid user posiflex [preauth] Dec 27 06:54:07 host sshd[14585]: Invalid user guest from 178.88.161.82 port 50030 Dec 27 06:54:07 host sshd[14585]: input_userauth_request: invalid user guest [preauth] Dec 27 06:54:07 host sshd[14579]: User mysql from 178.88.161.82 not allowed because not listed in AllowUsers Dec 27 06:54:07 host sshd[14577]: Invalid user user from 178.88.161.82 port 50060 Dec 27 06:54:07 host sshd[14579]: input_userauth_request: invalid user mysql [preauth] Dec 27 06:54:07 host sshd[14577]: input_userauth_request: invalid user user [preauth] Dec 27 06:54:07 host sshd[14587]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:54:07 host sshd[14587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 27 06:54:07 host sshd[14580]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:54:07 host sshd[14580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 27 06:54:07 host sshd[14589]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:54:07 host sshd[14589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 27 06:54:07 host sshd[14599]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:54:07 host sshd[14599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 27 06:54:07 host sshd[14590]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:54:07 host sshd[14590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 27 06:54:07 host sshd[14586]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:54:07 host sshd[14586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 27 06:54:07 host sshd[14593]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:54:07 host sshd[14593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 27 06:54:07 host sshd[14591]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:54:07 host sshd[14591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 27 06:54:07 host sshd[14583]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:54:07 host sshd[14583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 27 06:54:07 host sshd[14601]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:54:07 host sshd[14601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 27 06:54:07 host sshd[14578]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:54:07 host sshd[14598]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:54:07 host sshd[14578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 27 06:54:07 host sshd[14598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 27 06:54:07 host sshd[14606]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:54:07 host sshd[14606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 27 06:54:07 host sshd[14595]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:54:07 host sshd[14595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 27 06:54:07 host sshd[14608]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:54:07 host sshd[14608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 27 06:54:07 host sshd[14607]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:54:07 host sshd[14607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 27 06:54:07 host sshd[14597]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:54:07 host sshd[14597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 27 06:54:07 host sshd[14592]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:54:07 host sshd[14594]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:54:07 host sshd[14592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 27 06:54:07 host sshd[14594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 27 06:54:07 host sshd[14596]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:54:07 host sshd[14596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 27 06:54:07 host sshd[14600]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:54:07 host sshd[14600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 27 06:54:07 host sshd[14582]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:54:07 host sshd[14582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 27 06:54:07 host sshd[14576]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:54:07 host sshd[14576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 27 06:54:07 host unix_chkpwd[14642]: password check failed for user (centos) Dec 27 06:54:07 host sshd[14604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 user=centos Dec 27 06:54:07 host sshd[14609]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:54:07 host sshd[14609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 27 06:54:07 host unix_chkpwd[14643]: password check failed for user (centos) Dec 27 06:54:07 host sshd[14605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 user=centos Dec 27 06:54:08 host sshd[14577]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:54:08 host sshd[14577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 27 06:54:08 host sshd[14585]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:54:08 host sshd[14585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 27 06:54:08 host unix_chkpwd[14651]: password check failed for user (mysql) Dec 27 06:54:08 host sshd[14579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 user=mysql Dec 27 06:54:08 host sshd[14579]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql" Dec 27 06:54:08 host sshd[14587]: Failed password for invalid user ftpuser from 178.88.161.82 port 50304 ssh2 Dec 27 06:54:08 host sshd[14581]: Failed password for invalid user test from 178.88.161.82 port 50318 ssh2 Dec 27 06:54:09 host sshd[14587]: Connection closed by 178.88.161.82 port 50304 [preauth] Dec 27 06:54:09 host sshd[14581]: Connection closed by 178.88.161.82 port 50318 [preauth] Dec 27 06:54:09 host sshd[14580]: Failed password for invalid user posiflex from 178.88.161.82 port 50212 ssh2 Dec 27 06:54:09 host sshd[14589]: Failed password for invalid user mailadmin from 178.88.161.82 port 50200 ssh2 Dec 27 06:54:09 host sshd[14599]: Failed password for invalid user postgres from 178.88.161.82 port 50082 ssh2 Dec 27 06:54:09 host sshd[14590]: Failed password for invalid user mailadmin from 178.88.161.82 port 50096 ssh2 Dec 27 06:54:09 host sshd[14593]: Failed password for invalid user ansadmin from 178.88.161.82 port 50204 ssh2 Dec 27 06:54:09 host sshd[14586]: Failed password for invalid user ftpuser from 178.88.161.82 port 50044 ssh2 Dec 27 06:54:09 host sshd[14591]: Failed password for invalid user vagrant from 178.88.161.82 port 50190 ssh2 Dec 27 06:54:09 host sshd[14583]: Failed password for invalid user hadoop from 178.88.161.82 port 50308 ssh2 Dec 27 06:54:09 host sshd[14601]: Failed password for invalid user ubuntu from 178.88.161.82 port 50142 ssh2 Dec 27 06:54:09 host sshd[14578]: Failed password for invalid user ftpuser from 178.88.161.82 port 50128 ssh2 Dec 27 06:54:09 host sshd[14598]: Failed password for invalid user devops from 178.88.161.82 port 50100 ssh2 Dec 27 06:54:09 host sshd[14606]: Failed password for invalid user test from 178.88.161.82 port 50346 ssh2 Dec 27 06:54:09 host sshd[14595]: Failed password for invalid user guest from 178.88.161.82 port 50092 ssh2 Dec 27 06:54:09 host sshd[14608]: Failed password for invalid user ftpuser from 178.88.161.82 port 50342 ssh2 Dec 27 06:54:09 host sshd[14607]: Failed password for invalid user ec2-user from 178.88.161.82 port 50344 ssh2 Dec 27 06:54:09 host sshd[14597]: Failed password for invalid user guest from 178.88.161.82 port 50108 ssh2 Dec 27 06:54:09 host sshd[14592]: Failed password for invalid user steam from 178.88.161.82 port 50242 ssh2 Dec 27 06:54:09 host sshd[14594]: Failed password for invalid user steam from 178.88.161.82 port 50050 ssh2 Dec 27 06:54:09 host sshd[14596]: Failed password for invalid user user from 178.88.161.82 port 49990 ssh2 Dec 27 06:54:09 host sshd[14600]: Failed password for invalid user steam from 178.88.161.82 port 50154 ssh2 Dec 27 06:54:09 host sshd[14582]: Failed password for invalid user posiflex from 178.88.161.82 port 50164 ssh2 Dec 27 06:54:09 host sshd[14576]: Failed password for invalid user oracle from 178.88.161.82 port 50228 ssh2 Dec 27 06:54:09 host sshd[14604]: Failed password for invalid user centos from 178.88.161.82 port 50016 ssh2 Dec 27 06:54:09 host sshd[14609]: Failed password for invalid user linux from 178.88.161.82 port 49986 ssh2 Dec 27 06:54:09 host sshd[14605]: Failed password for invalid user centos from 178.88.161.82 port 50286 ssh2 Dec 27 06:54:10 host sshd[14577]: Failed password for invalid user user from 178.88.161.82 port 50060 ssh2 Dec 27 06:54:10 host sshd[14585]: Failed password for invalid user guest from 178.88.161.82 port 50030 ssh2 Dec 27 06:54:10 host sshd[14579]: Failed password for invalid user mysql from 178.88.161.82 port 50114 ssh2 Dec 27 06:59:51 host sshd[15646]: Invalid user bzrx1098ui from 92.255.85.115 port 33341 Dec 27 06:59:51 host sshd[15646]: input_userauth_request: invalid user bzrx1098ui [preauth] Dec 27 06:59:52 host sshd[15646]: pam_unix(sshd:auth): check pass; user unknown Dec 27 06:59:52 host sshd[15646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115 Dec 27 06:59:53 host sshd[15646]: Failed password for invalid user bzrx1098ui from 92.255.85.115 port 33341 ssh2 Dec 27 06:59:53 host sshd[15646]: Connection reset by 92.255.85.115 port 33341 [preauth] Dec 27 07:00:23 host sshd[15863]: User root from 186.67.248.8 not allowed because not listed in AllowUsers Dec 27 07:00:23 host sshd[15863]: input_userauth_request: invalid user root [preauth] Dec 27 07:00:23 host unix_chkpwd[15870]: password check failed for user (root) Dec 27 07:00:23 host sshd[15863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.67.248.8 user=root Dec 27 07:00:23 host sshd[15863]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 07:00:25 host sshd[15863]: Failed password for invalid user root from 186.67.248.8 port 57832 ssh2 Dec 27 07:00:25 host sshd[15863]: Received disconnect from 186.67.248.8 port 57832:11: Bye Bye [preauth] Dec 27 07:00:25 host sshd[15863]: Disconnected from 186.67.248.8 port 57832 [preauth] Dec 27 07:01:18 host sshd[16041]: User root from 107.172.218.217 not allowed because not listed in AllowUsers Dec 27 07:01:18 host sshd[16041]: input_userauth_request: invalid user root [preauth] Dec 27 07:01:18 host unix_chkpwd[16051]: password check failed for user (root) Dec 27 07:01:18 host sshd[16041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.172.218.217 user=root Dec 27 07:01:18 host sshd[16041]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 07:01:20 host sshd[16041]: Failed password for invalid user root from 107.172.218.217 port 34164 ssh2 Dec 27 07:01:20 host sshd[16041]: Received disconnect from 107.172.218.217 port 34164:11: Bye Bye [preauth] Dec 27 07:01:20 host sshd[16041]: Disconnected from 107.172.218.217 port 34164 [preauth] Dec 27 07:01:29 host sshd[16099]: User root from 181.188.195.18 not allowed because not listed in AllowUsers Dec 27 07:01:29 host sshd[16099]: input_userauth_request: invalid user root [preauth] Dec 27 07:01:29 host unix_chkpwd[16109]: password check failed for user (root) Dec 27 07:01:29 host sshd[16099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.188.195.18 user=root Dec 27 07:01:29 host sshd[16099]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 07:01:30 host sshd[16099]: Failed password for invalid user root from 181.188.195.18 port 34028 ssh2 Dec 27 07:01:31 host sshd[16099]: Received disconnect from 181.188.195.18 port 34028:11: Bye Bye [preauth] Dec 27 07:01:31 host sshd[16099]: Disconnected from 181.188.195.18 port 34028 [preauth] Dec 27 07:01:39 host sshd[16142]: User root from 178.128.39.97 not allowed because not listed in AllowUsers Dec 27 07:01:39 host sshd[16142]: input_userauth_request: invalid user root [preauth] Dec 27 07:01:39 host unix_chkpwd[16148]: password check failed for user (root) Dec 27 07:01:39 host sshd[16142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.39.97 user=root Dec 27 07:01:39 host sshd[16142]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 07:01:41 host sshd[16142]: Failed password for invalid user root from 178.128.39.97 port 39822 ssh2 Dec 27 07:01:41 host sshd[16142]: Received disconnect from 178.128.39.97 port 39822:11: Bye Bye [preauth] Dec 27 07:01:41 host sshd[16142]: Disconnected from 178.128.39.97 port 39822 [preauth] Dec 27 07:02:00 host sshd[16190]: User root from 190.221.60.242 not allowed because not listed in AllowUsers Dec 27 07:02:00 host sshd[16190]: input_userauth_request: invalid user root [preauth] Dec 27 07:02:00 host unix_chkpwd[16195]: password check failed for user (root) Dec 27 07:02:00 host sshd[16190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.221.60.242 user=root Dec 27 07:02:00 host sshd[16190]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 07:02:02 host sshd[16190]: Failed password for invalid user root from 190.221.60.242 port 57728 ssh2 Dec 27 07:02:02 host sshd[16190]: Received disconnect from 190.221.60.242 port 57728:11: Bye Bye [preauth] Dec 27 07:02:02 host sshd[16190]: Disconnected from 190.221.60.242 port 57728 [preauth] Dec 27 07:02:52 host sshd[16342]: User root from 46.107.214.210 not allowed because not listed in AllowUsers Dec 27 07:02:52 host sshd[16342]: input_userauth_request: invalid user root [preauth] Dec 27 07:02:52 host unix_chkpwd[16347]: password check failed for user (root) Dec 27 07:02:52 host sshd[16342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.107.214.210 user=root Dec 27 07:02:52 host sshd[16342]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 07:02:54 host sshd[16342]: Failed password for invalid user root from 46.107.214.210 port 40160 ssh2 Dec 27 07:02:54 host sshd[16342]: Received disconnect from 46.107.214.210 port 40160:11: Bye Bye [preauth] Dec 27 07:02:54 host sshd[16342]: Disconnected from 46.107.214.210 port 40160 [preauth] Dec 27 07:03:06 host sshd[16379]: User root from 103.179.198.14 not allowed because not listed in AllowUsers Dec 27 07:03:06 host sshd[16379]: input_userauth_request: invalid user root [preauth] Dec 27 07:03:06 host unix_chkpwd[16385]: password check failed for user (root) Dec 27 07:03:06 host sshd[16379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.179.198.14 user=root Dec 27 07:03:06 host sshd[16379]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 07:03:08 host sshd[16379]: Failed password for invalid user root from 103.179.198.14 port 54630 ssh2 Dec 27 07:03:08 host sshd[16379]: Received disconnect from 103.179.198.14 port 54630:11: Bye Bye [preauth] Dec 27 07:03:08 host sshd[16379]: Disconnected from 103.179.198.14 port 54630 [preauth] Dec 27 07:03:44 host sshd[16470]: User root from 198.199.86.89 not allowed because not listed in AllowUsers Dec 27 07:03:44 host sshd[16470]: input_userauth_request: invalid user root [preauth] Dec 27 07:03:44 host unix_chkpwd[16475]: password check failed for user (root) Dec 27 07:03:44 host sshd[16470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.86.89 user=root Dec 27 07:03:44 host sshd[16470]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 07:03:46 host sshd[16470]: Failed password for invalid user root from 198.199.86.89 port 49694 ssh2 Dec 27 07:03:46 host sshd[16470]: Received disconnect from 198.199.86.89 port 49694:11: Bye Bye [preauth] Dec 27 07:03:46 host sshd[16470]: Disconnected from 198.199.86.89 port 49694 [preauth] Dec 27 07:04:24 host sshd[16555]: User root from 187.189.175.4 not allowed because not listed in AllowUsers Dec 27 07:04:24 host sshd[16555]: input_userauth_request: invalid user root [preauth] Dec 27 07:04:24 host unix_chkpwd[16561]: password check failed for user (root) Dec 27 07:04:24 host sshd[16555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.189.175.4 user=root Dec 27 07:04:24 host sshd[16555]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 07:04:27 host sshd[16555]: Failed password for invalid user root from 187.189.175.4 port 54876 ssh2 Dec 27 07:04:27 host sshd[16555]: Received disconnect from 187.189.175.4 port 54876:11: Bye Bye [preauth] Dec 27 07:04:27 host sshd[16555]: Disconnected from 187.189.175.4 port 54876 [preauth] Dec 27 07:05:05 host sshd[16666]: User root from 132.148.75.52 not allowed because not listed in AllowUsers Dec 27 07:05:05 host sshd[16666]: input_userauth_request: invalid user root [preauth] Dec 27 07:05:05 host unix_chkpwd[16671]: password check failed for user (root) Dec 27 07:05:05 host sshd[16666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.148.75.52 user=root Dec 27 07:05:05 host sshd[16666]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 07:05:07 host sshd[16666]: Failed password for invalid user root from 132.148.75.52 port 51532 ssh2 Dec 27 07:05:08 host sshd[16666]: Received disconnect from 132.148.75.52 port 51532:11: Bye Bye [preauth] Dec 27 07:05:08 host sshd[16666]: Disconnected from 132.148.75.52 port 51532 [preauth] Dec 27 07:05:41 host sshd[16888]: User root from 178.128.39.97 not allowed because not listed in AllowUsers Dec 27 07:05:41 host sshd[16888]: input_userauth_request: invalid user root [preauth] Dec 27 07:05:41 host unix_chkpwd[16892]: password check failed for user (root) Dec 27 07:05:41 host sshd[16888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.39.97 user=root Dec 27 07:05:41 host sshd[16888]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 07:05:43 host sshd[16888]: Failed password for invalid user root from 178.128.39.97 port 44476 ssh2 Dec 27 07:05:43 host sshd[16888]: Received disconnect from 178.128.39.97 port 44476:11: Bye Bye [preauth] Dec 27 07:05:43 host sshd[16888]: Disconnected from 178.128.39.97 port 44476 [preauth] Dec 27 07:05:48 host sshd[16937]: User root from 107.172.218.217 not allowed because not listed in AllowUsers Dec 27 07:05:48 host sshd[16937]: input_userauth_request: invalid user root [preauth] Dec 27 07:05:48 host unix_chkpwd[16942]: password check failed for user (root) Dec 27 07:05:48 host sshd[16937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.172.218.217 user=root Dec 27 07:05:48 host sshd[16937]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 07:05:50 host sshd[16937]: Failed password for invalid user root from 107.172.218.217 port 58120 ssh2 Dec 27 07:06:09 host sshd[17030]: User root from 198.199.86.89 not allowed because not listed in AllowUsers Dec 27 07:06:09 host sshd[17030]: input_userauth_request: invalid user root [preauth] Dec 27 07:06:09 host unix_chkpwd[17033]: password check failed for user (root) Dec 27 07:06:09 host sshd[17030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.86.89 user=root Dec 27 07:06:09 host sshd[17030]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 07:06:12 host sshd[17030]: Failed password for invalid user root from 198.199.86.89 port 35160 ssh2 Dec 27 07:06:12 host sshd[17030]: Received disconnect from 198.199.86.89 port 35160:11: Bye Bye [preauth] Dec 27 07:06:12 host sshd[17030]: Disconnected from 198.199.86.89 port 35160 [preauth] Dec 27 07:06:27 host sshd[17113]: User root from 187.189.175.4 not allowed because not listed in AllowUsers Dec 27 07:06:27 host sshd[17113]: input_userauth_request: invalid user root [preauth] Dec 27 07:06:27 host unix_chkpwd[17117]: password check failed for user (root) Dec 27 07:06:27 host sshd[17113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.189.175.4 user=root Dec 27 07:06:27 host sshd[17113]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 07:06:30 host sshd[17113]: Failed password for invalid user root from 187.189.175.4 port 60276 ssh2 Dec 27 07:06:30 host sshd[17138]: Invalid user telecomadmin from 92.255.85.115 port 10338 Dec 27 07:06:30 host sshd[17138]: input_userauth_request: invalid user telecomadmin [preauth] Dec 27 07:06:30 host sshd[17138]: pam_unix(sshd:auth): check pass; user unknown Dec 27 07:06:30 host sshd[17138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115 Dec 27 07:06:32 host sshd[17138]: Failed password for invalid user telecomadmin from 92.255.85.115 port 10338 ssh2 Dec 27 07:06:32 host sshd[17138]: Connection reset by 92.255.85.115 port 10338 [preauth] Dec 27 07:06:49 host sshd[17214]: User root from 103.179.198.14 not allowed because not listed in AllowUsers Dec 27 07:06:49 host sshd[17214]: input_userauth_request: invalid user root [preauth] Dec 27 07:06:49 host unix_chkpwd[17218]: password check failed for user (root) Dec 27 07:06:49 host sshd[17214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.179.198.14 user=root Dec 27 07:06:49 host sshd[17214]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 07:06:51 host sshd[17214]: Failed password for invalid user root from 103.179.198.14 port 37768 ssh2 Dec 27 07:06:51 host sshd[17214]: Received disconnect from 103.179.198.14 port 37768:11: Bye Bye [preauth] Dec 27 07:06:51 host sshd[17214]: Disconnected from 103.179.198.14 port 37768 [preauth] Dec 27 07:06:55 host sshd[17244]: User root from 186.67.248.8 not allowed because not listed in AllowUsers Dec 27 07:06:55 host sshd[17244]: input_userauth_request: invalid user root [preauth] Dec 27 07:06:55 host unix_chkpwd[17262]: password check failed for user (root) Dec 27 07:06:55 host sshd[17244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.67.248.8 user=root Dec 27 07:06:55 host sshd[17244]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 07:06:58 host sshd[17244]: Failed password for invalid user root from 186.67.248.8 port 45908 ssh2 Dec 27 07:06:58 host sshd[17244]: Received disconnect from 186.67.248.8 port 45908:11: Bye Bye [preauth] Dec 27 07:06:58 host sshd[17244]: Disconnected from 186.67.248.8 port 45908 [preauth] Dec 27 07:07:32 host sshd[17391]: User root from 190.221.60.242 not allowed because not listed in AllowUsers Dec 27 07:07:32 host sshd[17391]: input_userauth_request: invalid user root [preauth] Dec 27 07:07:32 host unix_chkpwd[17396]: password check failed for user (root) Dec 27 07:07:32 host sshd[17391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.221.60.242 user=root Dec 27 07:07:32 host sshd[17391]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 07:07:34 host sshd[17391]: Failed password for invalid user root from 190.221.60.242 port 52962 ssh2 Dec 27 07:07:34 host sshd[17391]: Received disconnect from 190.221.60.242 port 52962:11: Bye Bye [preauth] Dec 27 07:07:34 host sshd[17391]: Disconnected from 190.221.60.242 port 52962 [preauth] Dec 27 07:07:45 host sshd[17442]: User root from 181.188.195.18 not allowed because not listed in AllowUsers Dec 27 07:07:45 host sshd[17442]: input_userauth_request: invalid user root [preauth] Dec 27 07:07:45 host unix_chkpwd[17447]: password check failed for user (root) Dec 27 07:07:45 host sshd[17442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.188.195.18 user=root Dec 27 07:07:45 host sshd[17442]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 07:07:48 host sshd[17442]: Failed password for invalid user root from 181.188.195.18 port 33106 ssh2 Dec 27 07:07:48 host sshd[17449]: User root from 132.148.75.52 not allowed because not listed in AllowUsers Dec 27 07:07:48 host sshd[17449]: input_userauth_request: invalid user root [preauth] Dec 27 07:07:48 host unix_chkpwd[17452]: password check failed for user (root) Dec 27 07:07:48 host sshd[17449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.148.75.52 user=root Dec 27 07:07:48 host sshd[17449]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 07:07:48 host sshd[17442]: Received disconnect from 181.188.195.18 port 33106:11: Bye Bye [preauth] Dec 27 07:07:48 host sshd[17442]: Disconnected from 181.188.195.18 port 33106 [preauth] Dec 27 07:07:49 host sshd[17449]: Failed password for invalid user root from 132.148.75.52 port 34522 ssh2 Dec 27 07:08:24 host sshd[17597]: User root from 38.88.67.218 not allowed because not listed in AllowUsers Dec 27 07:08:24 host sshd[17597]: input_userauth_request: invalid user root [preauth] Dec 27 07:08:24 host unix_chkpwd[17603]: password check failed for user (root) Dec 27 07:08:24 host sshd[17597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.88.67.218 user=root Dec 27 07:08:24 host sshd[17597]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 07:08:25 host sshd[17597]: Failed password for invalid user root from 38.88.67.218 port 31876 ssh2 Dec 27 07:08:25 host sshd[17597]: Received disconnect from 38.88.67.218 port 31876:11: Bye Bye [preauth] Dec 27 07:08:25 host sshd[17597]: Disconnected from 38.88.67.218 port 31876 [preauth] Dec 27 07:08:27 host sshd[17521]: Connection closed by 46.107.214.210 port 53156 [preauth] Dec 27 07:10:11 host sshd[17834]: User root from 46.107.214.210 not allowed because not listed in AllowUsers Dec 27 07:10:11 host sshd[17834]: input_userauth_request: invalid user root [preauth] Dec 27 07:10:11 host unix_chkpwd[17849]: password check failed for user (root) Dec 27 07:10:11 host sshd[17834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.107.214.210 user=root Dec 27 07:10:11 host sshd[17834]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 07:10:13 host sshd[17834]: Failed password for invalid user root from 46.107.214.210 port 42442 ssh2 Dec 27 07:10:14 host sshd[17834]: Received disconnect from 46.107.214.210 port 42442:11: Bye Bye [preauth] Dec 27 07:10:14 host sshd[17834]: Disconnected from 46.107.214.210 port 42442 [preauth] Dec 27 07:10:55 host sshd[18075]: Invalid user dj from 45.93.201.90 port 40936 Dec 27 07:10:55 host sshd[18075]: input_userauth_request: invalid user dj [preauth] Dec 27 07:10:55 host sshd[18075]: pam_unix(sshd:auth): check pass; user unknown Dec 27 07:10:55 host sshd[18075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 27 07:10:57 host sshd[18075]: Failed password for invalid user dj from 45.93.201.90 port 40936 ssh2 Dec 27 07:11:00 host sshd[18075]: pam_unix(sshd:auth): check pass; user unknown Dec 27 07:11:02 host sshd[18075]: Failed password for invalid user dj from 45.93.201.90 port 40936 ssh2 Dec 27 07:11:05 host sshd[18075]: pam_unix(sshd:auth): check pass; user unknown Dec 27 07:11:07 host sshd[18075]: Failed password for invalid user dj from 45.93.201.90 port 40936 ssh2 Dec 27 07:11:10 host sshd[18075]: Connection closed by 45.93.201.90 port 40936 [preauth] Dec 27 07:11:10 host sshd[18075]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 27 07:13:59 host sshd[18464]: User root from 38.88.67.218 not allowed because not listed in AllowUsers Dec 27 07:13:59 host sshd[18464]: input_userauth_request: invalid user root [preauth] Dec 27 07:13:59 host unix_chkpwd[18467]: password check failed for user (root) Dec 27 07:13:59 host sshd[18464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.88.67.218 user=root Dec 27 07:13:59 host sshd[18464]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 07:14:01 host sshd[18464]: Failed password for invalid user root from 38.88.67.218 port 6156 ssh2 Dec 27 07:14:01 host sshd[18464]: Received disconnect from 38.88.67.218 port 6156:11: Bye Bye [preauth] Dec 27 07:14:01 host sshd[18464]: Disconnected from 38.88.67.218 port 6156 [preauth] Dec 27 07:18:38 host sshd[19215]: Invalid user user from 103.13.40.2 port 46584 Dec 27 07:18:38 host sshd[19215]: input_userauth_request: invalid user user [preauth] Dec 27 07:18:38 host sshd[19215]: pam_unix(sshd:auth): check pass; user unknown Dec 27 07:18:38 host sshd[19215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 27 07:18:40 host sshd[19215]: Failed password for invalid user user from 103.13.40.2 port 46584 ssh2 Dec 27 07:18:40 host sshd[19215]: Connection closed by 103.13.40.2 port 46584 [preauth] Dec 27 07:18:57 host sshd[19244]: Invalid user from 64.62.197.43 port 6569 Dec 27 07:18:57 host sshd[19244]: input_userauth_request: invalid user [preauth] Dec 27 07:19:00 host sshd[19244]: Connection closed by 64.62.197.43 port 6569 [preauth] Dec 27 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 27 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 27 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 27 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 27 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 27 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 27 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 27 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 27 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 07:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 07:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 07:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 07:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 27 07:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 07:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 07:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=keralaholi user-2=wwwresourcehunte user-3=wwwrmswll user-4=ugotscom user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=a2zgroup user-9=dartsimp user-10=cochintaxi user-11=wwwkaretakers user-12=mrsclean user-13=wwwnexidigital user-14=palco123 user-15=gifterman user-16=kottayamcalldriv user-17=phmetals user-18=straightcurve user-19=wwwletsstalkfood user-20=bonifacegroup user-21=wwwevmhonda user-22=pmcresources user-23=vfmassets user-24=shalinijames user-25=wwwtestugo user-26=woodpeck user-27=wwwkapin user-28=wwwkmaorg user-29=disposeat user-30=remysagr feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 27 07:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 27 07:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 07:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 07:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 07:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 07:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 07:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-2b8AsmGv1MB4uWYX.~ Dec 27 07:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 07:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 07:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-2b8AsmGv1MB4uWYX.~' Dec 27 07:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 07:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 07:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-2b8AsmGv1MB4uWYX.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 07:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 07:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 07:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 27 07:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 07:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 07:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 27 07:21:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 07:21:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 27 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 27 07:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 27 07:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 27 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 27 07:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 07:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 27 07:21:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 07:21:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 27 07:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 07:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 07:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 27 07:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 07:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 07:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 27 07:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 07:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 07:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 27 07:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 07:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 27 07:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 07:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 07:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 27 07:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 07:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 07:23:57 host sshd[20205]: Invalid user jiangli from 162.218.126.136 port 60764 Dec 27 07:23:57 host sshd[20205]: input_userauth_request: invalid user jiangli [preauth] Dec 27 07:23:57 host sshd[20205]: pam_unix(sshd:auth): check pass; user unknown Dec 27 07:23:57 host sshd[20205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 27 07:23:59 host sshd[20205]: Failed password for invalid user jiangli from 162.218.126.136 port 60764 ssh2 Dec 27 07:24:00 host sshd[20205]: Connection closed by 162.218.126.136 port 60764 [preauth] Dec 27 07:41:49 host sshd[22943]: User root from 41.197.31.178 not allowed because not listed in AllowUsers Dec 27 07:41:49 host sshd[22943]: input_userauth_request: invalid user root [preauth] Dec 27 07:41:50 host unix_chkpwd[22947]: password check failed for user (root) Dec 27 07:41:50 host sshd[22943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 user=root Dec 27 07:41:50 host sshd[22943]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 07:41:51 host sshd[22943]: Failed password for invalid user root from 41.197.31.178 port 38272 ssh2 Dec 27 07:41:52 host sshd[22943]: Connection closed by 41.197.31.178 port 38272 [preauth] Dec 27 08:09:19 host sshd[27121]: Invalid user fyy from 92.46.108.20 port 40654 Dec 27 08:09:19 host sshd[27121]: input_userauth_request: invalid user fyy [preauth] Dec 27 08:09:19 host sshd[27121]: pam_unix(sshd:auth): check pass; user unknown Dec 27 08:09:19 host sshd[27121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 27 08:09:21 host sshd[27121]: Failed password for invalid user fyy from 92.46.108.20 port 40654 ssh2 Dec 27 08:09:21 host sshd[27121]: Connection closed by 92.46.108.20 port 40654 [preauth] Dec 27 08:21:21 host sshd[28844]: User root from 31.41.244.124 not allowed because not listed in AllowUsers Dec 27 08:21:21 host sshd[28844]: input_userauth_request: invalid user root [preauth] Dec 27 08:21:21 host unix_chkpwd[28853]: password check failed for user (root) Dec 27 08:21:21 host sshd[28844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 user=root Dec 27 08:21:21 host sshd[28844]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 08:21:23 host sshd[28844]: Failed password for invalid user root from 31.41.244.124 port 18954 ssh2 Dec 27 08:21:24 host sshd[28844]: Received disconnect from 31.41.244.124 port 18954:11: Client disconnecting normally [preauth] Dec 27 08:21:24 host sshd[28844]: Disconnected from 31.41.244.124 port 18954 [preauth] Dec 27 08:21:25 host sshd[28860]: Invalid user admin from 31.41.244.124 port 22749 Dec 27 08:21:25 host sshd[28860]: input_userauth_request: invalid user admin [preauth] Dec 27 08:21:25 host sshd[28860]: pam_unix(sshd:auth): check pass; user unknown Dec 27 08:21:25 host sshd[28860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Dec 27 08:21:27 host sshd[28860]: Failed password for invalid user admin from 31.41.244.124 port 22749 ssh2 Dec 27 08:21:27 host sshd[28860]: Received disconnect from 31.41.244.124 port 22749:11: Client disconnecting normally [preauth] Dec 27 08:21:27 host sshd[28860]: Disconnected from 31.41.244.124 port 22749 [preauth] Dec 27 08:21:28 host sshd[28888]: Invalid user admin from 31.41.244.124 port 27481 Dec 27 08:21:28 host sshd[28888]: input_userauth_request: invalid user admin [preauth] Dec 27 08:21:28 host sshd[28888]: pam_unix(sshd:auth): check pass; user unknown Dec 27 08:21:28 host sshd[28888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Dec 27 08:21:30 host sshd[28888]: Failed password for invalid user admin from 31.41.244.124 port 27481 ssh2 Dec 27 08:21:31 host sshd[28888]: Received disconnect from 31.41.244.124 port 27481:11: Client disconnecting normally [preauth] Dec 27 08:21:31 host sshd[28888]: Disconnected from 31.41.244.124 port 27481 [preauth] Dec 27 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 27 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 27 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 27 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 27 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 27 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 27 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 27 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 27 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 08:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 08:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 08:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 08:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 27 08:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkapin user-2=woodpeck user-3=disposeat user-4=remysagr user-5=wwwkmaorg user-6=pmcresources user-7=shalinijames user-8=wwwtestugo user-9=vfmassets user-10=wwwletsstalkfood user-11=straightcurve user-12=wwwevmhonda user-13=bonifacegroup user-14=wwwnexidigital user-15=mrsclean user-16=phmetals user-17=kottayamcalldriv user-18=palco123 user-19=gifterman user-20=wwwkaretakers user-21=cochintaxi user-22=laundryboniface user-23=a2zgroup user-24=dartsimp user-25=wwwpmcresource user-26=ugotscom user-27=keralaholi user-28=wwwresourcehunte user-29=wwwrmswll user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 27 08:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 27 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-k6zio7lFTYNkqzuH.~ Dec 27 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-k6zio7lFTYNkqzuH.~' Dec 27 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-k6zio7lFTYNkqzuH.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 27 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 27 08:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 08:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 08:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 08:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 08:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 08:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 08:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 08:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 08:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 08:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 08:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 08:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 27 08:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 08:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 27 08:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 27 08:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 27 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 27 08:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 08:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 08:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 27 08:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 08:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 08:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 27 08:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 08:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 08:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 27 08:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 08:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 27 08:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 08:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 27 08:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 08:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 08:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 27 08:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 08:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 08:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 27 08:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 08:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 08:23:05 host sshd[29316]: Invalid user user1 from 106.10.122.53 port 38896 Dec 27 08:23:05 host sshd[29316]: input_userauth_request: invalid user user1 [preauth] Dec 27 08:23:06 host sshd[29316]: pam_unix(sshd:auth): check pass; user unknown Dec 27 08:23:06 host sshd[29316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 27 08:23:07 host sshd[29316]: Failed password for invalid user user1 from 106.10.122.53 port 38896 ssh2 Dec 27 08:23:07 host sshd[29316]: Connection closed by 106.10.122.53 port 38896 [preauth] Dec 27 08:39:44 host sshd[31705]: Invalid user postgres from 91.212.166.22 port 51230 Dec 27 08:39:44 host sshd[31705]: input_userauth_request: invalid user postgres [preauth] Dec 27 08:39:44 host sshd[31705]: pam_unix(sshd:auth): check pass; user unknown Dec 27 08:39:44 host sshd[31705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.212.166.22 Dec 27 08:39:45 host sshd[31705]: Failed password for invalid user postgres from 91.212.166.22 port 51230 ssh2 Dec 27 08:39:49 host sshd[31705]: pam_unix(sshd:auth): check pass; user unknown Dec 27 08:39:50 host sshd[31705]: Failed password for invalid user postgres from 91.212.166.22 port 51230 ssh2 Dec 27 08:39:54 host sshd[31705]: pam_unix(sshd:auth): check pass; user unknown Dec 27 08:39:55 host sshd[31705]: Failed password for invalid user postgres from 91.212.166.22 port 51230 ssh2 Dec 27 08:39:59 host sshd[31705]: pam_unix(sshd:auth): check pass; user unknown Dec 27 08:40:01 host sshd[31705]: Failed password for invalid user postgres from 91.212.166.22 port 51230 ssh2 Dec 27 08:40:05 host sshd[31794]: Invalid user oracle from 162.218.126.136 port 57158 Dec 27 08:40:05 host sshd[31794]: input_userauth_request: invalid user oracle [preauth] Dec 27 08:40:05 host sshd[31794]: pam_unix(sshd:auth): check pass; user unknown Dec 27 08:40:05 host sshd[31794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 27 08:40:07 host sshd[31794]: Failed password for invalid user oracle from 162.218.126.136 port 57158 ssh2 Dec 27 08:40:08 host sshd[31794]: Connection closed by 162.218.126.136 port 57158 [preauth] Dec 27 08:47:20 host sshd[407]: Invalid user user from 103.13.40.2 port 38880 Dec 27 08:47:20 host sshd[407]: input_userauth_request: invalid user user [preauth] Dec 27 08:47:20 host sshd[407]: pam_unix(sshd:auth): check pass; user unknown Dec 27 08:47:20 host sshd[407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 27 08:47:22 host sshd[407]: Failed password for invalid user user from 103.13.40.2 port 38880 ssh2 Dec 27 08:47:22 host sshd[407]: Connection closed by 103.13.40.2 port 38880 [preauth] Dec 27 08:58:30 host sshd[2401]: Invalid user dk from 45.93.201.90 port 35930 Dec 27 08:58:30 host sshd[2401]: input_userauth_request: invalid user dk [preauth] Dec 27 08:58:30 host sshd[2401]: pam_unix(sshd:auth): check pass; user unknown Dec 27 08:58:30 host sshd[2401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 27 08:58:32 host sshd[2401]: Failed password for invalid user dk from 45.93.201.90 port 35930 ssh2 Dec 27 08:58:36 host sshd[2401]: pam_unix(sshd:auth): check pass; user unknown Dec 27 08:58:38 host sshd[2401]: Failed password for invalid user dk from 45.93.201.90 port 35930 ssh2 Dec 27 08:58:41 host sshd[2401]: pam_unix(sshd:auth): check pass; user unknown Dec 27 08:58:44 host sshd[2401]: Failed password for invalid user dk from 45.93.201.90 port 35930 ssh2 Dec 27 08:58:47 host sshd[2401]: Connection closed by 45.93.201.90 port 35930 [preauth] Dec 27 08:58:47 host sshd[2401]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 27 09:00:48 host sshd[2847]: User root from 50.62.182.47 not allowed because not listed in AllowUsers Dec 27 09:00:48 host sshd[2847]: input_userauth_request: invalid user root [preauth] Dec 27 09:00:48 host unix_chkpwd[2853]: password check failed for user (root) Dec 27 09:00:48 host sshd[2847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.62.182.47 user=root Dec 27 09:00:48 host sshd[2847]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 09:00:50 host sshd[2847]: Failed password for invalid user root from 50.62.182.47 port 50905 ssh2 Dec 27 09:00:51 host unix_chkpwd[2857]: password check failed for user (root) Dec 27 09:00:51 host sshd[2847]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 09:00:53 host sshd[2847]: Failed password for invalid user root from 50.62.182.47 port 50905 ssh2 Dec 27 09:00:53 host unix_chkpwd[2863]: password check failed for user (root) Dec 27 09:00:53 host sshd[2847]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 09:00:56 host sshd[2847]: Failed password for invalid user root from 50.62.182.47 port 50905 ssh2 Dec 27 09:00:56 host unix_chkpwd[2868]: password check failed for user (root) Dec 27 09:00:56 host sshd[2847]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 09:00:57 host sshd[2847]: Failed password for invalid user root from 50.62.182.47 port 50905 ssh2 Dec 27 09:00:58 host unix_chkpwd[2871]: password check failed for user (root) Dec 27 09:00:58 host sshd[2847]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 09:01:00 host sshd[2847]: Failed password for invalid user root from 50.62.182.47 port 50905 ssh2 Dec 27 09:13:41 host sshd[5041]: User root from 190.145.25.163 not allowed because not listed in AllowUsers Dec 27 09:13:41 host sshd[5041]: input_userauth_request: invalid user root [preauth] Dec 27 09:13:41 host unix_chkpwd[5046]: password check failed for user (root) Dec 27 09:13:41 host sshd[5041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.25.163 user=root Dec 27 09:13:41 host sshd[5041]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 09:13:43 host sshd[5041]: Failed password for invalid user root from 190.145.25.163 port 37100 ssh2 Dec 27 09:13:43 host sshd[5041]: Received disconnect from 190.145.25.163 port 37100:11: Bye Bye [preauth] Dec 27 09:13:43 host sshd[5041]: Disconnected from 190.145.25.163 port 37100 [preauth] Dec 27 09:15:03 host sshd[5333]: User root from 85.62.218.82 not allowed because not listed in AllowUsers Dec 27 09:15:03 host sshd[5333]: input_userauth_request: invalid user root [preauth] Dec 27 09:15:03 host unix_chkpwd[5337]: password check failed for user (root) Dec 27 09:15:03 host sshd[5333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.62.218.82 user=root Dec 27 09:15:03 host sshd[5333]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 09:15:05 host sshd[5333]: Failed password for invalid user root from 85.62.218.82 port 35534 ssh2 Dec 27 09:15:06 host sshd[5333]: Received disconnect from 85.62.218.82 port 35534:11: Bye Bye [preauth] Dec 27 09:15:06 host sshd[5333]: Disconnected from 85.62.218.82 port 35534 [preauth] Dec 27 09:15:20 host sshd[5364]: User root from 190.145.25.163 not allowed because not listed in AllowUsers Dec 27 09:15:20 host sshd[5364]: input_userauth_request: invalid user root [preauth] Dec 27 09:15:20 host unix_chkpwd[5370]: password check failed for user (root) Dec 27 09:15:20 host sshd[5364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.25.163 user=root Dec 27 09:15:20 host sshd[5364]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 09:15:22 host sshd[5364]: Failed password for invalid user root from 190.145.25.163 port 11725 ssh2 Dec 27 09:15:23 host sshd[5364]: Received disconnect from 190.145.25.163 port 11725:11: Bye Bye [preauth] Dec 27 09:15:23 host sshd[5364]: Disconnected from 190.145.25.163 port 11725 [preauth] Dec 27 09:15:58 host sshd[5502]: User root from 51.83.131.123 not allowed because not listed in AllowUsers Dec 27 09:15:58 host sshd[5502]: input_userauth_request: invalid user root [preauth] Dec 27 09:15:58 host unix_chkpwd[5505]: password check failed for user (root) Dec 27 09:15:58 host sshd[5502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.131.123 user=root Dec 27 09:15:58 host sshd[5502]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 09:16:01 host sshd[5502]: Failed password for invalid user root from 51.83.131.123 port 47902 ssh2 Dec 27 09:16:01 host sshd[5502]: Received disconnect from 51.83.131.123 port 47902:11: Bye Bye [preauth] Dec 27 09:16:01 host sshd[5502]: Disconnected from 51.83.131.123 port 47902 [preauth] Dec 27 09:17:48 host sshd[5753]: User root from 116.193.190.120 not allowed because not listed in AllowUsers Dec 27 09:17:48 host sshd[5753]: input_userauth_request: invalid user root [preauth] Dec 27 09:17:48 host unix_chkpwd[5756]: password check failed for user (root) Dec 27 09:17:48 host sshd[5753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.193.190.120 user=root Dec 27 09:17:48 host sshd[5753]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 09:17:51 host sshd[5753]: Failed password for invalid user root from 116.193.190.120 port 54046 ssh2 Dec 27 09:17:51 host sshd[5753]: Received disconnect from 116.193.190.120 port 54046:11: Bye Bye [preauth] Dec 27 09:17:51 host sshd[5753]: Disconnected from 116.193.190.120 port 54046 [preauth] Dec 27 09:18:39 host sshd[5873]: User root from 85.62.218.82 not allowed because not listed in AllowUsers Dec 27 09:18:39 host sshd[5873]: input_userauth_request: invalid user root [preauth] Dec 27 09:18:39 host unix_chkpwd[5877]: password check failed for user (root) Dec 27 09:18:39 host sshd[5873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.62.218.82 user=root Dec 27 09:18:39 host sshd[5873]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 09:18:41 host sshd[5873]: Failed password for invalid user root from 85.62.218.82 port 60878 ssh2 Dec 27 09:18:41 host sshd[5873]: Received disconnect from 85.62.218.82 port 60878:11: Bye Bye [preauth] Dec 27 09:18:41 host sshd[5873]: Disconnected from 85.62.218.82 port 60878 [preauth] Dec 27 09:20:26 host sshd[6241]: User root from 36.66.16.233 not allowed because not listed in AllowUsers Dec 27 09:20:26 host sshd[6241]: input_userauth_request: invalid user root [preauth] Dec 27 09:20:26 host unix_chkpwd[6244]: password check failed for user (root) Dec 27 09:20:26 host sshd[6241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.66.16.233 user=root Dec 27 09:20:26 host sshd[6241]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 09:20:29 host sshd[6241]: Failed password for invalid user root from 36.66.16.233 port 53894 ssh2 Dec 27 09:20:29 host sshd[6241]: Received disconnect from 36.66.16.233 port 53894:11: Bye Bye [preauth] Dec 27 09:20:29 host sshd[6241]: Disconnected from 36.66.16.233 port 53894 [preauth] Dec 27 09:20:59 host sshd[6338]: User root from 51.83.131.123 not allowed because not listed in AllowUsers Dec 27 09:20:59 host sshd[6338]: input_userauth_request: invalid user root [preauth] Dec 27 09:20:59 host unix_chkpwd[6342]: password check failed for user (root) Dec 27 09:20:59 host sshd[6338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.131.123 user=root Dec 27 09:20:59 host sshd[6338]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 09:21:01 host sshd[6338]: Failed password for invalid user root from 51.83.131.123 port 43018 ssh2 Dec 27 09:21:01 host sshd[6338]: Received disconnect from 51.83.131.123 port 43018:11: Bye Bye [preauth] Dec 27 09:21:01 host sshd[6338]: Disconnected from 51.83.131.123 port 43018 [preauth] Dec 27 09:21:26 host sshd[6457]: User root from 116.193.190.120 not allowed because not listed in AllowUsers Dec 27 09:21:26 host sshd[6457]: input_userauth_request: invalid user root [preauth] Dec 27 09:21:26 host unix_chkpwd[6460]: password check failed for user (root) Dec 27 09:21:26 host sshd[6457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.193.190.120 user=root Dec 27 09:21:26 host sshd[6457]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 09:21:27 host sshd[6457]: Failed password for invalid user root from 116.193.190.120 port 54396 ssh2 Dec 27 09:21:28 host sshd[6457]: Received disconnect from 116.193.190.120 port 54396:11: Bye Bye [preauth] Dec 27 09:21:28 host sshd[6457]: Disconnected from 116.193.190.120 port 54396 [preauth] Dec 27 09:21:42 host sshd[6519]: User root from 80.94.92.241 not allowed because not listed in AllowUsers Dec 27 09:21:42 host sshd[6519]: input_userauth_request: invalid user root [preauth] Dec 27 09:21:42 host sshd[6521]: User root from 80.94.92.241 not allowed because not listed in AllowUsers Dec 27 09:21:42 host sshd[6521]: input_userauth_request: invalid user root [preauth] Dec 27 09:21:42 host unix_chkpwd[6523]: password check failed for user (root) Dec 27 09:21:42 host sshd[6519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.94.92.241 user=root Dec 27 09:21:42 host sshd[6519]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 09:21:42 host unix_chkpwd[6526]: password check failed for user (root) Dec 27 09:21:42 host sshd[6521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.94.92.241 user=root Dec 27 09:21:43 host sshd[6521]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 09:21:43 host sshd[6519]: Failed password for invalid user root from 80.94.92.241 port 34392 ssh2 Dec 27 09:21:44 host sshd[6519]: Connection closed by 80.94.92.241 port 34392 [preauth] Dec 27 09:21:44 host sshd[6521]: Failed password for invalid user root from 80.94.92.241 port 34394 ssh2 Dec 27 09:21:44 host sshd[6521]: Connection closed by 80.94.92.241 port 34394 [preauth] Dec 27 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 27 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 27 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 27 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 27 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 27 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 27 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 27 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 27 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 09:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 09:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 27 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=dartsimp user-3=a2zgroup user-4=wwwkaretakers user-5=cochintaxi user-6=ugotscom user-7=wwwrmswll user-8=keralaholi user-9=wwwresourcehunte user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=wwwtestugo user-14=shalinijames user-15=vfmassets user-16=woodpeck user-17=wwwkapin user-18=disposeat user-19=wwwkmaorg user-20=remysagr user-21=mrsclean user-22=wwwnexidigital user-23=kottayamcalldriv user-24=phmetals user-25=gifterman user-26=palco123 user-27=wwwletsstalkfood user-28=straightcurve user-29=wwwevmhonda user-30=bonifacegroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 27 09:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 27 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Sp6GxzEXCN2nh9nV.~ Dec 27 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Sp6GxzEXCN2nh9nV.~' Dec 27 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Sp6GxzEXCN2nh9nV.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 27 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 09:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 27 09:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 09:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 27 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 09:21:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 09:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 09:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 09:21:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 09:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 27 09:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 27 09:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 27 09:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 27 09:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 09:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 27 09:21:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 09:22:00 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 09:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 27 09:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 09:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 09:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 27 09:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 09:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 09:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 27 09:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 09:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 09:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 27 09:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 09:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 09:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 27 09:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 09:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 09:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 27 09:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 09:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 09:23:58 host sshd[7053]: User root from 36.66.16.233 not allowed because not listed in AllowUsers Dec 27 09:23:58 host sshd[7053]: input_userauth_request: invalid user root [preauth] Dec 27 09:23:58 host unix_chkpwd[7057]: password check failed for user (root) Dec 27 09:23:58 host sshd[7053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.66.16.233 user=root Dec 27 09:23:58 host sshd[7053]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 09:24:01 host sshd[7053]: Failed password for invalid user root from 36.66.16.233 port 55562 ssh2 Dec 27 09:24:01 host sshd[7053]: Received disconnect from 36.66.16.233 port 55562:11: Bye Bye [preauth] Dec 27 09:24:01 host sshd[7053]: Disconnected from 36.66.16.233 port 55562 [preauth] Dec 27 09:34:24 host sshd[8935]: Invalid user admin from 41.197.31.178 port 47346 Dec 27 09:34:24 host sshd[8935]: input_userauth_request: invalid user admin [preauth] Dec 27 09:34:25 host sshd[8935]: pam_unix(sshd:auth): check pass; user unknown Dec 27 09:34:25 host sshd[8935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 27 09:34:27 host sshd[8935]: Failed password for invalid user admin from 41.197.31.178 port 47346 ssh2 Dec 27 09:34:27 host sshd[8935]: Connection closed by 41.197.31.178 port 47346 [preauth] Dec 27 09:53:00 host sshd[12241]: Invalid user user1 from 162.218.126.136 port 59944 Dec 27 09:53:00 host sshd[12241]: input_userauth_request: invalid user user1 [preauth] Dec 27 09:53:00 host sshd[12241]: pam_unix(sshd:auth): check pass; user unknown Dec 27 09:53:00 host sshd[12241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 27 09:53:02 host sshd[12241]: Failed password for invalid user user1 from 162.218.126.136 port 59944 ssh2 Dec 27 09:53:02 host sshd[12257]: Invalid user zy from 106.10.122.53 port 52682 Dec 27 09:53:02 host sshd[12257]: input_userauth_request: invalid user zy [preauth] Dec 27 09:53:02 host sshd[12257]: pam_unix(sshd:auth): check pass; user unknown Dec 27 09:53:02 host sshd[12257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 27 09:53:02 host sshd[12241]: Connection closed by 162.218.126.136 port 59944 [preauth] Dec 27 09:53:04 host sshd[12257]: Failed password for invalid user zy from 106.10.122.53 port 52682 ssh2 Dec 27 09:53:04 host sshd[12257]: Connection closed by 106.10.122.53 port 52682 [preauth] Dec 27 09:53:12 host sshd[12284]: User root from 37.182.160.215 not allowed because not listed in AllowUsers Dec 27 09:53:12 host sshd[12284]: input_userauth_request: invalid user root [preauth] Dec 27 09:53:12 host unix_chkpwd[12289]: password check failed for user (root) Dec 27 09:53:12 host sshd[12284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.182.160.215 user=root Dec 27 09:53:12 host sshd[12284]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 09:53:14 host sshd[12284]: Failed password for invalid user root from 37.182.160.215 port 47395 ssh2 Dec 27 09:53:14 host sshd[12284]: Received disconnect from 37.182.160.215 port 47395:11: Bye Bye [preauth] Dec 27 09:53:14 host sshd[12284]: Disconnected from 37.182.160.215 port 47395 [preauth] Dec 27 09:55:44 host sshd[12692]: Did not receive identification string from 61.189.43.58 port 46264 Dec 27 09:56:01 host sshd[12802]: User root from 197.155.234.157 not allowed because not listed in AllowUsers Dec 27 09:56:01 host sshd[12802]: input_userauth_request: invalid user root [preauth] Dec 27 09:56:01 host unix_chkpwd[12808]: password check failed for user (root) Dec 27 09:56:01 host sshd[12802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.155.234.157 user=root Dec 27 09:56:01 host sshd[12802]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 09:56:03 host sshd[12802]: Failed password for invalid user root from 197.155.234.157 port 45638 ssh2 Dec 27 09:56:03 host sshd[12802]: Received disconnect from 197.155.234.157 port 45638:11: Bye Bye [preauth] Dec 27 09:56:03 host sshd[12802]: Disconnected from 197.155.234.157 port 45638 [preauth] Dec 27 09:58:24 host sshd[13096]: User root from 37.182.160.215 not allowed because not listed in AllowUsers Dec 27 09:58:24 host sshd[13096]: input_userauth_request: invalid user root [preauth] Dec 27 09:58:24 host unix_chkpwd[13099]: password check failed for user (root) Dec 27 09:58:24 host sshd[13096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.182.160.215 user=root Dec 27 09:58:24 host sshd[13096]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 09:58:26 host sshd[13096]: Failed password for invalid user root from 37.182.160.215 port 52388 ssh2 Dec 27 10:00:28 host sshd[13534]: User root from 197.155.234.157 not allowed because not listed in AllowUsers Dec 27 10:00:28 host sshd[13534]: input_userauth_request: invalid user root [preauth] Dec 27 10:00:28 host unix_chkpwd[13538]: password check failed for user (root) Dec 27 10:00:28 host sshd[13534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.155.234.157 user=root Dec 27 10:00:28 host sshd[13534]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 10:00:30 host sshd[13534]: Failed password for invalid user root from 197.155.234.157 port 56238 ssh2 Dec 27 10:08:17 host sshd[14633]: User root from 130.162.56.240 not allowed because not listed in AllowUsers Dec 27 10:08:17 host sshd[14633]: input_userauth_request: invalid user root [preauth] Dec 27 10:08:17 host unix_chkpwd[14636]: password check failed for user (root) Dec 27 10:08:17 host sshd[14633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.162.56.240 user=root Dec 27 10:08:17 host sshd[14633]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 10:08:20 host sshd[14633]: Failed password for invalid user root from 130.162.56.240 port 53554 ssh2 Dec 27 10:08:20 host sshd[14633]: Received disconnect from 130.162.56.240 port 53554:11: Bye Bye [preauth] Dec 27 10:08:20 host sshd[14633]: Disconnected from 130.162.56.240 port 53554 [preauth] Dec 27 10:08:56 host sshd[14705]: User root from 143.110.153.150 not allowed because not listed in AllowUsers Dec 27 10:08:56 host sshd[14705]: input_userauth_request: invalid user root [preauth] Dec 27 10:08:56 host unix_chkpwd[14710]: password check failed for user (root) Dec 27 10:08:56 host sshd[14705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.153.150 user=root Dec 27 10:08:56 host sshd[14705]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 10:08:58 host sshd[14705]: Failed password for invalid user root from 143.110.153.150 port 40986 ssh2 Dec 27 10:08:58 host sshd[14705]: Received disconnect from 143.110.153.150 port 40986:11: Bye Bye [preauth] Dec 27 10:08:58 host sshd[14705]: Disconnected from 143.110.153.150 port 40986 [preauth] Dec 27 10:10:30 host sshd[14969]: User root from 143.110.153.150 not allowed because not listed in AllowUsers Dec 27 10:10:30 host sshd[14969]: input_userauth_request: invalid user root [preauth] Dec 27 10:10:31 host unix_chkpwd[14972]: password check failed for user (root) Dec 27 10:10:31 host sshd[14969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.153.150 user=root Dec 27 10:10:31 host sshd[14969]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 10:10:33 host sshd[14969]: Failed password for invalid user root from 143.110.153.150 port 39178 ssh2 Dec 27 10:10:33 host sshd[14969]: Received disconnect from 143.110.153.150 port 39178:11: Bye Bye [preauth] Dec 27 10:10:33 host sshd[14969]: Disconnected from 143.110.153.150 port 39178 [preauth] Dec 27 10:15:07 host sshd[15680]: User root from 142.44.240.83 not allowed because not listed in AllowUsers Dec 27 10:15:07 host sshd[15680]: input_userauth_request: invalid user root [preauth] Dec 27 10:15:07 host unix_chkpwd[15684]: password check failed for user (root) Dec 27 10:15:07 host sshd[15680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.240.83 user=root Dec 27 10:15:07 host sshd[15680]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 10:15:09 host sshd[15680]: Failed password for invalid user root from 142.44.240.83 port 60110 ssh2 Dec 27 10:15:09 host sshd[15680]: Received disconnect from 142.44.240.83 port 60110:11: Bye Bye [preauth] Dec 27 10:15:09 host sshd[15680]: Disconnected from 142.44.240.83 port 60110 [preauth] Dec 27 10:15:43 host sshd[15899]: Invalid user user from 103.13.40.2 port 48704 Dec 27 10:15:43 host sshd[15899]: input_userauth_request: invalid user user [preauth] Dec 27 10:15:43 host sshd[15899]: pam_unix(sshd:auth): check pass; user unknown Dec 27 10:15:43 host sshd[15899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 27 10:15:45 host sshd[15899]: Failed password for invalid user user from 103.13.40.2 port 48704 ssh2 Dec 27 10:15:45 host sshd[15899]: Connection closed by 103.13.40.2 port 48704 [preauth] Dec 27 10:16:26 host sshd[15972]: User root from 201.6.107.69 not allowed because not listed in AllowUsers Dec 27 10:16:26 host sshd[15972]: input_userauth_request: invalid user root [preauth] Dec 27 10:16:26 host unix_chkpwd[16003]: password check failed for user (root) Dec 27 10:16:26 host sshd[15972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.6.107.69 user=root Dec 27 10:16:26 host sshd[15972]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 10:16:28 host sshd[15972]: Failed password for invalid user root from 201.6.107.69 port 50138 ssh2 Dec 27 10:16:28 host sshd[15972]: Received disconnect from 201.6.107.69 port 50138:11: Bye Bye [preauth] Dec 27 10:16:28 host sshd[15972]: Disconnected from 201.6.107.69 port 50138 [preauth] Dec 27 10:16:55 host sshd[16025]: User root from 185.137.27.170 not allowed because not listed in AllowUsers Dec 27 10:16:55 host sshd[16025]: input_userauth_request: invalid user root [preauth] Dec 27 10:16:55 host unix_chkpwd[16034]: password check failed for user (root) Dec 27 10:16:55 host sshd[16025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.137.27.170 user=root Dec 27 10:16:55 host sshd[16025]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 10:16:57 host sshd[16025]: Failed password for invalid user root from 185.137.27.170 port 52382 ssh2 Dec 27 10:16:57 host sshd[16025]: Received disconnect from 185.137.27.170 port 52382:11: Bye Bye [preauth] Dec 27 10:16:57 host sshd[16025]: Disconnected from 185.137.27.170 port 52382 [preauth] Dec 27 10:17:51 host sshd[16148]: User root from 188.250.172.49 not allowed because not listed in AllowUsers Dec 27 10:17:51 host sshd[16148]: input_userauth_request: invalid user root [preauth] Dec 27 10:17:51 host unix_chkpwd[16155]: password check failed for user (root) Dec 27 10:17:51 host sshd[16148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.250.172.49 user=root Dec 27 10:17:51 host sshd[16148]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 10:17:53 host sshd[16148]: Failed password for invalid user root from 188.250.172.49 port 55614 ssh2 Dec 27 10:17:54 host sshd[16148]: Received disconnect from 188.250.172.49 port 55614:11: Bye Bye [preauth] Dec 27 10:17:54 host sshd[16148]: Disconnected from 188.250.172.49 port 55614 [preauth] Dec 27 10:18:16 host sshd[16202]: User root from 130.162.56.240 not allowed because not listed in AllowUsers Dec 27 10:18:16 host sshd[16202]: input_userauth_request: invalid user root [preauth] Dec 27 10:18:16 host unix_chkpwd[16205]: password check failed for user (root) Dec 27 10:18:16 host sshd[16202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.162.56.240 user=root Dec 27 10:18:16 host sshd[16202]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 10:18:18 host sshd[16202]: Failed password for invalid user root from 130.162.56.240 port 49644 ssh2 Dec 27 10:18:18 host sshd[16202]: Received disconnect from 130.162.56.240 port 49644:11: Bye Bye [preauth] Dec 27 10:18:18 host sshd[16202]: Disconnected from 130.162.56.240 port 49644 [preauth] Dec 27 10:18:27 host sshd[16247]: User root from 77.235.29.116 not allowed because not listed in AllowUsers Dec 27 10:18:27 host sshd[16247]: input_userauth_request: invalid user root [preauth] Dec 27 10:18:27 host unix_chkpwd[16277]: password check failed for user (root) Dec 27 10:18:27 host sshd[16247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.235.29.116 user=root Dec 27 10:18:27 host sshd[16247]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 10:18:29 host sshd[16247]: Failed password for invalid user root from 77.235.29.116 port 34706 ssh2 Dec 27 10:18:29 host sshd[16247]: Received disconnect from 77.235.29.116 port 34706:11: Bye Bye [preauth] Dec 27 10:18:29 host sshd[16247]: Disconnected from 77.235.29.116 port 34706 [preauth] Dec 27 10:19:01 host sshd[16317]: User root from 130.162.37.223 not allowed because not listed in AllowUsers Dec 27 10:19:01 host sshd[16317]: input_userauth_request: invalid user root [preauth] Dec 27 10:19:02 host unix_chkpwd[16332]: password check failed for user (root) Dec 27 10:19:02 host sshd[16317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.162.37.223 user=root Dec 27 10:19:02 host sshd[16317]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 10:19:03 host sshd[16317]: Failed password for invalid user root from 130.162.37.223 port 57244 ssh2 Dec 27 10:19:04 host sshd[16317]: Received disconnect from 130.162.37.223 port 57244:11: Bye Bye [preauth] Dec 27 10:19:04 host sshd[16317]: Disconnected from 130.162.37.223 port 57244 [preauth] Dec 27 10:19:36 host sshd[16414]: User root from 185.137.27.166 not allowed because not listed in AllowUsers Dec 27 10:19:36 host sshd[16414]: input_userauth_request: invalid user root [preauth] Dec 27 10:19:36 host unix_chkpwd[16421]: password check failed for user (root) Dec 27 10:19:36 host sshd[16414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.137.27.166 user=root Dec 27 10:19:36 host sshd[16414]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 10:19:39 host sshd[16414]: Failed password for invalid user root from 185.137.27.166 port 54850 ssh2 Dec 27 10:19:43 host sshd[16414]: Received disconnect from 185.137.27.166 port 54850:11: Bye Bye [preauth] Dec 27 10:19:43 host sshd[16414]: Disconnected from 185.137.27.166 port 54850 [preauth] Dec 27 10:20:30 host sshd[16545]: User root from 139.59.189.130 not allowed because not listed in AllowUsers Dec 27 10:20:30 host sshd[16545]: input_userauth_request: invalid user root [preauth] Dec 27 10:20:30 host unix_chkpwd[16548]: password check failed for user (root) Dec 27 10:20:30 host sshd[16545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.189.130 user=root Dec 27 10:20:30 host sshd[16545]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 10:20:33 host sshd[16545]: Failed password for invalid user root from 139.59.189.130 port 39620 ssh2 Dec 27 10:20:33 host sshd[16545]: Received disconnect from 139.59.189.130 port 39620:11: Bye Bye [preauth] Dec 27 10:20:33 host sshd[16545]: Disconnected from 139.59.189.130 port 39620 [preauth] Dec 27 10:20:51 host sshd[16570]: User root from 205.134.184.122 not allowed because not listed in AllowUsers Dec 27 10:20:51 host sshd[16570]: input_userauth_request: invalid user root [preauth] Dec 27 10:20:51 host unix_chkpwd[16576]: password check failed for user (root) Dec 27 10:20:51 host sshd[16570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.134.184.122 user=root Dec 27 10:20:51 host sshd[16570]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 10:20:53 host sshd[16570]: Failed password for invalid user root from 205.134.184.122 port 45892 ssh2 Dec 27 10:20:53 host sshd[16570]: Received disconnect from 205.134.184.122 port 45892:11: Bye Bye [preauth] Dec 27 10:20:53 host sshd[16570]: Disconnected from 205.134.184.122 port 45892 [preauth] Dec 27 10:21:09 host sshd[16610]: User root from 43.155.128.224 not allowed because not listed in AllowUsers Dec 27 10:21:09 host sshd[16610]: input_userauth_request: invalid user root [preauth] Dec 27 10:21:09 host unix_chkpwd[16613]: password check failed for user (root) Dec 27 10:21:09 host sshd[16610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.128.224 user=root Dec 27 10:21:09 host sshd[16610]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 10:21:11 host sshd[16610]: Failed password for invalid user root from 43.155.128.224 port 37252 ssh2 Dec 27 10:21:11 host sshd[16610]: Received disconnect from 43.155.128.224 port 37252:11: Bye Bye [preauth] Dec 27 10:21:11 host sshd[16610]: Disconnected from 43.155.128.224 port 37252 [preauth] Dec 27 10:21:22 host sshd[16629]: User root from 130.162.37.223 not allowed because not listed in AllowUsers Dec 27 10:21:22 host sshd[16629]: input_userauth_request: invalid user root [preauth] Dec 27 10:21:22 host unix_chkpwd[16632]: password check failed for user (root) Dec 27 10:21:22 host sshd[16629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.162.37.223 user=root Dec 27 10:21:22 host sshd[16629]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 10:21:22 host sshd[16627]: User root from 188.250.172.49 not allowed because not listed in AllowUsers Dec 27 10:21:22 host sshd[16627]: input_userauth_request: invalid user root [preauth] Dec 27 10:21:22 host unix_chkpwd[16633]: password check failed for user (root) Dec 27 10:21:22 host sshd[16627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.250.172.49 user=root Dec 27 10:21:22 host sshd[16627]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 10:21:25 host sshd[16629]: Failed password for invalid user root from 130.162.37.223 port 39858 ssh2 Dec 27 10:21:25 host sshd[16629]: Received disconnect from 130.162.37.223 port 39858:11: Bye Bye [preauth] Dec 27 10:21:25 host sshd[16629]: Disconnected from 130.162.37.223 port 39858 [preauth] Dec 27 10:21:25 host sshd[16627]: Failed password for invalid user root from 188.250.172.49 port 30486 ssh2 Dec 27 10:21:25 host sshd[16627]: Received disconnect from 188.250.172.49 port 30486:11: Bye Bye [preauth] Dec 27 10:21:25 host sshd[16627]: Disconnected from 188.250.172.49 port 30486 [preauth] Dec 27 10:21:34 host sshd[16832]: User root from 142.44.240.83 not allowed because not listed in AllowUsers Dec 27 10:21:34 host sshd[16832]: input_userauth_request: invalid user root [preauth] Dec 27 10:21:34 host unix_chkpwd[16835]: password check failed for user (root) Dec 27 10:21:34 host sshd[16832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.240.83 user=root Dec 27 10:21:34 host sshd[16832]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 10:21:37 host sshd[16832]: Failed password for invalid user root from 142.44.240.83 port 40916 ssh2 Dec 27 10:21:44 host sshd[16873]: User root from 46.101.175.103 not allowed because not listed in AllowUsers Dec 27 10:21:44 host sshd[16873]: input_userauth_request: invalid user root [preauth] Dec 27 10:21:44 host unix_chkpwd[16876]: password check failed for user (root) Dec 27 10:21:44 host sshd[16873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.175.103 user=root Dec 27 10:21:44 host sshd[16873]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 10:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 10:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 10:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 27 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 10:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 27 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 10:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 27 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 10:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 27 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 10:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 27 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 10:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 27 10:21:46 host sshd[16873]: Failed password for invalid user root from 46.101.175.103 port 48130 ssh2 Dec 27 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 10:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 27 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 10:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 27 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 10:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 10:21:47 host sshd[16873]: Received disconnect from 46.101.175.103 port 48130:11: Bye Bye [preauth] Dec 27 10:21:47 host sshd[16873]: Disconnected from 46.101.175.103 port 48130 [preauth] Dec 27 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 27 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=shalinijames user-3=wwwtestugo user-4=vfmassets user-5=wwwkapin user-6=woodpeck user-7=remysagr user-8=disposeat user-9=wwwkmaorg user-10=mrsclean user-11=wwwnexidigital user-12=phmetals user-13=kottayamcalldriv user-14=palco123 user-15=gifterman user-16=wwwletsstalkfood user-17=straightcurve user-18=wwwevmhonda user-19=bonifacegroup user-20=laundryboniface user-21=a2zgroup user-22=dartsimp user-23=cochintaxi user-24=wwwkaretakers user-25=ugotscom user-26=keralaholi user-27=wwwresourcehunte user-28=wwwrmswll user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 27 10:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 27 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9u5TmcXV7RWCH14U.~ Dec 27 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9u5TmcXV7RWCH14U.~' Dec 27 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9u5TmcXV7RWCH14U.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 27 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 27 10:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 10:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 27 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 10:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 10:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 27 10:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 27 10:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 27 10:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 27 10:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 10:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 10:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 27 10:22:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 10:22:04 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 10:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 27 10:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 10:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 10:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 27 10:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 10:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 10:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 27 10:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 10:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 10:22:12 host sshd[17107]: User root from 186.224.33.11 not allowed because not listed in AllowUsers Dec 27 10:22:12 host sshd[17107]: input_userauth_request: invalid user root [preauth] Dec 27 10:22:12 host unix_chkpwd[17116]: password check failed for user (root) Dec 27 10:22:12 host sshd[17107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.224.33.11 user=root Dec 27 10:22:12 host sshd[17107]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 10:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 27 10:22:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 10:22:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 10:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 27 10:22:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 10:22:14 host sshd[17107]: Failed password for invalid user root from 186.224.33.11 port 59075 ssh2 Dec 27 10:22:15 host sshd[17107]: Received disconnect from 186.224.33.11 port 59075:11: Bye Bye [preauth] Dec 27 10:22:15 host sshd[17107]: Disconnected from 186.224.33.11 port 59075 [preauth] Dec 27 10:22:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 10:22:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 27 10:22:16 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 10:22:17 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 10:22:18 host sshd[17149]: User root from 77.235.29.116 not allowed because not listed in AllowUsers Dec 27 10:22:18 host sshd[17149]: input_userauth_request: invalid user root [preauth] Dec 27 10:22:18 host unix_chkpwd[17154]: password check failed for user (root) Dec 27 10:22:18 host sshd[17149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.235.29.116 user=root Dec 27 10:22:18 host sshd[17149]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 10:22:20 host sshd[17149]: Failed password for invalid user root from 77.235.29.116 port 50050 ssh2 Dec 27 10:22:20 host sshd[17124]: Connection closed by 185.137.27.170 port 43746 [preauth] Dec 27 10:22:20 host sshd[17149]: Received disconnect from 77.235.29.116 port 50050:11: Bye Bye [preauth] Dec 27 10:22:20 host sshd[17149]: Disconnected from 77.235.29.116 port 50050 [preauth] Dec 27 10:22:32 host sshd[17223]: User root from 201.6.107.69 not allowed because not listed in AllowUsers Dec 27 10:22:32 host sshd[17223]: input_userauth_request: invalid user root [preauth] Dec 27 10:22:32 host unix_chkpwd[17228]: password check failed for user (root) Dec 27 10:22:32 host sshd[17223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.6.107.69 user=root Dec 27 10:22:32 host sshd[17223]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 10:22:34 host sshd[17223]: Failed password for invalid user root from 201.6.107.69 port 48898 ssh2 Dec 27 10:22:34 host sshd[17223]: Received disconnect from 201.6.107.69 port 48898:11: Bye Bye [preauth] Dec 27 10:22:34 host sshd[17223]: Disconnected from 201.6.107.69 port 48898 [preauth] Dec 27 10:22:38 host sshd[17263]: User root from 139.59.189.130 not allowed because not listed in AllowUsers Dec 27 10:22:38 host sshd[17263]: input_userauth_request: invalid user root [preauth] Dec 27 10:22:38 host unix_chkpwd[17270]: password check failed for user (root) Dec 27 10:22:38 host sshd[17263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.189.130 user=root Dec 27 10:22:38 host sshd[17263]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 10:22:40 host sshd[17263]: Failed password for invalid user root from 139.59.189.130 port 41766 ssh2 Dec 27 10:22:40 host sshd[17263]: Received disconnect from 139.59.189.130 port 41766:11: Bye Bye [preauth] Dec 27 10:22:40 host sshd[17263]: Disconnected from 139.59.189.130 port 41766 [preauth] Dec 27 10:23:05 host sshd[17357]: User root from 46.101.175.103 not allowed because not listed in AllowUsers Dec 27 10:23:05 host sshd[17357]: input_userauth_request: invalid user root [preauth] Dec 27 10:23:05 host unix_chkpwd[17361]: password check failed for user (root) Dec 27 10:23:05 host sshd[17357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.175.103 user=root Dec 27 10:23:05 host sshd[17357]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 10:23:07 host sshd[17357]: Failed password for invalid user root from 46.101.175.103 port 49782 ssh2 Dec 27 10:23:11 host sshd[17397]: User root from 185.137.27.166 not allowed because not listed in AllowUsers Dec 27 10:23:11 host sshd[17397]: input_userauth_request: invalid user root [preauth] Dec 27 10:23:11 host unix_chkpwd[17402]: password check failed for user (root) Dec 27 10:23:11 host sshd[17397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.137.27.166 user=root Dec 27 10:23:11 host sshd[17397]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 10:23:13 host sshd[17397]: Failed password for invalid user root from 185.137.27.166 port 56682 ssh2 Dec 27 10:23:38 host sshd[17500]: User root from 43.155.128.224 not allowed because not listed in AllowUsers Dec 27 10:23:38 host sshd[17500]: input_userauth_request: invalid user root [preauth] Dec 27 10:23:38 host unix_chkpwd[17502]: password check failed for user (root) Dec 27 10:23:38 host sshd[17500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.128.224 user=root Dec 27 10:23:38 host sshd[17500]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 10:23:39 host sshd[17500]: Failed password for invalid user root from 43.155.128.224 port 41304 ssh2 Dec 27 10:23:39 host sshd[17500]: Received disconnect from 43.155.128.224 port 41304:11: Bye Bye [preauth] Dec 27 10:23:39 host sshd[17500]: Disconnected from 43.155.128.224 port 41304 [preauth] Dec 27 10:23:48 host sshd[17545]: User root from 185.137.27.170 not allowed because not listed in AllowUsers Dec 27 10:23:48 host sshd[17545]: input_userauth_request: invalid user root [preauth] Dec 27 10:23:48 host unix_chkpwd[17552]: password check failed for user (root) Dec 27 10:23:48 host sshd[17545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.137.27.170 user=root Dec 27 10:23:48 host sshd[17545]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 10:23:50 host sshd[17545]: Failed password for invalid user root from 185.137.27.170 port 57764 ssh2 Dec 27 10:23:59 host sshd[17604]: User root from 205.134.184.122 not allowed because not listed in AllowUsers Dec 27 10:23:59 host sshd[17604]: input_userauth_request: invalid user root [preauth] Dec 27 10:23:59 host unix_chkpwd[17607]: password check failed for user (root) Dec 27 10:23:59 host sshd[17604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.134.184.122 user=root Dec 27 10:23:59 host sshd[17604]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 10:24:01 host sshd[17604]: Failed password for invalid user root from 205.134.184.122 port 46316 ssh2 Dec 27 10:24:02 host sshd[17604]: Received disconnect from 205.134.184.122 port 46316:11: Bye Bye [preauth] Dec 27 10:24:02 host sshd[17604]: Disconnected from 205.134.184.122 port 46316 [preauth] Dec 27 10:24:12 host sshd[17657]: User root from 186.224.33.11 not allowed because not listed in AllowUsers Dec 27 10:24:12 host sshd[17657]: input_userauth_request: invalid user root [preauth] Dec 27 10:24:12 host unix_chkpwd[17661]: password check failed for user (root) Dec 27 10:24:12 host sshd[17657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.224.33.11 user=root Dec 27 10:24:12 host sshd[17657]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 10:24:14 host sshd[17657]: Failed password for invalid user root from 186.224.33.11 port 46009 ssh2 Dec 27 10:24:14 host sshd[17657]: Received disconnect from 186.224.33.11 port 46009:11: Bye Bye [preauth] Dec 27 10:24:14 host sshd[17657]: Disconnected from 186.224.33.11 port 46009 [preauth] Dec 27 10:34:00 host sshd[18942]: Invalid user user1 from 92.46.108.20 port 34524 Dec 27 10:34:00 host sshd[18942]: input_userauth_request: invalid user user1 [preauth] Dec 27 10:34:01 host sshd[18942]: pam_unix(sshd:auth): check pass; user unknown Dec 27 10:34:01 host sshd[18942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 27 10:34:02 host sshd[18942]: Failed password for invalid user user1 from 92.46.108.20 port 34524 ssh2 Dec 27 10:34:04 host sshd[18942]: Connection closed by 92.46.108.20 port 34524 [preauth] Dec 27 10:40:10 host sshd[19857]: User root from 84.201.135.111 not allowed because not listed in AllowUsers Dec 27 10:40:10 host sshd[19857]: input_userauth_request: invalid user root [preauth] Dec 27 10:40:10 host unix_chkpwd[19860]: password check failed for user (root) Dec 27 10:40:10 host sshd[19857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.135.111 user=root Dec 27 10:40:10 host sshd[19857]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 10:40:12 host sshd[19857]: Failed password for invalid user root from 84.201.135.111 port 44130 ssh2 Dec 27 10:40:13 host sshd[19857]: Received disconnect from 84.201.135.111 port 44130:11: Bye Bye [preauth] Dec 27 10:40:13 host sshd[19857]: Disconnected from 84.201.135.111 port 44130 [preauth] Dec 27 10:40:39 host sshd[19922]: User root from 104.236.7.248 not allowed because not listed in AllowUsers Dec 27 10:40:39 host sshd[19922]: input_userauth_request: invalid user root [preauth] Dec 27 10:40:40 host unix_chkpwd[19926]: password check failed for user (root) Dec 27 10:40:40 host sshd[19922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.7.248 user=root Dec 27 10:40:40 host sshd[19922]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 10:40:42 host sshd[19922]: Failed password for invalid user root from 104.236.7.248 port 31442 ssh2 Dec 27 10:40:42 host sshd[19922]: Received disconnect from 104.236.7.248 port 31442:11: Bye Bye [preauth] Dec 27 10:40:42 host sshd[19922]: Disconnected from 104.236.7.248 port 31442 [preauth] Dec 27 10:43:08 host sshd[20189]: User root from 5.253.244.166 not allowed because not listed in AllowUsers Dec 27 10:43:08 host sshd[20189]: input_userauth_request: invalid user root [preauth] Dec 27 10:43:08 host unix_chkpwd[20192]: password check failed for user (root) Dec 27 10:43:08 host sshd[20189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.253.244.166 user=root Dec 27 10:43:08 host sshd[20189]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 10:43:10 host sshd[20189]: Failed password for invalid user root from 5.253.244.166 port 48820 ssh2 Dec 27 10:43:10 host sshd[20189]: Received disconnect from 5.253.244.166 port 48820:11: Bye Bye [preauth] Dec 27 10:43:10 host sshd[20189]: Disconnected from 5.253.244.166 port 48820 [preauth] Dec 27 10:43:48 host sshd[20276]: User root from 84.201.135.111 not allowed because not listed in AllowUsers Dec 27 10:43:48 host sshd[20276]: input_userauth_request: invalid user root [preauth] Dec 27 10:43:48 host unix_chkpwd[20280]: password check failed for user (root) Dec 27 10:43:48 host sshd[20276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.135.111 user=root Dec 27 10:43:48 host sshd[20276]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 10:43:49 host sshd[20276]: Failed password for invalid user root from 84.201.135.111 port 33256 ssh2 Dec 27 10:43:50 host sshd[20276]: Received disconnect from 84.201.135.111 port 33256:11: Bye Bye [preauth] Dec 27 10:43:50 host sshd[20276]: Disconnected from 84.201.135.111 port 33256 [preauth] Dec 27 10:43:54 host sshd[20318]: Invalid user dl from 45.93.201.90 port 33346 Dec 27 10:43:54 host sshd[20318]: input_userauth_request: invalid user dl [preauth] Dec 27 10:43:54 host sshd[20318]: pam_unix(sshd:auth): check pass; user unknown Dec 27 10:43:54 host sshd[20318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 27 10:43:56 host sshd[20318]: Failed password for invalid user dl from 45.93.201.90 port 33346 ssh2 Dec 27 10:43:59 host sshd[20318]: pam_unix(sshd:auth): check pass; user unknown Dec 27 10:44:01 host sshd[20318]: Failed password for invalid user dl from 45.93.201.90 port 33346 ssh2 Dec 27 10:44:05 host sshd[20318]: pam_unix(sshd:auth): check pass; user unknown Dec 27 10:44:06 host sshd[20346]: User root from 104.236.7.248 not allowed because not listed in AllowUsers Dec 27 10:44:06 host sshd[20346]: input_userauth_request: invalid user root [preauth] Dec 27 10:44:06 host unix_chkpwd[20349]: password check failed for user (root) Dec 27 10:44:06 host sshd[20346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.7.248 user=root Dec 27 10:44:06 host sshd[20346]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 10:44:07 host sshd[20318]: Failed password for invalid user dl from 45.93.201.90 port 33346 ssh2 Dec 27 10:44:07 host sshd[20346]: Failed password for invalid user root from 104.236.7.248 port 51614 ssh2 Dec 27 10:44:10 host sshd[20318]: Connection closed by 45.93.201.90 port 33346 [preauth] Dec 27 10:44:10 host sshd[20318]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 27 10:44:39 host sshd[20459]: User root from 5.253.244.166 not allowed because not listed in AllowUsers Dec 27 10:44:39 host sshd[20459]: input_userauth_request: invalid user root [preauth] Dec 27 10:44:39 host unix_chkpwd[20463]: password check failed for user (root) Dec 27 10:44:39 host sshd[20459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.253.244.166 user=root Dec 27 10:44:39 host sshd[20459]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 10:44:41 host sshd[20459]: Failed password for invalid user root from 5.253.244.166 port 43628 ssh2 Dec 27 10:44:41 host sshd[20459]: Received disconnect from 5.253.244.166 port 43628:11: Bye Bye [preauth] Dec 27 10:44:41 host sshd[20459]: Disconnected from 5.253.244.166 port 43628 [preauth] Dec 27 11:05:25 host sshd[23350]: Invalid user zxy from 162.218.126.136 port 57184 Dec 27 11:05:25 host sshd[23350]: input_userauth_request: invalid user zxy [preauth] Dec 27 11:05:25 host sshd[23350]: pam_unix(sshd:auth): check pass; user unknown Dec 27 11:05:25 host sshd[23350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 27 11:05:27 host sshd[23350]: Failed password for invalid user zxy from 162.218.126.136 port 57184 ssh2 Dec 27 11:05:27 host sshd[23350]: Connection closed by 162.218.126.136 port 57184 [preauth] Dec 27 11:06:50 host sshd[23567]: User root from 115.246.237.179 not allowed because not listed in AllowUsers Dec 27 11:06:50 host sshd[23567]: input_userauth_request: invalid user root [preauth] Dec 27 11:06:50 host unix_chkpwd[23569]: password check failed for user (root) Dec 27 11:06:50 host sshd[23567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.246.237.179 user=root Dec 27 11:06:50 host sshd[23567]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 11:06:52 host sshd[23567]: Failed password for invalid user root from 115.246.237.179 port 46177 ssh2 Dec 27 11:06:52 host sshd[23567]: Received disconnect from 115.246.237.179 port 46177:11: Bye Bye [preauth] Dec 27 11:06:52 host sshd[23567]: Disconnected from 115.246.237.179 port 46177 [preauth] Dec 27 11:09:44 host sshd[24031]: User root from 103.236.201.117 not allowed because not listed in AllowUsers Dec 27 11:09:44 host sshd[24031]: input_userauth_request: invalid user root [preauth] Dec 27 11:09:44 host unix_chkpwd[24033]: password check failed for user (root) Dec 27 11:09:44 host sshd[24031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.236.201.117 user=root Dec 27 11:09:44 host sshd[24031]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 11:09:46 host sshd[24031]: Failed password for invalid user root from 103.236.201.117 port 51794 ssh2 Dec 27 11:09:47 host sshd[24031]: Received disconnect from 103.236.201.117 port 51794:11: Bye Bye [preauth] Dec 27 11:09:47 host sshd[24031]: Disconnected from 103.236.201.117 port 51794 [preauth] Dec 27 11:11:59 host sshd[24295]: User root from 103.236.201.117 not allowed because not listed in AllowUsers Dec 27 11:11:59 host sshd[24295]: input_userauth_request: invalid user root [preauth] Dec 27 11:11:59 host unix_chkpwd[24297]: password check failed for user (root) Dec 27 11:11:59 host sshd[24295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.236.201.117 user=root Dec 27 11:11:59 host sshd[24295]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 11:12:01 host sshd[24295]: Failed password for invalid user root from 103.236.201.117 port 57486 ssh2 Dec 27 11:12:01 host sshd[24295]: Received disconnect from 103.236.201.117 port 57486:11: Bye Bye [preauth] Dec 27 11:12:01 host sshd[24295]: Disconnected from 103.236.201.117 port 57486 [preauth] Dec 27 11:14:39 host sshd[24689]: Did not receive identification string from 149.129.220.104 port 61000 Dec 27 11:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 11:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 11:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 11:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 11:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 11:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 11:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 11:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 11:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 11:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 27 11:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 11:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 11:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 27 11:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 11:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 11:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 27 11:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 11:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 11:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 27 11:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 11:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 11:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 27 11:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 11:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 11:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 27 11:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 11:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 11:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 27 11:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 11:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 11:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 27 11:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 11:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 27 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=dartsimp user-3=a2zgroup user-4=wwwkaretakers user-5=cochintaxi user-6=ugotscom user-7=wwwrmswll user-8=keralaholi user-9=wwwresourcehunte user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=wwwtestugo user-14=shalinijames user-15=vfmassets user-16=woodpeck user-17=wwwkapin user-18=disposeat user-19=remysagr user-20=wwwkmaorg user-21=wwwnexidigital user-22=mrsclean user-23=phmetals user-24=kottayamcalldriv user-25=gifterman user-26=palco123 user-27=wwwletsstalkfood user-28=straightcurve user-29=wwwevmhonda user-30=bonifacegroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 27 11:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 27 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fyJ7uQxBIQZhRPwz.~ Dec 27 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fyJ7uQxBIQZhRPwz.~' Dec 27 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fyJ7uQxBIQZhRPwz.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 27 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 27 11:21:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 11:21:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 27 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 11:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 11:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 11:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 11:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 27 11:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 27 11:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 27 11:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 27 11:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 11:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 11:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 27 11:22:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 11:22:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 11:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 27 11:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 11:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 11:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 27 11:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 11:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 11:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 27 11:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 11:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 11:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 27 11:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 11:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 11:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 27 11:22:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 11:22:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 11:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 27 11:22:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 11:22:15 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 11:22:33 host sshd[26464]: User root from 106.10.122.53 not allowed because not listed in AllowUsers Dec 27 11:22:33 host sshd[26464]: input_userauth_request: invalid user root [preauth] Dec 27 11:22:33 host unix_chkpwd[26467]: password check failed for user (root) Dec 27 11:22:33 host sshd[26464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 user=root Dec 27 11:22:33 host sshd[26464]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 11:22:36 host sshd[26464]: Failed password for invalid user root from 106.10.122.53 port 56290 ssh2 Dec 27 11:22:36 host sshd[26464]: Connection closed by 106.10.122.53 port 56290 [preauth] Dec 27 11:25:13 host sshd[26940]: Invalid user elk from 41.197.31.178 port 46482 Dec 27 11:25:13 host sshd[26940]: input_userauth_request: invalid user elk [preauth] Dec 27 11:25:14 host sshd[26940]: pam_unix(sshd:auth): check pass; user unknown Dec 27 11:25:14 host sshd[26940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 27 11:25:16 host sshd[26940]: Failed password for invalid user elk from 41.197.31.178 port 46482 ssh2 Dec 27 11:25:16 host sshd[26940]: Connection closed by 41.197.31.178 port 46482 [preauth] Dec 27 11:29:18 host sshd[27429]: User root from 178.128.220.159 not allowed because not listed in AllowUsers Dec 27 11:29:18 host sshd[27429]: input_userauth_request: invalid user root [preauth] Dec 27 11:29:18 host unix_chkpwd[27432]: password check failed for user (root) Dec 27 11:29:18 host sshd[27429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.220.159 user=root Dec 27 11:29:18 host sshd[27429]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 11:29:20 host sshd[27429]: Failed password for invalid user root from 178.128.220.159 port 37884 ssh2 Dec 27 11:29:20 host sshd[27429]: Received disconnect from 178.128.220.159 port 37884:11: Bye Bye [preauth] Dec 27 11:29:20 host sshd[27429]: Disconnected from 178.128.220.159 port 37884 [preauth] Dec 27 11:29:23 host sshd[27439]: User root from 206.189.151.151 not allowed because not listed in AllowUsers Dec 27 11:29:23 host sshd[27439]: input_userauth_request: invalid user root [preauth] Dec 27 11:29:23 host unix_chkpwd[27441]: password check failed for user (root) Dec 27 11:29:23 host sshd[27439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.151.151 user=root Dec 27 11:29:23 host sshd[27439]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 11:29:25 host sshd[27439]: Failed password for invalid user root from 206.189.151.151 port 50354 ssh2 Dec 27 11:29:25 host sshd[27439]: Received disconnect from 206.189.151.151 port 50354:11: Bye Bye [preauth] Dec 27 11:29:25 host sshd[27439]: Disconnected from 206.189.151.151 port 50354 [preauth] Dec 27 11:32:16 host sshd[27909]: Invalid user thomas from 107.189.30.59 port 57936 Dec 27 11:32:16 host sshd[27909]: input_userauth_request: invalid user thomas [preauth] Dec 27 11:32:16 host sshd[27909]: pam_unix(sshd:auth): check pass; user unknown Dec 27 11:32:16 host sshd[27909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Dec 27 11:32:18 host sshd[27909]: Failed password for invalid user thomas from 107.189.30.59 port 57936 ssh2 Dec 27 11:32:19 host sshd[27909]: Connection closed by 107.189.30.59 port 57936 [preauth] Dec 27 11:33:49 host sshd[28091]: User root from 178.128.220.159 not allowed because not listed in AllowUsers Dec 27 11:33:49 host sshd[28091]: input_userauth_request: invalid user root [preauth] Dec 27 11:33:49 host unix_chkpwd[28093]: password check failed for user (root) Dec 27 11:33:49 host sshd[28091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.220.159 user=root Dec 27 11:33:49 host sshd[28091]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 11:33:50 host sshd[28095]: User root from 206.189.151.151 not allowed because not listed in AllowUsers Dec 27 11:33:50 host sshd[28095]: input_userauth_request: invalid user root [preauth] Dec 27 11:33:50 host unix_chkpwd[28097]: password check failed for user (root) Dec 27 11:33:50 host sshd[28095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.151.151 user=root Dec 27 11:33:50 host sshd[28095]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 11:33:50 host sshd[28091]: Failed password for invalid user root from 178.128.220.159 port 59782 ssh2 Dec 27 11:33:51 host sshd[28091]: Received disconnect from 178.128.220.159 port 59782:11: Bye Bye [preauth] Dec 27 11:33:51 host sshd[28091]: Disconnected from 178.128.220.159 port 59782 [preauth] Dec 27 11:33:52 host sshd[28095]: Failed password for invalid user root from 206.189.151.151 port 43694 ssh2 Dec 27 11:33:52 host sshd[28095]: Received disconnect from 206.189.151.151 port 43694:11: Bye Bye [preauth] Dec 27 11:33:52 host sshd[28095]: Disconnected from 206.189.151.151 port 43694 [preauth] Dec 27 11:44:00 host sshd[29717]: User root from 103.13.40.2 not allowed because not listed in AllowUsers Dec 27 11:44:00 host sshd[29717]: input_userauth_request: invalid user root [preauth] Dec 27 11:44:00 host unix_chkpwd[29719]: password check failed for user (root) Dec 27 11:44:00 host sshd[29717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 user=root Dec 27 11:44:00 host sshd[29717]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 11:44:02 host sshd[29717]: Failed password for invalid user root from 103.13.40.2 port 55078 ssh2 Dec 27 11:44:02 host sshd[29717]: Connection closed by 103.13.40.2 port 55078 [preauth] Dec 27 12:15:37 host sshd[2040]: Connection closed by 45.79.181.104 port 16490 [preauth] Dec 27 12:15:38 host sshd[2046]: Did not receive identification string from 45.79.181.104 port 16502 Dec 27 12:15:40 host sshd[2050]: Connection closed by 45.79.181.104 port 15656 [preauth] Dec 27 12:18:19 host sshd[2966]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Dec 27 12:18:19 host sshd[2966]: input_userauth_request: invalid user root [preauth] Dec 27 12:18:19 host unix_chkpwd[2969]: password check failed for user (root) Dec 27 12:18:19 host sshd[2966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Dec 27 12:18:19 host sshd[2966]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 12:18:20 host sshd[2966]: Failed password for invalid user root from 162.218.126.136 port 42458 ssh2 Dec 27 12:18:21 host sshd[2966]: Connection closed by 162.218.126.136 port 42458 [preauth] Dec 27 12:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 12:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 12:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 12:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 12:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 12:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 12:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 12:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 12:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 12:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 27 12:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 12:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 12:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 27 12:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 12:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 12:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 27 12:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 12:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 12:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 27 12:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 12:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 12:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 27 12:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 12:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 12:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 27 12:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 12:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 12:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 27 12:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 12:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 12:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 27 12:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 12:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 12:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 12:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 12:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 12:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 27 12:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 12:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 12:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=vfmassets user-2=wwwtestugo user-3=shalinijames user-4=pmcresources user-5=disposeat user-6=wwwkmaorg user-7=remysagr user-8=woodpeck user-9=wwwkapin user-10=gifterman user-11=palco123 user-12=phmetals user-13=kottayamcalldriv user-14=wwwnexidigital user-15=mrsclean user-16=bonifacegroup user-17=wwwevmhonda user-18=wwwletsstalkfood user-19=straightcurve user-20=dartsimp user-21=a2zgroup user-22=laundryboniface user-23=wwwkaretakers user-24=cochintaxi user-25=travelboniface user-26=wwwrmswll user-27=wwwresourcehunte user-28=keralaholi user-29=ugotscom user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 27 12:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 27 12:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 12:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 12:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 12:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 12:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 12:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-WwyNV6Mf4zajMzES.~ Dec 27 12:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 12:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 12:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-WwyNV6Mf4zajMzES.~' Dec 27 12:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 12:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 12:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-WwyNV6Mf4zajMzES.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 12:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 12:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 12:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 27 12:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 12:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 27 12:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 12:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 12:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 12:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 12:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 27 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 12:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 12:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 12:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 12:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 12:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 27 12:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 27 12:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 27 12:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 27 12:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 12:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 27 12:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 12:21:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 12:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 27 12:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 12:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 12:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 27 12:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 12:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 12:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 27 12:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 12:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 12:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 27 12:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 12:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 12:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 27 12:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 12:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 12:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 27 12:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 12:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 12:29:11 host sshd[5145]: Invalid user dm from 45.93.201.90 port 41380 Dec 27 12:29:11 host sshd[5145]: input_userauth_request: invalid user dm [preauth] Dec 27 12:29:11 host sshd[5145]: pam_unix(sshd:auth): check pass; user unknown Dec 27 12:29:11 host sshd[5145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 27 12:29:13 host sshd[5145]: Failed password for invalid user dm from 45.93.201.90 port 41380 ssh2 Dec 27 12:29:17 host sshd[5145]: pam_unix(sshd:auth): check pass; user unknown Dec 27 12:29:19 host sshd[5145]: Failed password for invalid user dm from 45.93.201.90 port 41380 ssh2 Dec 27 12:29:22 host sshd[5145]: pam_unix(sshd:auth): check pass; user unknown Dec 27 12:29:24 host sshd[5145]: Failed password for invalid user dm from 45.93.201.90 port 41380 ssh2 Dec 27 12:29:27 host sshd[5145]: Connection closed by 45.93.201.90 port 41380 [preauth] Dec 27 12:29:27 host sshd[5145]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 27 12:46:26 host sshd[7753]: Invalid user admin from 194.169.175.102 port 55821 Dec 27 12:46:26 host sshd[7753]: input_userauth_request: invalid user admin [preauth] Dec 27 12:46:26 host sshd[7753]: pam_unix(sshd:auth): check pass; user unknown Dec 27 12:46:26 host sshd[7753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 Dec 27 12:46:28 host sshd[7753]: Failed password for invalid user admin from 194.169.175.102 port 55821 ssh2 Dec 27 12:46:28 host sshd[7753]: Received disconnect from 194.169.175.102 port 55821:11: Client disconnecting normally [preauth] Dec 27 12:46:28 host sshd[7753]: Disconnected from 194.169.175.102 port 55821 [preauth] Dec 27 12:52:22 host sshd[8698]: Invalid user user1 from 106.10.122.53 port 52544 Dec 27 12:52:22 host sshd[8698]: input_userauth_request: invalid user user1 [preauth] Dec 27 12:52:22 host sshd[8698]: pam_unix(sshd:auth): check pass; user unknown Dec 27 12:52:22 host sshd[8698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 27 12:52:23 host sshd[8698]: Failed password for invalid user user1 from 106.10.122.53 port 52544 ssh2 Dec 27 12:52:24 host sshd[8698]: Connection closed by 106.10.122.53 port 52544 [preauth] Dec 27 13:01:21 host sshd[10215]: Invalid user user from 92.46.108.20 port 42328 Dec 27 13:01:21 host sshd[10215]: input_userauth_request: invalid user user [preauth] Dec 27 13:01:22 host sshd[10215]: pam_unix(sshd:auth): check pass; user unknown Dec 27 13:01:22 host sshd[10215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 27 13:01:24 host sshd[10215]: Failed password for invalid user user from 92.46.108.20 port 42328 ssh2 Dec 27 13:01:24 host sshd[10215]: Connection closed by 92.46.108.20 port 42328 [preauth] Dec 27 13:12:43 host sshd[11914]: Invalid user user1 from 103.13.40.2 port 47290 Dec 27 13:12:43 host sshd[11914]: input_userauth_request: invalid user user1 [preauth] Dec 27 13:12:43 host sshd[11914]: pam_unix(sshd:auth): check pass; user unknown Dec 27 13:12:43 host sshd[11914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 27 13:12:45 host sshd[11914]: Failed password for invalid user user1 from 103.13.40.2 port 47290 ssh2 Dec 27 13:12:45 host sshd[11914]: Connection closed by 103.13.40.2 port 47290 [preauth] Dec 27 13:17:42 host sshd[12617]: Invalid user user from 41.197.31.178 port 34704 Dec 27 13:17:42 host sshd[12617]: input_userauth_request: invalid user user [preauth] Dec 27 13:17:42 host sshd[12617]: pam_unix(sshd:auth): check pass; user unknown Dec 27 13:17:42 host sshd[12617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 27 13:17:44 host sshd[12617]: Failed password for invalid user user from 41.197.31.178 port 34704 ssh2 Dec 27 13:17:44 host sshd[12617]: Connection closed by 41.197.31.178 port 34704 [preauth] Dec 27 13:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 13:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 13:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 13:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 13:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 13:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 13:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 13:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 13:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 13:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 27 13:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 13:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 13:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 27 13:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 13:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 13:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 27 13:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 13:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 13:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 27 13:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 13:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 13:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 27 13:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 13:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 13:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 27 13:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 13:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 13:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 27 13:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 13:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 13:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 27 13:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 13:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 13:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 13:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 13:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 13:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 27 13:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 13:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 13:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=kottayamcalldriv user-2=phmetals user-3=palco123 user-4=gifterman user-5=mrsclean user-6=wwwnexidigital user-7=wwwevmhonda user-8=bonifacegroup user-9=wwwletsstalkfood user-10=straightcurve user-11=shalinijames user-12=wwwtestugo user-13=vfmassets user-14=pmcresources user-15=remysagr user-16=disposeat user-17=wwwkmaorg user-18=woodpeck user-19=wwwkapin user-20=travelboniface user-21=ugotscom user-22=wwwresourcehunte user-23=keralaholi user-24=wwwrmswll user-25=wwwpmcresource user-26=a2zgroup user-27=dartsimp user-28=laundryboniface user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 27 13:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 27 13:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 13:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 13:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 13:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 13:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 13:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-mCmS2CMflb2WJw05.~ Dec 27 13:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 13:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 13:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-mCmS2CMflb2WJw05.~' Dec 27 13:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 13:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 13:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-mCmS2CMflb2WJw05.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 13:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 13:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 13:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 27 13:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 13:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 27 13:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 13:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 27 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 13:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 13:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 13:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 13:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 27 13:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 27 13:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 27 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 27 13:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 13:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 27 13:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 13:21:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 13:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 27 13:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 13:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 13:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 27 13:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 13:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 13:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 27 13:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 13:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 13:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 27 13:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 13:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 13:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 27 13:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 13:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 13:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 27 13:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 13:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 13:31:23 host sshd[14888]: Invalid user user1 from 162.218.126.136 port 45550 Dec 27 13:31:23 host sshd[14888]: input_userauth_request: invalid user user1 [preauth] Dec 27 13:31:23 host sshd[14888]: pam_unix(sshd:auth): check pass; user unknown Dec 27 13:31:23 host sshd[14888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 27 13:31:25 host sshd[14888]: Failed password for invalid user user1 from 162.218.126.136 port 45550 ssh2 Dec 27 13:31:25 host sshd[14888]: Connection closed by 162.218.126.136 port 45550 [preauth] Dec 27 14:01:31 host sshd[19396]: User root from 94.182.54.94 not allowed because not listed in AllowUsers Dec 27 14:01:31 host sshd[19396]: input_userauth_request: invalid user root [preauth] Dec 27 14:01:31 host unix_chkpwd[19399]: password check failed for user (root) Dec 27 14:01:31 host sshd[19396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.182.54.94 user=root Dec 27 14:01:31 host sshd[19396]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 14:01:33 host sshd[19396]: Failed password for invalid user root from 94.182.54.94 port 42954 ssh2 Dec 27 14:01:33 host sshd[19396]: Received disconnect from 94.182.54.94 port 42954:11: Bye Bye [preauth] Dec 27 14:01:33 host sshd[19396]: Disconnected from 94.182.54.94 port 42954 [preauth] Dec 27 14:01:38 host sshd[19413]: User root from 5.78.53.233 not allowed because not listed in AllowUsers Dec 27 14:01:38 host sshd[19413]: input_userauth_request: invalid user root [preauth] Dec 27 14:01:38 host unix_chkpwd[19416]: password check failed for user (root) Dec 27 14:01:38 host sshd[19413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.78.53.233 user=root Dec 27 14:01:38 host sshd[19413]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 14:01:40 host sshd[19413]: Failed password for invalid user root from 5.78.53.233 port 36820 ssh2 Dec 27 14:01:40 host sshd[19413]: Received disconnect from 5.78.53.233 port 36820:11: Bye Bye [preauth] Dec 27 14:01:40 host sshd[19413]: Disconnected from 5.78.53.233 port 36820 [preauth] Dec 27 14:02:53 host sshd[19548]: User root from 152.32.240.240 not allowed because not listed in AllowUsers Dec 27 14:02:53 host sshd[19548]: input_userauth_request: invalid user root [preauth] Dec 27 14:02:53 host unix_chkpwd[19552]: password check failed for user (root) Dec 27 14:02:53 host sshd[19548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.240.240 user=root Dec 27 14:02:53 host sshd[19548]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 14:02:55 host sshd[19554]: User root from 64.227.190.199 not allowed because not listed in AllowUsers Dec 27 14:02:55 host sshd[19554]: input_userauth_request: invalid user root [preauth] Dec 27 14:02:55 host unix_chkpwd[19556]: password check failed for user (root) Dec 27 14:02:55 host sshd[19554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.190.199 user=root Dec 27 14:02:55 host sshd[19554]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 14:02:55 host sshd[19548]: Failed password for invalid user root from 152.32.240.240 port 51892 ssh2 Dec 27 14:02:55 host sshd[19548]: Received disconnect from 152.32.240.240 port 51892:11: Bye Bye [preauth] Dec 27 14:02:55 host sshd[19548]: Disconnected from 152.32.240.240 port 51892 [preauth] Dec 27 14:02:57 host sshd[19554]: Failed password for invalid user root from 64.227.190.199 port 59514 ssh2 Dec 27 14:02:57 host sshd[19554]: Received disconnect from 64.227.190.199 port 59514:11: Bye Bye [preauth] Dec 27 14:02:57 host sshd[19554]: Disconnected from 64.227.190.199 port 59514 [preauth] Dec 27 14:03:09 host sshd[19590]: User root from 114.43.98.49 not allowed because not listed in AllowUsers Dec 27 14:03:09 host sshd[19590]: input_userauth_request: invalid user root [preauth] Dec 27 14:03:09 host unix_chkpwd[19593]: password check failed for user (root) Dec 27 14:03:09 host sshd[19590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.43.98.49 user=root Dec 27 14:03:09 host sshd[19590]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 14:03:11 host sshd[19590]: Failed password for invalid user root from 114.43.98.49 port 53166 ssh2 Dec 27 14:03:11 host sshd[19590]: Received disconnect from 114.43.98.49 port 53166:11: Bye Bye [preauth] Dec 27 14:03:11 host sshd[19590]: Disconnected from 114.43.98.49 port 53166 [preauth] Dec 27 14:05:18 host sshd[19988]: User root from 180.130.116.46 not allowed because not listed in AllowUsers Dec 27 14:05:18 host sshd[19988]: input_userauth_request: invalid user root [preauth] Dec 27 14:05:18 host unix_chkpwd[19992]: password check failed for user (root) Dec 27 14:05:18 host sshd[19988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.130.116.46 user=root Dec 27 14:05:18 host sshd[19988]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 14:05:21 host sshd[19988]: Failed password for invalid user root from 180.130.116.46 port 38418 ssh2 Dec 27 14:05:21 host sshd[19988]: Received disconnect from 180.130.116.46 port 38418:11: Bye Bye [preauth] Dec 27 14:05:21 host sshd[19988]: Disconnected from 180.130.116.46 port 38418 [preauth] Dec 27 14:05:53 host sshd[20071]: User root from 64.227.190.199 not allowed because not listed in AllowUsers Dec 27 14:05:53 host sshd[20071]: input_userauth_request: invalid user root [preauth] Dec 27 14:05:53 host unix_chkpwd[20073]: password check failed for user (root) Dec 27 14:05:53 host sshd[20071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.190.199 user=root Dec 27 14:05:53 host sshd[20071]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 14:05:55 host sshd[20071]: Failed password for invalid user root from 64.227.190.199 port 42324 ssh2 Dec 27 14:06:08 host sshd[20129]: User root from 129.146.86.123 not allowed because not listed in AllowUsers Dec 27 14:06:08 host sshd[20129]: input_userauth_request: invalid user root [preauth] Dec 27 14:06:08 host unix_chkpwd[20135]: password check failed for user (root) Dec 27 14:06:08 host sshd[20129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.86.123 user=root Dec 27 14:06:08 host sshd[20129]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 14:06:10 host sshd[20133]: User root from 5.78.53.233 not allowed because not listed in AllowUsers Dec 27 14:06:10 host sshd[20133]: input_userauth_request: invalid user root [preauth] Dec 27 14:06:10 host unix_chkpwd[20137]: password check failed for user (root) Dec 27 14:06:10 host sshd[20133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.78.53.233 user=root Dec 27 14:06:10 host sshd[20133]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 14:06:10 host sshd[20129]: Failed password for invalid user root from 129.146.86.123 port 56298 ssh2 Dec 27 14:06:10 host sshd[20129]: Received disconnect from 129.146.86.123 port 56298:11: Bye Bye [preauth] Dec 27 14:06:10 host sshd[20129]: Disconnected from 129.146.86.123 port 56298 [preauth] Dec 27 14:06:11 host sshd[20133]: Failed password for invalid user root from 5.78.53.233 port 42960 ssh2 Dec 27 14:06:12 host sshd[20133]: Received disconnect from 5.78.53.233 port 42960:11: Bye Bye [preauth] Dec 27 14:06:12 host sshd[20133]: Disconnected from 5.78.53.233 port 42960 [preauth] Dec 27 14:06:52 host sshd[20262]: User root from 94.182.54.94 not allowed because not listed in AllowUsers Dec 27 14:06:52 host sshd[20262]: input_userauth_request: invalid user root [preauth] Dec 27 14:06:52 host unix_chkpwd[20266]: password check failed for user (root) Dec 27 14:06:52 host sshd[20262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.182.54.94 user=root Dec 27 14:06:52 host sshd[20262]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 14:06:54 host sshd[20262]: Failed password for invalid user root from 94.182.54.94 port 37300 ssh2 Dec 27 14:06:54 host sshd[20262]: Received disconnect from 94.182.54.94 port 37300:11: Bye Bye [preauth] Dec 27 14:06:54 host sshd[20262]: Disconnected from 94.182.54.94 port 37300 [preauth] Dec 27 14:07:17 host sshd[20326]: Connection closed by 152.32.240.240 port 35718 [preauth] Dec 27 14:07:20 host sshd[20335]: User root from 114.43.98.49 not allowed because not listed in AllowUsers Dec 27 14:07:20 host sshd[20335]: input_userauth_request: invalid user root [preauth] Dec 27 14:07:20 host unix_chkpwd[20341]: password check failed for user (root) Dec 27 14:07:20 host sshd[20335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.43.98.49 user=root Dec 27 14:07:20 host sshd[20335]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 14:07:22 host sshd[20335]: Failed password for invalid user root from 114.43.98.49 port 46602 ssh2 Dec 27 14:07:22 host sshd[20335]: Received disconnect from 114.43.98.49 port 46602:11: Bye Bye [preauth] Dec 27 14:07:22 host sshd[20335]: Disconnected from 114.43.98.49 port 46602 [preauth] Dec 27 14:08:55 host sshd[20555]: User root from 129.146.86.123 not allowed because not listed in AllowUsers Dec 27 14:08:55 host sshd[20555]: input_userauth_request: invalid user root [preauth] Dec 27 14:08:55 host unix_chkpwd[20558]: password check failed for user (root) Dec 27 14:08:55 host sshd[20555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.86.123 user=root Dec 27 14:08:55 host sshd[20555]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 14:08:56 host sshd[20555]: Failed password for invalid user root from 129.146.86.123 port 37746 ssh2 Dec 27 14:08:57 host sshd[20555]: Received disconnect from 129.146.86.123 port 37746:11: Bye Bye [preauth] Dec 27 14:08:57 host sshd[20555]: Disconnected from 129.146.86.123 port 37746 [preauth] Dec 27 14:09:32 host sshd[20778]: User root from 152.32.240.240 not allowed because not listed in AllowUsers Dec 27 14:09:32 host sshd[20778]: input_userauth_request: invalid user root [preauth] Dec 27 14:09:32 host unix_chkpwd[20781]: password check failed for user (root) Dec 27 14:09:32 host sshd[20778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.240.240 user=root Dec 27 14:09:32 host sshd[20778]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 14:09:34 host sshd[20778]: Failed password for invalid user root from 152.32.240.240 port 60444 ssh2 Dec 27 14:09:34 host sshd[20778]: Received disconnect from 152.32.240.240 port 60444:11: Bye Bye [preauth] Dec 27 14:09:34 host sshd[20778]: Disconnected from 152.32.240.240 port 60444 [preauth] Dec 27 14:15:11 host sshd[21640]: User root from 180.130.116.46 not allowed because not listed in AllowUsers Dec 27 14:15:11 host sshd[21640]: input_userauth_request: invalid user root [preauth] Dec 27 14:15:11 host unix_chkpwd[21652]: password check failed for user (root) Dec 27 14:15:11 host sshd[21640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.130.116.46 user=root Dec 27 14:15:11 host sshd[21640]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 14:15:13 host sshd[21640]: Failed password for invalid user root from 180.130.116.46 port 43126 ssh2 Dec 27 14:15:13 host sshd[21640]: Received disconnect from 180.130.116.46 port 43126:11: Bye Bye [preauth] Dec 27 14:15:13 host sshd[21640]: Disconnected from 180.130.116.46 port 43126 [preauth] Dec 27 14:16:33 host sshd[21846]: Invalid user dn from 45.93.201.90 port 58648 Dec 27 14:16:33 host sshd[21846]: input_userauth_request: invalid user dn [preauth] Dec 27 14:16:33 host sshd[21846]: pam_unix(sshd:auth): check pass; user unknown Dec 27 14:16:33 host sshd[21846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 27 14:16:35 host sshd[21846]: Failed password for invalid user dn from 45.93.201.90 port 58648 ssh2 Dec 27 14:16:38 host sshd[21846]: pam_unix(sshd:auth): check pass; user unknown Dec 27 14:16:40 host sshd[21846]: Failed password for invalid user dn from 45.93.201.90 port 58648 ssh2 Dec 27 14:16:44 host sshd[21846]: pam_unix(sshd:auth): check pass; user unknown Dec 27 14:16:45 host sshd[21846]: Failed password for invalid user dn from 45.93.201.90 port 58648 ssh2 Dec 27 14:16:48 host sshd[21846]: Connection closed by 45.93.201.90 port 58648 [preauth] Dec 27 14:16:48 host sshd[21846]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 27 14:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 14:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 14:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 14:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 14:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 14:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 14:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 14:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 14:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 14:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 27 14:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 14:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 14:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 27 14:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 14:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 14:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 27 14:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 14:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 14:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 27 14:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 14:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 14:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 27 14:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 14:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 14:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 27 14:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 14:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 14:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 27 14:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 14:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 14:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 27 14:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 14:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 27 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=wwwrmswll user-4=keralaholi user-5=wwwresourcehunte user-6=ugotscom user-7=wwwkaretakers user-8=cochintaxi user-9=dartsimp user-10=a2zgroup user-11=laundryboniface user-12=bonifacegroup user-13=wwwevmhonda user-14=straightcurve user-15=wwwletsstalkfood user-16=gifterman user-17=palco123 user-18=phmetals user-19=kottayamcalldriv user-20=mrsclean user-21=wwwnexidigital user-22=remysagr user-23=disposeat user-24=wwwkmaorg user-25=wwwkapin user-26=woodpeck user-27=vfmassets user-28=wwwtestugo user-29=shalinijames user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 27 14:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 27 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-jYBsQI9adfCv3ZiV.~ Dec 27 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-jYBsQI9adfCv3ZiV.~' Dec 27 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-jYBsQI9adfCv3ZiV.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 27 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 27 14:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 14:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 27 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 14:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 14:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 14:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 14:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 27 14:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 27 14:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 27 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 27 14:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 14:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 14:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 27 14:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 14:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 14:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 27 14:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 14:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 27 14:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 14:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 14:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 27 14:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 14:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 14:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 27 14:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 14:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 14:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 27 14:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 14:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 14:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 27 14:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 14:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 14:23:12 host sshd[23108]: Invalid user inspur from 106.10.122.53 port 57278 Dec 27 14:23:12 host sshd[23108]: input_userauth_request: invalid user inspur [preauth] Dec 27 14:23:12 host sshd[23108]: pam_unix(sshd:auth): check pass; user unknown Dec 27 14:23:12 host sshd[23108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 27 14:23:15 host sshd[23108]: Failed password for invalid user inspur from 106.10.122.53 port 57278 ssh2 Dec 27 14:23:15 host sshd[23108]: Connection closed by 106.10.122.53 port 57278 [preauth] Dec 27 14:40:06 host sshd[25550]: Connection closed by 167.94.138.61 port 56750 [preauth] Dec 27 14:42:04 host sshd[25840]: Invalid user user1 from 103.13.40.2 port 45902 Dec 27 14:42:04 host sshd[25840]: input_userauth_request: invalid user user1 [preauth] Dec 27 14:42:04 host sshd[25840]: pam_unix(sshd:auth): check pass; user unknown Dec 27 14:42:04 host sshd[25840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 27 14:42:06 host sshd[25840]: Failed password for invalid user user1 from 103.13.40.2 port 45902 ssh2 Dec 27 14:42:06 host sshd[25840]: Connection closed by 103.13.40.2 port 45902 [preauth] Dec 27 14:44:47 host sshd[26197]: Invalid user chenqi from 162.218.126.136 port 38774 Dec 27 14:44:47 host sshd[26197]: input_userauth_request: invalid user chenqi [preauth] Dec 27 14:44:47 host sshd[26197]: pam_unix(sshd:auth): check pass; user unknown Dec 27 14:44:47 host sshd[26197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 27 14:44:49 host sshd[26197]: Failed password for invalid user chenqi from 162.218.126.136 port 38774 ssh2 Dec 27 14:44:49 host sshd[26197]: Connection closed by 162.218.126.136 port 38774 [preauth] Dec 27 15:09:59 host sshd[30030]: Invalid user oracle from 41.197.31.178 port 52118 Dec 27 15:09:59 host sshd[30030]: input_userauth_request: invalid user oracle [preauth] Dec 27 15:09:59 host sshd[30030]: pam_unix(sshd:auth): check pass; user unknown Dec 27 15:09:59 host sshd[30030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 27 15:10:02 host sshd[30030]: Failed password for invalid user oracle from 41.197.31.178 port 52118 ssh2 Dec 27 15:10:02 host sshd[30030]: Connection closed by 41.197.31.178 port 52118 [preauth] Dec 27 15:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 15:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 15:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 15:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 15:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 15:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 15:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 15:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 15:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 15:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 27 15:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 15:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 15:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 27 15:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 15:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 15:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 27 15:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 15:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 15:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 27 15:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 15:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 15:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 27 15:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 15:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 15:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 27 15:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 15:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 15:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 27 15:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 15:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 15:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 27 15:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 15:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 15:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 15:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 15:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 15:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 27 15:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 15:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 15:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwnexidigital user-2=mrsclean user-3=phmetals user-4=kottayamcalldriv user-5=gifterman user-6=palco123 user-7=wwwletsstalkfood user-8=straightcurve user-9=wwwevmhonda user-10=bonifacegroup user-11=pmcresources user-12=wwwtestugo user-13=shalinijames user-14=vfmassets user-15=woodpeck user-16=wwwkapin user-17=remysagr user-18=disposeat user-19=wwwkmaorg user-20=ugotscom user-21=wwwrmswll user-22=keralaholi user-23=wwwresourcehunte user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=dartsimp user-28=a2zgroup user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 27 15:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 27 15:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9DtpNRG5QpzBrM8N.~ Dec 27 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9DtpNRG5QpzBrM8N.~' Dec 27 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9DtpNRG5QpzBrM8N.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 27 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 27 15:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 15:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 15:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 15:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 15:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 15:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 15:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 15:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 27 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 15:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 15:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 27 15:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 27 15:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 27 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 27 15:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 15:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 27 15:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 15:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 15:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 27 15:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 15:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 15:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 27 15:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 15:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 27 15:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 15:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 15:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 27 15:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 15:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 15:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 27 15:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 15:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 15:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 27 15:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 15:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 15:26:46 host sshd[406]: Invalid user lyh from 92.46.108.20 port 56948 Dec 27 15:26:46 host sshd[406]: input_userauth_request: invalid user lyh [preauth] Dec 27 15:26:46 host sshd[406]: pam_unix(sshd:auth): check pass; user unknown Dec 27 15:26:46 host sshd[406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 27 15:26:49 host sshd[406]: Failed password for invalid user lyh from 92.46.108.20 port 56948 ssh2 Dec 27 15:26:49 host sshd[406]: Connection closed by 92.46.108.20 port 56948 [preauth] Dec 27 15:41:53 host sshd[2951]: User root from 201.42.216.109 not allowed because not listed in AllowUsers Dec 27 15:41:53 host sshd[2951]: input_userauth_request: invalid user root [preauth] Dec 27 15:41:53 host unix_chkpwd[2957]: password check failed for user (root) Dec 27 15:41:53 host sshd[2951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.42.216.109 user=root Dec 27 15:41:53 host sshd[2951]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 15:41:55 host sshd[2951]: Failed password for invalid user root from 201.42.216.109 port 3555 ssh2 Dec 27 15:41:55 host sshd[2951]: Received disconnect from 201.42.216.109 port 3555:11: Bye Bye [preauth] Dec 27 15:41:55 host sshd[2951]: Disconnected from 201.42.216.109 port 3555 [preauth] Dec 27 15:44:11 host sshd[3259]: User root from 187.105.37.227 not allowed because not listed in AllowUsers Dec 27 15:44:11 host sshd[3259]: input_userauth_request: invalid user root [preauth] Dec 27 15:44:11 host unix_chkpwd[3266]: password check failed for user (root) Dec 27 15:44:11 host sshd[3259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.105.37.227 user=root Dec 27 15:44:11 host sshd[3259]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 15:44:13 host sshd[3259]: Failed password for invalid user root from 187.105.37.227 port 36616 ssh2 Dec 27 15:44:13 host sshd[3259]: Received disconnect from 187.105.37.227 port 36616:11: Bye Bye [preauth] Dec 27 15:44:13 host sshd[3259]: Disconnected from 187.105.37.227 port 36616 [preauth] Dec 27 15:44:57 host sshd[3369]: User root from 143.198.155.0 not allowed because not listed in AllowUsers Dec 27 15:44:57 host sshd[3369]: input_userauth_request: invalid user root [preauth] Dec 27 15:44:57 host unix_chkpwd[3376]: password check failed for user (root) Dec 27 15:44:57 host sshd[3369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.155.0 user=root Dec 27 15:44:57 host sshd[3369]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 15:44:59 host sshd[3369]: Failed password for invalid user root from 143.198.155.0 port 35122 ssh2 Dec 27 15:45:00 host sshd[3369]: Received disconnect from 143.198.155.0 port 35122:11: Bye Bye [preauth] Dec 27 15:45:00 host sshd[3369]: Disconnected from 143.198.155.0 port 35122 [preauth] Dec 27 15:45:40 host sshd[3580]: User root from 104.211.77.31 not allowed because not listed in AllowUsers Dec 27 15:45:40 host sshd[3580]: input_userauth_request: invalid user root [preauth] Dec 27 15:45:40 host unix_chkpwd[3582]: password check failed for user (root) Dec 27 15:45:40 host sshd[3580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.211.77.31 user=root Dec 27 15:45:40 host sshd[3580]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 15:45:42 host sshd[3580]: Failed password for invalid user root from 104.211.77.31 port 42552 ssh2 Dec 27 15:45:42 host sshd[3580]: Received disconnect from 104.211.77.31 port 42552:11: Bye Bye [preauth] Dec 27 15:45:42 host sshd[3580]: Disconnected from 104.211.77.31 port 42552 [preauth] Dec 27 15:45:45 host sshd[3628]: User root from 72.240.125.133 not allowed because not listed in AllowUsers Dec 27 15:45:45 host sshd[3628]: input_userauth_request: invalid user root [preauth] Dec 27 15:45:45 host unix_chkpwd[3633]: password check failed for user (root) Dec 27 15:45:45 host sshd[3628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.240.125.133 user=root Dec 27 15:45:45 host sshd[3628]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 15:45:47 host sshd[3628]: Failed password for invalid user root from 72.240.125.133 port 55582 ssh2 Dec 27 15:45:47 host sshd[3628]: Received disconnect from 72.240.125.133 port 55582:11: Bye Bye [preauth] Dec 27 15:45:47 host sshd[3628]: Disconnected from 72.240.125.133 port 55582 [preauth] Dec 27 15:45:59 host sshd[3651]: User root from 178.62.64.242 not allowed because not listed in AllowUsers Dec 27 15:45:59 host sshd[3651]: input_userauth_request: invalid user root [preauth] Dec 27 15:45:59 host unix_chkpwd[3655]: password check failed for user (root) Dec 27 15:45:59 host sshd[3651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.64.242 user=root Dec 27 15:45:59 host sshd[3651]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 15:46:01 host sshd[3651]: Failed password for invalid user root from 178.62.64.242 port 56528 ssh2 Dec 27 15:46:01 host sshd[3651]: Received disconnect from 178.62.64.242 port 56528:11: Bye Bye [preauth] Dec 27 15:46:01 host sshd[3651]: Disconnected from 178.62.64.242 port 56528 [preauth] Dec 27 15:46:32 host sshd[3745]: User root from 193.122.134.119 not allowed because not listed in AllowUsers Dec 27 15:46:32 host sshd[3745]: input_userauth_request: invalid user root [preauth] Dec 27 15:46:32 host unix_chkpwd[3748]: password check failed for user (root) Dec 27 15:46:32 host sshd[3745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.134.119 user=root Dec 27 15:46:32 host sshd[3745]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 15:46:33 host sshd[3745]: Failed password for invalid user root from 193.122.134.119 port 14002 ssh2 Dec 27 15:46:33 host sshd[3745]: Received disconnect from 193.122.134.119 port 14002:11: Bye Bye [preauth] Dec 27 15:46:33 host sshd[3745]: Disconnected from 193.122.134.119 port 14002 [preauth] Dec 27 15:47:00 host sshd[3801]: User root from 104.248.204.184 not allowed because not listed in AllowUsers Dec 27 15:47:00 host sshd[3801]: input_userauth_request: invalid user root [preauth] Dec 27 15:47:00 host unix_chkpwd[3807]: password check failed for user (root) Dec 27 15:47:00 host sshd[3801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.204.184 user=root Dec 27 15:47:00 host sshd[3801]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 15:47:01 host sshd[3801]: Failed password for invalid user root from 104.248.204.184 port 38882 ssh2 Dec 27 15:47:01 host sshd[3801]: Received disconnect from 104.248.204.184 port 38882:11: Bye Bye [preauth] Dec 27 15:47:01 host sshd[3801]: Disconnected from 104.248.204.184 port 38882 [preauth] Dec 27 15:47:51 host sshd[3931]: User root from 178.62.64.242 not allowed because not listed in AllowUsers Dec 27 15:47:51 host sshd[3931]: input_userauth_request: invalid user root [preauth] Dec 27 15:47:51 host unix_chkpwd[3938]: password check failed for user (root) Dec 27 15:47:51 host sshd[3931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.64.242 user=root Dec 27 15:47:51 host sshd[3931]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 15:47:52 host sshd[3933]: User root from 201.42.216.109 not allowed because not listed in AllowUsers Dec 27 15:47:52 host sshd[3933]: input_userauth_request: invalid user root [preauth] Dec 27 15:47:52 host unix_chkpwd[3940]: password check failed for user (root) Dec 27 15:47:52 host sshd[3933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.42.216.109 user=root Dec 27 15:47:52 host sshd[3933]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 15:47:53 host sshd[3931]: Failed password for invalid user root from 178.62.64.242 port 33148 ssh2 Dec 27 15:47:53 host sshd[3931]: Received disconnect from 178.62.64.242 port 33148:11: Bye Bye [preauth] Dec 27 15:47:53 host sshd[3931]: Disconnected from 178.62.64.242 port 33148 [preauth] Dec 27 15:47:54 host sshd[3933]: Failed password for invalid user root from 201.42.216.109 port 55834 ssh2 Dec 27 15:47:59 host sshd[4011]: User root from 143.198.155.0 not allowed because not listed in AllowUsers Dec 27 15:47:59 host sshd[4011]: input_userauth_request: invalid user root [preauth] Dec 27 15:47:59 host unix_chkpwd[4016]: password check failed for user (root) Dec 27 15:47:59 host sshd[4011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.155.0 user=root Dec 27 15:47:59 host sshd[4011]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 15:48:02 host sshd[4011]: Failed password for invalid user root from 143.198.155.0 port 49558 ssh2 Dec 27 15:48:02 host sshd[4011]: Received disconnect from 143.198.155.0 port 49558:11: Bye Bye [preauth] Dec 27 15:48:02 host sshd[4011]: Disconnected from 143.198.155.0 port 49558 [preauth] Dec 27 15:48:18 host sshd[4097]: User root from 43.155.164.248 not allowed because not listed in AllowUsers Dec 27 15:48:18 host sshd[4097]: input_userauth_request: invalid user root [preauth] Dec 27 15:48:18 host unix_chkpwd[4100]: password check failed for user (root) Dec 27 15:48:18 host sshd[4097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.164.248 user=root Dec 27 15:48:18 host sshd[4097]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 15:48:20 host sshd[4097]: Failed password for invalid user root from 43.155.164.248 port 35976 ssh2 Dec 27 15:48:20 host sshd[4097]: Received disconnect from 43.155.164.248 port 35976:11: Bye Bye [preauth] Dec 27 15:48:20 host sshd[4097]: Disconnected from 43.155.164.248 port 35976 [preauth] Dec 27 15:48:30 host sshd[4136]: User root from 111.132.3.17 not allowed because not listed in AllowUsers Dec 27 15:48:30 host sshd[4136]: input_userauth_request: invalid user root [preauth] Dec 27 15:48:30 host unix_chkpwd[4142]: password check failed for user (root) Dec 27 15:48:30 host sshd[4136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.132.3.17 user=root Dec 27 15:48:30 host sshd[4136]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 15:48:33 host sshd[4136]: Failed password for invalid user root from 111.132.3.17 port 33214 ssh2 Dec 27 15:48:37 host sshd[4136]: Received disconnect from 111.132.3.17 port 33214:11: Bye Bye [preauth] Dec 27 15:48:37 host sshd[4136]: Disconnected from 111.132.3.17 port 33214 [preauth] Dec 27 15:48:42 host sshd[4160]: User root from 72.240.125.133 not allowed because not listed in AllowUsers Dec 27 15:48:42 host sshd[4160]: input_userauth_request: invalid user root [preauth] Dec 27 15:48:42 host unix_chkpwd[4165]: password check failed for user (root) Dec 27 15:48:42 host sshd[4160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.240.125.133 user=root Dec 27 15:48:42 host sshd[4160]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 15:48:44 host sshd[4160]: Failed password for invalid user root from 72.240.125.133 port 34650 ssh2 Dec 27 15:48:44 host sshd[4160]: Received disconnect from 72.240.125.133 port 34650:11: Bye Bye [preauth] Dec 27 15:48:44 host sshd[4160]: Disconnected from 72.240.125.133 port 34650 [preauth] Dec 27 15:49:04 host sshd[4247]: User root from 187.105.37.227 not allowed because not listed in AllowUsers Dec 27 15:49:04 host sshd[4247]: input_userauth_request: invalid user root [preauth] Dec 27 15:49:05 host unix_chkpwd[4251]: password check failed for user (root) Dec 27 15:49:05 host sshd[4247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.105.37.227 user=root Dec 27 15:49:05 host sshd[4247]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 15:49:06 host sshd[4247]: Failed password for invalid user root from 187.105.37.227 port 57018 ssh2 Dec 27 15:49:07 host sshd[4247]: Received disconnect from 187.105.37.227 port 57018:11: Bye Bye [preauth] Dec 27 15:49:07 host sshd[4247]: Disconnected from 187.105.37.227 port 57018 [preauth] Dec 27 15:49:48 host sshd[4401]: User root from 51.250.1.109 not allowed because not listed in AllowUsers Dec 27 15:49:48 host sshd[4401]: input_userauth_request: invalid user root [preauth] Dec 27 15:49:48 host unix_chkpwd[4404]: password check failed for user (root) Dec 27 15:49:48 host sshd[4401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.1.109 user=root Dec 27 15:49:48 host sshd[4401]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 15:49:50 host sshd[4401]: Failed password for invalid user root from 51.250.1.109 port 55548 ssh2 Dec 27 15:49:50 host sshd[4401]: Received disconnect from 51.250.1.109 port 55548:11: Bye Bye [preauth] Dec 27 15:49:50 host sshd[4401]: Disconnected from 51.250.1.109 port 55548 [preauth] Dec 27 15:50:29 host sshd[4526]: User root from 43.155.164.248 not allowed because not listed in AllowUsers Dec 27 15:50:29 host sshd[4526]: input_userauth_request: invalid user root [preauth] Dec 27 15:50:29 host unix_chkpwd[4528]: password check failed for user (root) Dec 27 15:50:29 host sshd[4526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.164.248 user=root Dec 27 15:50:29 host sshd[4526]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 15:50:31 host sshd[4526]: Failed password for invalid user root from 43.155.164.248 port 38294 ssh2 Dec 27 15:50:31 host sshd[4526]: Received disconnect from 43.155.164.248 port 38294:11: Bye Bye [preauth] Dec 27 15:50:31 host sshd[4526]: Disconnected from 43.155.164.248 port 38294 [preauth] Dec 27 15:51:09 host sshd[4762]: User root from 104.248.204.184 not allowed because not listed in AllowUsers Dec 27 15:51:09 host sshd[4762]: input_userauth_request: invalid user root [preauth] Dec 27 15:51:09 host unix_chkpwd[4769]: password check failed for user (root) Dec 27 15:51:09 host sshd[4762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.204.184 user=root Dec 27 15:51:09 host sshd[4762]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 15:51:11 host sshd[4762]: Failed password for invalid user root from 104.248.204.184 port 46560 ssh2 Dec 27 15:51:11 host sshd[4762]: Received disconnect from 104.248.204.184 port 46560:11: Bye Bye [preauth] Dec 27 15:51:11 host sshd[4762]: Disconnected from 104.248.204.184 port 46560 [preauth] Dec 27 15:51:18 host sshd[4812]: User root from 43.156.34.120 not allowed because not listed in AllowUsers Dec 27 15:51:18 host sshd[4812]: input_userauth_request: invalid user root [preauth] Dec 27 15:51:18 host unix_chkpwd[4814]: password check failed for user (root) Dec 27 15:51:18 host sshd[4812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.34.120 user=root Dec 27 15:51:18 host sshd[4812]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 15:51:20 host sshd[4812]: Failed password for invalid user root from 43.156.34.120 port 38724 ssh2 Dec 27 15:51:20 host sshd[4812]: Received disconnect from 43.156.34.120 port 38724:11: Bye Bye [preauth] Dec 27 15:51:20 host sshd[4812]: Disconnected from 43.156.34.120 port 38724 [preauth] Dec 27 15:51:36 host sshd[4865]: User root from 104.211.77.31 not allowed because not listed in AllowUsers Dec 27 15:51:36 host sshd[4865]: input_userauth_request: invalid user root [preauth] Dec 27 15:51:36 host unix_chkpwd[4867]: password check failed for user (root) Dec 27 15:51:36 host sshd[4865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.211.77.31 user=root Dec 27 15:51:36 host sshd[4865]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 15:51:38 host sshd[4865]: Failed password for invalid user root from 104.211.77.31 port 47946 ssh2 Dec 27 15:51:38 host sshd[4865]: Received disconnect from 104.211.77.31 port 47946:11: Bye Bye [preauth] Dec 27 15:51:38 host sshd[4865]: Disconnected from 104.211.77.31 port 47946 [preauth] Dec 27 15:52:12 host sshd[4995]: User root from 193.122.134.119 not allowed because not listed in AllowUsers Dec 27 15:52:12 host sshd[4995]: input_userauth_request: invalid user root [preauth] Dec 27 15:52:12 host unix_chkpwd[4999]: password check failed for user (root) Dec 27 15:52:12 host sshd[4995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.134.119 user=root Dec 27 15:52:12 host sshd[4995]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 15:52:14 host sshd[4995]: Failed password for invalid user root from 193.122.134.119 port 32368 ssh2 Dec 27 15:52:30 host sshd[5080]: User root from 51.250.1.109 not allowed because not listed in AllowUsers Dec 27 15:52:30 host sshd[5080]: input_userauth_request: invalid user root [preauth] Dec 27 15:52:30 host unix_chkpwd[5085]: password check failed for user (root) Dec 27 15:52:30 host sshd[5080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.1.109 user=root Dec 27 15:52:31 host sshd[5080]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 15:52:33 host sshd[5080]: Failed password for invalid user root from 51.250.1.109 port 36848 ssh2 Dec 27 15:52:33 host sshd[5080]: Received disconnect from 51.250.1.109 port 36848:11: Bye Bye [preauth] Dec 27 15:52:33 host sshd[5080]: Disconnected from 51.250.1.109 port 36848 [preauth] Dec 27 15:54:01 host sshd[5332]: Invalid user speakin from 106.10.122.53 port 42122 Dec 27 15:54:01 host sshd[5332]: input_userauth_request: invalid user speakin [preauth] Dec 27 15:54:01 host sshd[5332]: pam_unix(sshd:auth): check pass; user unknown Dec 27 15:54:01 host sshd[5332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 27 15:54:03 host sshd[5332]: Failed password for invalid user speakin from 106.10.122.53 port 42122 ssh2 Dec 27 15:54:03 host sshd[5332]: Connection closed by 106.10.122.53 port 42122 [preauth] Dec 27 15:54:13 host sshd[5368]: User root from 43.156.34.120 not allowed because not listed in AllowUsers Dec 27 15:54:13 host sshd[5368]: input_userauth_request: invalid user root [preauth] Dec 27 15:54:13 host unix_chkpwd[5372]: password check failed for user (root) Dec 27 15:54:13 host sshd[5368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.34.120 user=root Dec 27 15:54:13 host sshd[5368]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 15:54:15 host sshd[5368]: Failed password for invalid user root from 43.156.34.120 port 42564 ssh2 Dec 27 15:54:15 host sshd[5368]: Received disconnect from 43.156.34.120 port 42564:11: Bye Bye [preauth] Dec 27 15:54:15 host sshd[5368]: Disconnected from 43.156.34.120 port 42564 [preauth] Dec 27 16:02:12 host sshd[6680]: Invalid user do from 45.93.201.90 port 41208 Dec 27 16:02:12 host sshd[6680]: input_userauth_request: invalid user do [preauth] Dec 27 16:02:12 host sshd[6680]: pam_unix(sshd:auth): check pass; user unknown Dec 27 16:02:12 host sshd[6680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 27 16:02:14 host sshd[6680]: Failed password for invalid user do from 45.93.201.90 port 41208 ssh2 Dec 27 16:02:17 host sshd[6680]: pam_unix(sshd:auth): check pass; user unknown Dec 27 16:02:19 host sshd[6680]: Failed password for invalid user do from 45.93.201.90 port 41208 ssh2 Dec 27 16:02:22 host sshd[6680]: pam_unix(sshd:auth): check pass; user unknown Dec 27 16:02:24 host sshd[6680]: Failed password for invalid user do from 45.93.201.90 port 41208 ssh2 Dec 27 16:02:27 host sshd[6680]: Connection closed by 45.93.201.90 port 41208 [preauth] Dec 27 16:02:27 host sshd[6680]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 27 16:08:03 host sshd[7462]: Invalid user yxd from 162.218.126.136 port 50478 Dec 27 16:08:03 host sshd[7462]: input_userauth_request: invalid user yxd [preauth] Dec 27 16:08:03 host sshd[7462]: pam_unix(sshd:auth): check pass; user unknown Dec 27 16:08:03 host sshd[7462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 27 16:08:05 host sshd[7462]: Failed password for invalid user yxd from 162.218.126.136 port 50478 ssh2 Dec 27 16:08:05 host sshd[7462]: Connection closed by 162.218.126.136 port 50478 [preauth] Dec 27 16:09:14 host sshd[7606]: Invalid user anon from 104.244.74.6 port 47386 Dec 27 16:09:14 host sshd[7606]: input_userauth_request: invalid user anon [preauth] Dec 27 16:09:14 host sshd[7606]: pam_unix(sshd:auth): check pass; user unknown Dec 27 16:09:14 host sshd[7606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Dec 27 16:09:16 host sshd[7606]: Failed password for invalid user anon from 104.244.74.6 port 47386 ssh2 Dec 27 16:09:16 host sshd[7606]: Connection closed by 104.244.74.6 port 47386 [preauth] Dec 27 16:10:49 host sshd[7828]: Invalid user es from 103.13.40.2 port 34796 Dec 27 16:10:49 host sshd[7828]: input_userauth_request: invalid user es [preauth] Dec 27 16:10:49 host sshd[7828]: pam_unix(sshd:auth): check pass; user unknown Dec 27 16:10:49 host sshd[7828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 27 16:10:51 host sshd[7828]: Failed password for invalid user es from 103.13.40.2 port 34796 ssh2 Dec 27 16:10:51 host sshd[7828]: Connection closed by 103.13.40.2 port 34796 [preauth] Dec 27 16:11:25 host sshd[7888]: User root from 154.68.232.20 not allowed because not listed in AllowUsers Dec 27 16:11:25 host sshd[7888]: input_userauth_request: invalid user root [preauth] Dec 27 16:11:25 host unix_chkpwd[7893]: password check failed for user (root) Dec 27 16:11:25 host sshd[7888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.68.232.20 user=root Dec 27 16:11:25 host sshd[7888]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 16:11:28 host sshd[7888]: Failed password for invalid user root from 154.68.232.20 port 37884 ssh2 Dec 27 16:11:28 host sshd[7888]: Received disconnect from 154.68.232.20 port 37884:11: Bye Bye [preauth] Dec 27 16:11:28 host sshd[7888]: Disconnected from 154.68.232.20 port 37884 [preauth] Dec 27 16:11:40 host sshd[7936]: User root from 211.43.12.240 not allowed because not listed in AllowUsers Dec 27 16:11:40 host sshd[7936]: input_userauth_request: invalid user root [preauth] Dec 27 16:11:40 host unix_chkpwd[7945]: password check failed for user (root) Dec 27 16:11:40 host sshd[7936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.43.12.240 user=root Dec 27 16:11:40 host sshd[7936]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 16:11:42 host sshd[7936]: Failed password for invalid user root from 211.43.12.240 port 46951 ssh2 Dec 27 16:11:42 host sshd[7936]: Received disconnect from 211.43.12.240 port 46951:11: Bye Bye [preauth] Dec 27 16:11:42 host sshd[7936]: Disconnected from 211.43.12.240 port 46951 [preauth] Dec 27 16:13:11 host sshd[8108]: Invalid user anon from 104.244.74.6 port 60950 Dec 27 16:13:11 host sshd[8108]: input_userauth_request: invalid user anon [preauth] Dec 27 16:13:11 host sshd[8108]: pam_unix(sshd:auth): check pass; user unknown Dec 27 16:13:11 host sshd[8108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Dec 27 16:13:13 host sshd[8108]: Failed password for invalid user anon from 104.244.74.6 port 60950 ssh2 Dec 27 16:13:14 host sshd[8108]: Connection closed by 104.244.74.6 port 60950 [preauth] Dec 27 16:13:38 host sshd[8198]: User root from 107.172.103.155 not allowed because not listed in AllowUsers Dec 27 16:13:38 host sshd[8198]: input_userauth_request: invalid user root [preauth] Dec 27 16:13:38 host unix_chkpwd[8231]: password check failed for user (root) Dec 27 16:13:38 host sshd[8198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.172.103.155 user=root Dec 27 16:13:38 host sshd[8198]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 16:13:40 host sshd[8198]: Failed password for invalid user root from 107.172.103.155 port 48022 ssh2 Dec 27 16:13:40 host sshd[8198]: Received disconnect from 107.172.103.155 port 48022:11: Bye Bye [preauth] Dec 27 16:13:40 host sshd[8198]: Disconnected from 107.172.103.155 port 48022 [preauth] Dec 27 16:14:21 host sshd[8357]: User root from 109.248.212.17 not allowed because not listed in AllowUsers Dec 27 16:14:21 host sshd[8357]: input_userauth_request: invalid user root [preauth] Dec 27 16:14:21 host unix_chkpwd[8364]: password check failed for user (root) Dec 27 16:14:21 host sshd[8357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.248.212.17 user=root Dec 27 16:14:21 host sshd[8357]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 16:14:23 host sshd[8357]: Failed password for invalid user root from 109.248.212.17 port 42794 ssh2 Dec 27 16:14:23 host sshd[8357]: Received disconnect from 109.248.212.17 port 42794:11: Bye Bye [preauth] Dec 27 16:14:23 host sshd[8357]: Disconnected from 109.248.212.17 port 42794 [preauth] Dec 27 16:14:25 host sshd[8367]: User root from 46.101.5.100 not allowed because not listed in AllowUsers Dec 27 16:14:25 host sshd[8367]: input_userauth_request: invalid user root [preauth] Dec 27 16:14:25 host unix_chkpwd[8372]: password check failed for user (root) Dec 27 16:14:25 host sshd[8367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.5.100 user=root Dec 27 16:14:25 host sshd[8367]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 16:14:27 host sshd[8367]: Failed password for invalid user root from 46.101.5.100 port 51668 ssh2 Dec 27 16:14:27 host sshd[8367]: Received disconnect from 46.101.5.100 port 51668:11: Bye Bye [preauth] Dec 27 16:14:27 host sshd[8367]: Disconnected from 46.101.5.100 port 51668 [preauth] Dec 27 16:14:39 host sshd[8421]: User root from 188.166.58.179 not allowed because not listed in AllowUsers Dec 27 16:14:39 host sshd[8421]: input_userauth_request: invalid user root [preauth] Dec 27 16:14:40 host unix_chkpwd[8429]: password check failed for user (root) Dec 27 16:14:40 host sshd[8421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.58.179 user=root Dec 27 16:14:40 host sshd[8421]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 16:14:41 host sshd[8421]: Failed password for invalid user root from 188.166.58.179 port 47134 ssh2 Dec 27 16:14:41 host sshd[8421]: Received disconnect from 188.166.58.179 port 47134:11: Bye Bye [preauth] Dec 27 16:14:41 host sshd[8421]: Disconnected from 188.166.58.179 port 47134 [preauth] Dec 27 16:15:25 host sshd[8513]: User root from 210.211.116.80 not allowed because not listed in AllowUsers Dec 27 16:15:25 host sshd[8513]: input_userauth_request: invalid user root [preauth] Dec 27 16:15:25 host unix_chkpwd[8517]: password check failed for user (root) Dec 27 16:15:25 host sshd[8513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.211.116.80 user=root Dec 27 16:15:25 host sshd[8513]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 16:15:27 host sshd[8513]: Failed password for invalid user root from 210.211.116.80 port 61158 ssh2 Dec 27 16:15:27 host sshd[8513]: Received disconnect from 210.211.116.80 port 61158:11: Bye Bye [preauth] Dec 27 16:15:27 host sshd[8513]: Disconnected from 210.211.116.80 port 61158 [preauth] Dec 27 16:16:59 host sshd[8714]: User root from 180.190.241.88 not allowed because not listed in AllowUsers Dec 27 16:16:59 host sshd[8714]: input_userauth_request: invalid user root [preauth] Dec 27 16:16:59 host unix_chkpwd[8719]: password check failed for user (root) Dec 27 16:16:59 host sshd[8714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.190.241.88 user=root Dec 27 16:16:59 host sshd[8714]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 16:17:01 host sshd[8714]: Failed password for invalid user root from 180.190.241.88 port 54012 ssh2 Dec 27 16:17:01 host sshd[8714]: Received disconnect from 180.190.241.88 port 54012:11: Bye Bye [preauth] Dec 27 16:17:01 host sshd[8714]: Disconnected from 180.190.241.88 port 54012 [preauth] Dec 27 16:17:03 host sshd[8732]: User root from 154.68.232.20 not allowed because not listed in AllowUsers Dec 27 16:17:03 host sshd[8732]: input_userauth_request: invalid user root [preauth] Dec 27 16:17:03 host unix_chkpwd[8735]: password check failed for user (root) Dec 27 16:17:03 host sshd[8732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.68.232.20 user=root Dec 27 16:17:03 host sshd[8732]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 16:17:05 host sshd[8732]: Failed password for invalid user root from 154.68.232.20 port 52462 ssh2 Dec 27 16:17:22 host sshd[8796]: User root from 107.172.103.155 not allowed because not listed in AllowUsers Dec 27 16:17:22 host sshd[8796]: input_userauth_request: invalid user root [preauth] Dec 27 16:17:22 host unix_chkpwd[8799]: password check failed for user (root) Dec 27 16:17:22 host sshd[8796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.172.103.155 user=root Dec 27 16:17:22 host sshd[8796]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 16:17:24 host sshd[8796]: Failed password for invalid user root from 107.172.103.155 port 37294 ssh2 Dec 27 16:17:24 host sshd[8796]: Received disconnect from 107.172.103.155 port 37294:11: Bye Bye [preauth] Dec 27 16:17:24 host sshd[8796]: Disconnected from 107.172.103.155 port 37294 [preauth] Dec 27 16:17:46 host sshd[8882]: User root from 46.101.5.100 not allowed because not listed in AllowUsers Dec 27 16:17:46 host sshd[8882]: input_userauth_request: invalid user root [preauth] Dec 27 16:17:46 host unix_chkpwd[8885]: password check failed for user (root) Dec 27 16:17:46 host sshd[8882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.5.100 user=root Dec 27 16:17:46 host sshd[8882]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 16:17:48 host sshd[8882]: Failed password for invalid user root from 46.101.5.100 port 33976 ssh2 Dec 27 16:17:48 host sshd[8882]: Received disconnect from 46.101.5.100 port 33976:11: Bye Bye [preauth] Dec 27 16:17:48 host sshd[8882]: Disconnected from 46.101.5.100 port 33976 [preauth] Dec 27 16:17:49 host sshd[8888]: User root from 210.211.116.80 not allowed because not listed in AllowUsers Dec 27 16:17:49 host sshd[8888]: input_userauth_request: invalid user root [preauth] Dec 27 16:17:49 host unix_chkpwd[8891]: password check failed for user (root) Dec 27 16:17:49 host sshd[8888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.211.116.80 user=root Dec 27 16:17:49 host sshd[8888]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 16:17:51 host sshd[8888]: Failed password for invalid user root from 210.211.116.80 port 62212 ssh2 Dec 27 16:17:53 host sshd[8954]: User root from 188.166.58.179 not allowed because not listed in AllowUsers Dec 27 16:17:53 host sshd[8954]: input_userauth_request: invalid user root [preauth] Dec 27 16:17:53 host unix_chkpwd[8957]: password check failed for user (root) Dec 27 16:17:53 host sshd[8954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.58.179 user=root Dec 27 16:17:53 host sshd[8954]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 16:17:56 host sshd[8954]: Failed password for invalid user root from 188.166.58.179 port 57056 ssh2 Dec 27 16:18:20 host sshd[9035]: User root from 211.43.12.240 not allowed because not listed in AllowUsers Dec 27 16:18:20 host sshd[9035]: input_userauth_request: invalid user root [preauth] Dec 27 16:18:20 host unix_chkpwd[9043]: password check failed for user (root) Dec 27 16:18:20 host sshd[9035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.43.12.240 user=root Dec 27 16:18:20 host sshd[9035]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 16:18:21 host sshd[9035]: Failed password for invalid user root from 211.43.12.240 port 40618 ssh2 Dec 27 16:18:21 host sshd[9035]: Received disconnect from 211.43.12.240 port 40618:11: Bye Bye [preauth] Dec 27 16:18:21 host sshd[9035]: Disconnected from 211.43.12.240 port 40618 [preauth] Dec 27 16:18:22 host sshd[9046]: User root from 109.248.212.17 not allowed because not listed in AllowUsers Dec 27 16:18:22 host sshd[9046]: input_userauth_request: invalid user root [preauth] Dec 27 16:18:22 host unix_chkpwd[9049]: password check failed for user (root) Dec 27 16:18:22 host sshd[9046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.248.212.17 user=root Dec 27 16:18:22 host sshd[9046]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 16:18:24 host sshd[9046]: Failed password for invalid user root from 109.248.212.17 port 48360 ssh2 Dec 27 16:18:25 host sshd[9046]: Received disconnect from 109.248.212.17 port 48360:11: Bye Bye [preauth] Dec 27 16:18:25 host sshd[9046]: Disconnected from 109.248.212.17 port 48360 [preauth] Dec 27 16:18:42 host sshd[9235]: User root from 180.190.241.88 not allowed because not listed in AllowUsers Dec 27 16:18:42 host sshd[9235]: input_userauth_request: invalid user root [preauth] Dec 27 16:18:42 host unix_chkpwd[9238]: password check failed for user (root) Dec 27 16:18:42 host sshd[9235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.190.241.88 user=root Dec 27 16:18:42 host sshd[9235]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 16:18:45 host sshd[9235]: Failed password for invalid user root from 180.190.241.88 port 55640 ssh2 Dec 27 16:18:45 host sshd[9235]: Received disconnect from 180.190.241.88 port 55640:11: Bye Bye [preauth] Dec 27 16:18:45 host sshd[9235]: Disconnected from 180.190.241.88 port 55640 [preauth] Dec 27 16:19:48 host sshd[9421]: User root from 146.190.104.63 not allowed because not listed in AllowUsers Dec 27 16:19:48 host sshd[9421]: input_userauth_request: invalid user root [preauth] Dec 27 16:19:48 host unix_chkpwd[9424]: password check failed for user (root) Dec 27 16:19:48 host sshd[9421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.104.63 user=root Dec 27 16:19:48 host sshd[9421]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 16:19:51 host sshd[9421]: Failed password for invalid user root from 146.190.104.63 port 43396 ssh2 Dec 27 16:19:51 host sshd[9421]: Received disconnect from 146.190.104.63 port 43396:11: Bye Bye [preauth] Dec 27 16:19:51 host sshd[9421]: Disconnected from 146.190.104.63 port 43396 [preauth] Dec 27 16:20:36 host sshd[9533]: User root from 59.144.139.22 not allowed because not listed in AllowUsers Dec 27 16:20:36 host sshd[9533]: input_userauth_request: invalid user root [preauth] Dec 27 16:20:36 host unix_chkpwd[9535]: password check failed for user (root) Dec 27 16:20:36 host sshd[9533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.144.139.22 user=root Dec 27 16:20:36 host sshd[9533]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 16:20:38 host sshd[9533]: Failed password for invalid user root from 59.144.139.22 port 36888 ssh2 Dec 27 16:20:38 host sshd[9533]: Received disconnect from 59.144.139.22 port 36888:11: Bye Bye [preauth] Dec 27 16:20:38 host sshd[9533]: Disconnected from 59.144.139.22 port 36888 [preauth] Dec 27 16:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 16:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 16:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 16:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 16:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 16:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 16:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 16:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 16:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 16:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 27 16:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 16:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 16:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 27 16:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 16:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 16:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 27 16:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 16:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 16:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 27 16:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 16:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 16:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 27 16:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 16:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 16:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 27 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 27 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 27 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 16:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 16:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 16:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 16:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 27 16:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 16:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 16:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=palco123 user-2=gifterman user-3=phmetals user-4=kottayamcalldriv user-5=wwwnexidigital user-6=mrsclean user-7=bonifacegroup user-8=wwwevmhonda user-9=wwwletsstalkfood user-10=straightcurve user-11=vfmassets user-12=shalinijames user-13=wwwtestugo user-14=pmcresources user-15=disposeat user-16=wwwkmaorg user-17=remysagr user-18=woodpeck user-19=wwwkapin user-20=travelboniface user-21=keralaholi user-22=wwwresourcehunte user-23=wwwrmswll user-24=ugotscom user-25=wwwpmcresource user-26=a2zgroup user-27=dartsimp user-28=laundryboniface user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 27 16:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 27 16:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 16:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 16:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 16:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 16:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 16:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cQIKbAvB2Kbu7uxZ.~ Dec 27 16:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 16:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 16:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cQIKbAvB2Kbu7uxZ.~' Dec 27 16:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 16:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 16:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cQIKbAvB2Kbu7uxZ.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 16:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 16:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 16:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 27 16:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 16:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 27 16:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 16:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 16:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 16:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 16:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 16:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 16:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 16:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 27 16:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 16:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 16:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 16:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 27 16:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 27 16:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 27 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 27 16:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 16:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 16:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 27 16:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 16:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 16:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 27 16:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 16:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 16:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 27 16:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 16:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 16:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 27 16:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 16:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 16:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 27 16:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 16:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 16:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 27 16:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 16:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 16:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 27 16:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 16:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 16:22:52 host sshd[10039]: User root from 103.147.3.111 not allowed because not listed in AllowUsers Dec 27 16:22:52 host sshd[10039]: input_userauth_request: invalid user root [preauth] Dec 27 16:22:52 host unix_chkpwd[10049]: password check failed for user (root) Dec 27 16:22:52 host sshd[10039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.3.111 user=root Dec 27 16:22:52 host sshd[10039]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 16:22:54 host sshd[10039]: Failed password for invalid user root from 103.147.3.111 port 56294 ssh2 Dec 27 16:22:55 host sshd[10039]: Received disconnect from 103.147.3.111 port 56294:11: Bye Bye [preauth] Dec 27 16:22:55 host sshd[10039]: Disconnected from 103.147.3.111 port 56294 [preauth] Dec 27 16:23:04 host sshd[10072]: User root from 59.144.139.22 not allowed because not listed in AllowUsers Dec 27 16:23:04 host sshd[10072]: input_userauth_request: invalid user root [preauth] Dec 27 16:23:04 host unix_chkpwd[10074]: password check failed for user (root) Dec 27 16:23:04 host sshd[10072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.144.139.22 user=root Dec 27 16:23:04 host sshd[10072]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 16:23:06 host sshd[10072]: Failed password for invalid user root from 59.144.139.22 port 42412 ssh2 Dec 27 16:23:23 host sshd[10125]: User root from 146.190.104.63 not allowed because not listed in AllowUsers Dec 27 16:23:23 host sshd[10125]: input_userauth_request: invalid user root [preauth] Dec 27 16:23:23 host unix_chkpwd[10128]: password check failed for user (root) Dec 27 16:23:23 host sshd[10125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.104.63 user=root Dec 27 16:23:23 host sshd[10125]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 16:23:25 host sshd[10125]: Failed password for invalid user root from 146.190.104.63 port 46632 ssh2 Dec 27 16:23:25 host sshd[10125]: Received disconnect from 146.190.104.63 port 46632:11: Bye Bye [preauth] Dec 27 16:23:25 host sshd[10125]: Disconnected from 146.190.104.63 port 46632 [preauth] Dec 27 16:25:35 host sshd[10545]: Invalid user pi from 82.64.186.234 port 35968 Dec 27 16:25:35 host sshd[10545]: input_userauth_request: invalid user pi [preauth] Dec 27 16:25:35 host sshd[10547]: Invalid user pi from 82.64.186.234 port 35984 Dec 27 16:25:35 host sshd[10547]: input_userauth_request: invalid user pi [preauth] Dec 27 16:25:36 host sshd[10545]: pam_unix(sshd:auth): check pass; user unknown Dec 27 16:25:36 host sshd[10545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.186.234 Dec 27 16:25:36 host sshd[10547]: pam_unix(sshd:auth): check pass; user unknown Dec 27 16:25:36 host sshd[10547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.186.234 Dec 27 16:25:37 host sshd[10545]: Failed password for invalid user pi from 82.64.186.234 port 35968 ssh2 Dec 27 16:25:37 host sshd[10547]: Failed password for invalid user pi from 82.64.186.234 port 35984 ssh2 Dec 27 16:25:38 host sshd[10545]: Connection closed by 82.64.186.234 port 35968 [preauth] Dec 27 16:25:38 host sshd[10547]: Connection closed by 82.64.186.234 port 35984 [preauth] Dec 27 16:30:05 host sshd[11164]: User root from 103.147.3.111 not allowed because not listed in AllowUsers Dec 27 16:30:05 host sshd[11164]: input_userauth_request: invalid user root [preauth] Dec 27 16:30:05 host unix_chkpwd[11208]: password check failed for user (root) Dec 27 16:30:05 host sshd[11164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.3.111 user=root Dec 27 16:30:05 host sshd[11164]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 16:30:07 host sshd[11164]: Failed password for invalid user root from 103.147.3.111 port 51652 ssh2 Dec 27 16:30:08 host sshd[11164]: Received disconnect from 103.147.3.111 port 51652:11: Bye Bye [preauth] Dec 27 16:30:08 host sshd[11164]: Disconnected from 103.147.3.111 port 51652 [preauth] Dec 27 16:30:23 host sshd[11253]: Invalid user christopher from 107.189.30.59 port 44396 Dec 27 16:30:23 host sshd[11253]: input_userauth_request: invalid user christopher [preauth] Dec 27 16:30:23 host sshd[11253]: pam_unix(sshd:auth): check pass; user unknown Dec 27 16:30:23 host sshd[11253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Dec 27 16:30:25 host sshd[11253]: Failed password for invalid user christopher from 107.189.30.59 port 44396 ssh2 Dec 27 16:30:26 host sshd[11253]: Connection closed by 107.189.30.59 port 44396 [preauth] Dec 27 16:39:31 host sshd[12452]: Did not receive identification string from 58.72.18.130 port 18270 Dec 27 16:42:41 host sshd[12930]: Invalid user anon from 104.244.74.6 port 37546 Dec 27 16:42:41 host sshd[12930]: input_userauth_request: invalid user anon [preauth] Dec 27 16:42:41 host sshd[12930]: pam_unix(sshd:auth): check pass; user unknown Dec 27 16:42:41 host sshd[12930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Dec 27 16:42:43 host sshd[12930]: Failed password for invalid user anon from 104.244.74.6 port 37546 ssh2 Dec 27 16:42:43 host sshd[12930]: Connection closed by 104.244.74.6 port 37546 [preauth] Dec 27 17:01:38 host sshd[15917]: Invalid user user1 from 41.197.31.178 port 38650 Dec 27 17:01:38 host sshd[15917]: input_userauth_request: invalid user user1 [preauth] Dec 27 17:01:39 host sshd[15917]: pam_unix(sshd:auth): check pass; user unknown Dec 27 17:01:39 host sshd[15917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 27 17:01:41 host sshd[15917]: Failed password for invalid user user1 from 41.197.31.178 port 38650 ssh2 Dec 27 17:01:41 host sshd[15917]: Connection closed by 41.197.31.178 port 38650 [preauth] Dec 27 17:06:24 host sshd[16640]: User root from 180.24.153.216 not allowed because not listed in AllowUsers Dec 27 17:06:24 host sshd[16640]: input_userauth_request: invalid user root [preauth] Dec 27 17:06:24 host unix_chkpwd[16642]: password check failed for user (root) Dec 27 17:06:24 host sshd[16640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.24.153.216 user=root Dec 27 17:06:24 host sshd[16640]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 17:06:27 host sshd[16640]: Failed password for invalid user root from 180.24.153.216 port 51773 ssh2 Dec 27 17:06:27 host sshd[16640]: Received disconnect from 180.24.153.216 port 51773:11: Bye Bye [preauth] Dec 27 17:06:27 host sshd[16640]: Disconnected from 180.24.153.216 port 51773 [preauth] Dec 27 17:06:56 host sshd[16709]: User root from 23.94.104.247 not allowed because not listed in AllowUsers Dec 27 17:06:56 host sshd[16709]: input_userauth_request: invalid user root [preauth] Dec 27 17:06:56 host unix_chkpwd[16712]: password check failed for user (root) Dec 27 17:06:56 host sshd[16709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.94.104.247 user=root Dec 27 17:06:56 host sshd[16709]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 17:06:58 host sshd[16709]: Failed password for invalid user root from 23.94.104.247 port 34812 ssh2 Dec 27 17:06:58 host sshd[16709]: Received disconnect from 23.94.104.247 port 34812:11: Bye Bye [preauth] Dec 27 17:06:58 host sshd[16709]: Disconnected from 23.94.104.247 port 34812 [preauth] Dec 27 17:07:24 host sshd[16756]: User root from 103.13.207.217 not allowed because not listed in AllowUsers Dec 27 17:07:24 host sshd[16756]: input_userauth_request: invalid user root [preauth] Dec 27 17:07:24 host unix_chkpwd[16758]: password check failed for user (root) Dec 27 17:07:24 host sshd[16756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.207.217 user=root Dec 27 17:07:24 host sshd[16756]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 17:07:26 host sshd[16756]: Failed password for invalid user root from 103.13.207.217 port 48250 ssh2 Dec 27 17:07:26 host sshd[16756]: Received disconnect from 103.13.207.217 port 48250:11: Bye Bye [preauth] Dec 27 17:07:26 host sshd[16756]: Disconnected from 103.13.207.217 port 48250 [preauth] Dec 27 17:09:59 host sshd[17093]: User root from 128.199.9.35 not allowed because not listed in AllowUsers Dec 27 17:09:59 host sshd[17093]: input_userauth_request: invalid user root [preauth] Dec 27 17:09:59 host unix_chkpwd[17096]: password check failed for user (root) Dec 27 17:09:59 host sshd[17093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.9.35 user=root Dec 27 17:09:59 host sshd[17093]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 17:10:01 host sshd[17093]: Failed password for invalid user root from 128.199.9.35 port 54898 ssh2 Dec 27 17:10:02 host sshd[17093]: Received disconnect from 128.199.9.35 port 54898:11: Bye Bye [preauth] Dec 27 17:10:02 host sshd[17093]: Disconnected from 128.199.9.35 port 54898 [preauth] Dec 27 17:10:37 host sshd[17206]: User root from 49.247.22.240 not allowed because not listed in AllowUsers Dec 27 17:10:37 host sshd[17206]: input_userauth_request: invalid user root [preauth] Dec 27 17:10:37 host unix_chkpwd[17209]: password check failed for user (root) Dec 27 17:10:37 host sshd[17206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.22.240 user=root Dec 27 17:10:37 host sshd[17206]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 17:10:39 host sshd[17206]: Failed password for invalid user root from 49.247.22.240 port 52964 ssh2 Dec 27 17:10:39 host sshd[17206]: Received disconnect from 49.247.22.240 port 52964:11: Bye Bye [preauth] Dec 27 17:10:39 host sshd[17206]: Disconnected from 49.247.22.240 port 52964 [preauth] Dec 27 17:10:46 host sshd[17233]: User root from 50.192.223.205 not allowed because not listed in AllowUsers Dec 27 17:10:46 host sshd[17233]: input_userauth_request: invalid user root [preauth] Dec 27 17:10:46 host unix_chkpwd[17237]: password check failed for user (root) Dec 27 17:10:46 host sshd[17233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.192.223.205 user=root Dec 27 17:10:46 host sshd[17233]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 17:10:48 host sshd[17233]: Failed password for invalid user root from 50.192.223.205 port 33392 ssh2 Dec 27 17:10:49 host sshd[17233]: Received disconnect from 50.192.223.205 port 33392:11: Bye Bye [preauth] Dec 27 17:10:49 host sshd[17233]: Disconnected from 50.192.223.205 port 33392 [preauth] Dec 27 17:12:14 host sshd[17526]: User root from 128.199.9.35 not allowed because not listed in AllowUsers Dec 27 17:12:14 host sshd[17526]: input_userauth_request: invalid user root [preauth] Dec 27 17:12:14 host unix_chkpwd[17529]: password check failed for user (root) Dec 27 17:12:14 host sshd[17526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.9.35 user=root Dec 27 17:12:14 host sshd[17526]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 17:12:17 host sshd[17526]: Failed password for invalid user root from 128.199.9.35 port 48396 ssh2 Dec 27 17:12:17 host sshd[17526]: Received disconnect from 128.199.9.35 port 48396:11: Bye Bye [preauth] Dec 27 17:12:17 host sshd[17526]: Disconnected from 128.199.9.35 port 48396 [preauth] Dec 27 17:12:41 host sshd[17604]: User root from 103.13.207.217 not allowed because not listed in AllowUsers Dec 27 17:12:41 host sshd[17604]: input_userauth_request: invalid user root [preauth] Dec 27 17:12:41 host unix_chkpwd[17606]: password check failed for user (root) Dec 27 17:12:41 host sshd[17604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.207.217 user=root Dec 27 17:12:41 host sshd[17604]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 17:12:43 host sshd[17604]: Failed password for invalid user root from 103.13.207.217 port 42684 ssh2 Dec 27 17:13:00 host sshd[17666]: User root from 50.192.223.205 not allowed because not listed in AllowUsers Dec 27 17:13:00 host sshd[17666]: input_userauth_request: invalid user root [preauth] Dec 27 17:13:00 host unix_chkpwd[17669]: password check failed for user (root) Dec 27 17:13:00 host sshd[17666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.192.223.205 user=root Dec 27 17:13:00 host sshd[17666]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 17:13:02 host sshd[17672]: User root from 23.94.104.247 not allowed because not listed in AllowUsers Dec 27 17:13:02 host sshd[17672]: input_userauth_request: invalid user root [preauth] Dec 27 17:13:02 host unix_chkpwd[17697]: password check failed for user (root) Dec 27 17:13:02 host sshd[17672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.94.104.247 user=root Dec 27 17:13:02 host sshd[17672]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 17:13:02 host sshd[17666]: Failed password for invalid user root from 50.192.223.205 port 35714 ssh2 Dec 27 17:13:04 host sshd[17672]: Failed password for invalid user root from 23.94.104.247 port 60018 ssh2 Dec 27 17:13:59 host sshd[17874]: User root from 49.247.22.240 not allowed because not listed in AllowUsers Dec 27 17:13:59 host sshd[17874]: input_userauth_request: invalid user root [preauth] Dec 27 17:13:59 host unix_chkpwd[17877]: password check failed for user (root) Dec 27 17:13:59 host sshd[17874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.22.240 user=root Dec 27 17:13:59 host sshd[17874]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 17:14:01 host sshd[17874]: Failed password for invalid user root from 49.247.22.240 port 33774 ssh2 Dec 27 17:14:01 host sshd[17874]: Received disconnect from 49.247.22.240 port 33774:11: Bye Bye [preauth] Dec 27 17:14:01 host sshd[17874]: Disconnected from 49.247.22.240 port 33774 [preauth] Dec 27 17:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 17:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 17:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 17:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 17:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 17:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 17:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 17:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 17:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 17:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 27 17:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 17:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 17:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 27 17:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 17:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 17:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 27 17:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 17:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 17:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 27 17:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 17:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 17:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 27 17:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 17:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 17:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 27 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 27 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 27 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 27 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=kottayamcalldriv user-2=phmetals user-3=gifterman user-4=palco123 user-5=wwwnexidigital user-6=mrsclean user-7=wwwevmhonda user-8=bonifacegroup user-9=straightcurve user-10=wwwletsstalkfood user-11=wwwtestugo user-12=shalinijames user-13=vfmassets user-14=pmcresources user-15=wwwkmaorg user-16=disposeat user-17=remysagr user-18=woodpeck user-19=wwwkapin user-20=travelboniface user-21=ugotscom user-22=wwwrmswll user-23=keralaholi user-24=wwwresourcehunte user-25=wwwpmcresource user-26=dartsimp user-27=a2zgroup user-28=laundryboniface user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 27 17:21:50 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 27 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-mx5FNBaGk6I9xFuA.~ Dec 27 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-mx5FNBaGk6I9xFuA.~' Dec 27 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-mx5FNBaGk6I9xFuA.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 27 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 27 17:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 17:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 27 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 17:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 17:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 27 17:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 27 17:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 27 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 27 17:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 17:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 27 17:21:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 17:21:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 17:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 27 17:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 17:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 27 17:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 17:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 27 17:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 17:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 17:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 27 17:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 17:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 17:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 27 17:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 17:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 17:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 27 17:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 17:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 17:23:27 host sshd[19780]: Invalid user steam from 106.10.122.53 port 43100 Dec 27 17:23:27 host sshd[19780]: input_userauth_request: invalid user steam [preauth] Dec 27 17:23:28 host sshd[19780]: pam_unix(sshd:auth): check pass; user unknown Dec 27 17:23:28 host sshd[19780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 27 17:23:29 host sshd[19780]: Failed password for invalid user steam from 106.10.122.53 port 43100 ssh2 Dec 27 17:23:29 host sshd[19780]: Connection closed by 106.10.122.53 port 43100 [preauth] Dec 27 17:38:32 host sshd[21899]: Invalid user wentian from 103.13.40.2 port 47868 Dec 27 17:38:32 host sshd[21899]: input_userauth_request: invalid user wentian [preauth] Dec 27 17:38:32 host sshd[21899]: pam_unix(sshd:auth): check pass; user unknown Dec 27 17:38:32 host sshd[21899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 27 17:38:34 host sshd[21899]: Failed password for invalid user wentian from 103.13.40.2 port 47868 ssh2 Dec 27 17:38:34 host sshd[21899]: Connection closed by 103.13.40.2 port 47868 [preauth] Dec 27 17:41:57 host sshd[22440]: Invalid user user from 162.218.126.136 port 57038 Dec 27 17:41:57 host sshd[22440]: input_userauth_request: invalid user user [preauth] Dec 27 17:41:57 host sshd[22440]: pam_unix(sshd:auth): check pass; user unknown Dec 27 17:41:57 host sshd[22440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 27 17:42:00 host sshd[22440]: Failed password for invalid user user from 162.218.126.136 port 57038 ssh2 Dec 27 17:42:00 host sshd[22440]: Connection closed by 162.218.126.136 port 57038 [preauth] Dec 27 17:47:34 host sshd[23259]: Invalid user dp from 45.93.201.90 port 52134 Dec 27 17:47:34 host sshd[23259]: input_userauth_request: invalid user dp [preauth] Dec 27 17:47:34 host sshd[23259]: pam_unix(sshd:auth): check pass; user unknown Dec 27 17:47:34 host sshd[23259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 27 17:47:36 host sshd[23259]: Failed password for invalid user dp from 45.93.201.90 port 52134 ssh2 Dec 27 17:47:39 host sshd[23259]: pam_unix(sshd:auth): check pass; user unknown Dec 27 17:47:41 host sshd[23259]: Failed password for invalid user dp from 45.93.201.90 port 52134 ssh2 Dec 27 17:47:44 host sshd[23259]: pam_unix(sshd:auth): check pass; user unknown Dec 27 17:47:47 host sshd[23259]: Failed password for invalid user dp from 45.93.201.90 port 52134 ssh2 Dec 27 17:47:50 host sshd[23259]: Connection closed by 45.93.201.90 port 52134 [preauth] Dec 27 17:47:50 host sshd[23259]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 27 17:51:53 host sshd[23908]: User root from 92.46.108.20 not allowed because not listed in AllowUsers Dec 27 17:51:53 host sshd[23908]: input_userauth_request: invalid user root [preauth] Dec 27 17:51:54 host unix_chkpwd[23916]: password check failed for user (root) Dec 27 17:51:54 host sshd[23908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 user=root Dec 27 17:51:54 host sshd[23908]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 17:51:56 host sshd[23908]: Failed password for invalid user root from 92.46.108.20 port 47250 ssh2 Dec 27 17:51:56 host sshd[23908]: Connection closed by 92.46.108.20 port 47250 [preauth] Dec 27 18:08:28 host sshd[26981]: User root from 197.5.145.102 not allowed because not listed in AllowUsers Dec 27 18:08:28 host sshd[26981]: input_userauth_request: invalid user root [preauth] Dec 27 18:08:28 host sshd[26983]: User root from 128.14.234.220 not allowed because not listed in AllowUsers Dec 27 18:08:28 host sshd[26983]: input_userauth_request: invalid user root [preauth] Dec 27 18:08:28 host unix_chkpwd[26987]: password check failed for user (root) Dec 27 18:08:28 host sshd[26981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.102 user=root Dec 27 18:08:28 host sshd[26981]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 18:08:28 host unix_chkpwd[26988]: password check failed for user (root) Dec 27 18:08:28 host sshd[26983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.14.234.220 user=root Dec 27 18:08:28 host sshd[26983]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 18:08:30 host sshd[26981]: Failed password for invalid user root from 197.5.145.102 port 25749 ssh2 Dec 27 18:08:30 host sshd[26983]: Failed password for invalid user root from 128.14.234.220 port 56760 ssh2 Dec 27 18:08:30 host sshd[26983]: Received disconnect from 128.14.234.220 port 56760:11: Bye Bye [preauth] Dec 27 18:08:30 host sshd[26983]: Disconnected from 128.14.234.220 port 56760 [preauth] Dec 27 18:08:30 host sshd[26981]: Received disconnect from 197.5.145.102 port 25749:11: Bye Bye [preauth] Dec 27 18:08:30 host sshd[26981]: Disconnected from 197.5.145.102 port 25749 [preauth] Dec 27 18:08:44 host sshd[27017]: Connection closed by 45.79.181.179 port 41656 [preauth] Dec 27 18:08:46 host sshd[27022]: Connection closed by 45.79.181.179 port 41670 [preauth] Dec 27 18:08:47 host sshd[27033]: Connection closed by 45.79.181.179 port 41682 [preauth] Dec 27 18:11:30 host sshd[27622]: User root from 118.98.121.253 not allowed because not listed in AllowUsers Dec 27 18:11:30 host sshd[27622]: input_userauth_request: invalid user root [preauth] Dec 27 18:11:30 host unix_chkpwd[27628]: password check failed for user (root) Dec 27 18:11:30 host sshd[27622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.98.121.253 user=root Dec 27 18:11:30 host sshd[27622]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 18:11:32 host sshd[27622]: Failed password for invalid user root from 118.98.121.253 port 39752 ssh2 Dec 27 18:11:32 host sshd[27622]: Received disconnect from 118.98.121.253 port 39752:11: Bye Bye [preauth] Dec 27 18:11:32 host sshd[27622]: Disconnected from 118.98.121.253 port 39752 [preauth] Dec 27 18:12:24 host sshd[27743]: User root from 130.61.35.0 not allowed because not listed in AllowUsers Dec 27 18:12:24 host sshd[27743]: input_userauth_request: invalid user root [preauth] Dec 27 18:12:24 host unix_chkpwd[27746]: password check failed for user (root) Dec 27 18:12:24 host sshd[27743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.35.0 user=root Dec 27 18:12:24 host sshd[27743]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 18:12:26 host sshd[27743]: Failed password for invalid user root from 130.61.35.0 port 30556 ssh2 Dec 27 18:12:26 host sshd[27743]: Received disconnect from 130.61.35.0 port 30556:11: Bye Bye [preauth] Dec 27 18:12:26 host sshd[27743]: Disconnected from 130.61.35.0 port 30556 [preauth] Dec 27 18:13:41 host sshd[27925]: User root from 128.14.234.220 not allowed because not listed in AllowUsers Dec 27 18:13:41 host sshd[27925]: input_userauth_request: invalid user root [preauth] Dec 27 18:13:41 host unix_chkpwd[27936]: password check failed for user (root) Dec 27 18:13:41 host sshd[27925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.14.234.220 user=root Dec 27 18:13:41 host sshd[27925]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 18:13:44 host sshd[27925]: Failed password for invalid user root from 128.14.234.220 port 56270 ssh2 Dec 27 18:13:44 host sshd[27925]: Received disconnect from 128.14.234.220 port 56270:11: Bye Bye [preauth] Dec 27 18:13:44 host sshd[27925]: Disconnected from 128.14.234.220 port 56270 [preauth] Dec 27 18:14:23 host sshd[28050]: User root from 197.5.145.102 not allowed because not listed in AllowUsers Dec 27 18:14:23 host sshd[28050]: input_userauth_request: invalid user root [preauth] Dec 27 18:14:24 host unix_chkpwd[28054]: password check failed for user (root) Dec 27 18:14:24 host sshd[28050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.102 user=root Dec 27 18:14:24 host sshd[28050]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 18:14:25 host sshd[28050]: Failed password for invalid user root from 197.5.145.102 port 25751 ssh2 Dec 27 18:14:25 host sshd[28050]: Received disconnect from 197.5.145.102 port 25751:11: Bye Bye [preauth] Dec 27 18:14:25 host sshd[28050]: Disconnected from 197.5.145.102 port 25751 [preauth] Dec 27 18:14:41 host sshd[28145]: User root from 130.61.35.0 not allowed because not listed in AllowUsers Dec 27 18:14:41 host sshd[28145]: input_userauth_request: invalid user root [preauth] Dec 27 18:14:41 host unix_chkpwd[28148]: password check failed for user (root) Dec 27 18:14:41 host sshd[28145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.35.0 user=root Dec 27 18:14:41 host sshd[28145]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 18:14:44 host sshd[28145]: Failed password for invalid user root from 130.61.35.0 port 62448 ssh2 Dec 27 18:14:44 host sshd[28145]: Received disconnect from 130.61.35.0 port 62448:11: Bye Bye [preauth] Dec 27 18:14:44 host sshd[28145]: Disconnected from 130.61.35.0 port 62448 [preauth] Dec 27 18:15:16 host sshd[28288]: User root from 118.98.121.253 not allowed because not listed in AllowUsers Dec 27 18:15:16 host sshd[28288]: input_userauth_request: invalid user root [preauth] Dec 27 18:15:16 host unix_chkpwd[28292]: password check failed for user (root) Dec 27 18:15:16 host sshd[28288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.98.121.253 user=root Dec 27 18:15:16 host sshd[28288]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 18:15:18 host sshd[28288]: Failed password for invalid user root from 118.98.121.253 port 39954 ssh2 Dec 27 18:15:18 host sshd[28288]: Received disconnect from 118.98.121.253 port 39954:11: Bye Bye [preauth] Dec 27 18:15:18 host sshd[28288]: Disconnected from 118.98.121.253 port 39954 [preauth] Dec 27 18:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 18:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 18:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 18:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 18:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 18:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 18:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 18:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 18:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 18:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 27 18:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 18:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 18:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 27 18:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 18:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 18:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 27 18:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 18:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 18:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 27 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 27 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 27 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 27 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 27 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 27 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwevmhonda user-2=bonifacegroup user-3=straightcurve user-4=wwwletsstalkfood user-5=kottayamcalldriv user-6=phmetals user-7=palco123 user-8=gifterman user-9=wwwnexidigital user-10=mrsclean user-11=wwwkmaorg user-12=disposeat user-13=remysagr user-14=woodpeck user-15=wwwkapin user-16=shalinijames user-17=wwwtestugo user-18=vfmassets user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=ugotscom user-23=keralaholi user-24=wwwresourcehunte user-25=wwwrmswll user-26=wwwkaretakers user-27=cochintaxi user-28=a2zgroup user-29=dartsimp user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 27 18:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 27 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PBNJJhPSdKly5tDL.~ Dec 27 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PBNJJhPSdKly5tDL.~' Dec 27 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PBNJJhPSdKly5tDL.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 27 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 27 18:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 18:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 27 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 18:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 18:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 18:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 18:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 27 18:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 27 18:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 27 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 27 18:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 18:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 18:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 27 18:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 18:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 18:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 27 18:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 18:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 18:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 27 18:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 18:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 27 18:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 18:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 18:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 27 18:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 18:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 18:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 27 18:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 18:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 18:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 27 18:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 18:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 18:48:29 host sshd[884]: Connection closed by 54.161.196.154 port 48742 [preauth] Dec 27 18:52:01 host sshd[1347]: Invalid user query from 106.10.122.53 port 47006 Dec 27 18:52:01 host sshd[1347]: input_userauth_request: invalid user query [preauth] Dec 27 18:52:01 host sshd[1347]: pam_unix(sshd:auth): check pass; user unknown Dec 27 18:52:01 host sshd[1347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 27 18:52:03 host sshd[1347]: Failed password for invalid user query from 106.10.122.53 port 47006 ssh2 Dec 27 18:52:03 host sshd[1347]: Connection closed by 106.10.122.53 port 47006 [preauth] Dec 27 18:53:28 host sshd[1667]: Invalid user user from 41.197.31.178 port 50086 Dec 27 18:53:28 host sshd[1667]: input_userauth_request: invalid user user [preauth] Dec 27 18:53:28 host sshd[1667]: pam_unix(sshd:auth): check pass; user unknown Dec 27 18:53:28 host sshd[1667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 27 18:53:30 host sshd[1667]: Failed password for invalid user user from 41.197.31.178 port 50086 ssh2 Dec 27 18:53:31 host sshd[1667]: Connection closed by 41.197.31.178 port 50086 [preauth] Dec 27 19:05:51 host sshd[3434]: Invalid user user1 from 103.13.40.2 port 37238 Dec 27 19:05:51 host sshd[3434]: input_userauth_request: invalid user user1 [preauth] Dec 27 19:05:51 host sshd[3434]: pam_unix(sshd:auth): check pass; user unknown Dec 27 19:05:51 host sshd[3434]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 27 19:05:53 host sshd[3434]: Failed password for invalid user user1 from 103.13.40.2 port 37238 ssh2 Dec 27 19:05:53 host sshd[3434]: Connection closed by 103.13.40.2 port 37238 [preauth] Dec 27 19:17:47 host sshd[5136]: Invalid user test2 from 162.218.126.136 port 39904 Dec 27 19:17:47 host sshd[5136]: input_userauth_request: invalid user test2 [preauth] Dec 27 19:17:47 host sshd[5136]: pam_unix(sshd:auth): check pass; user unknown Dec 27 19:17:47 host sshd[5136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 27 19:17:48 host sshd[5136]: Failed password for invalid user test2 from 162.218.126.136 port 39904 ssh2 Dec 27 19:17:49 host sshd[5136]: Connection closed by 162.218.126.136 port 39904 [preauth] Dec 27 19:17:56 host sshd[5159]: Did not receive identification string from 121.134.249.207 port 7708 Dec 27 19:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 19:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 19:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 19:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 19:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 19:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 19:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 19:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 19:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 19:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 27 19:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 19:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 19:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 27 19:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 19:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 19:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 27 19:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 19:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 19:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 27 19:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 19:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 27 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 27 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 27 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 27 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 19:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 19:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 19:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 19:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 27 19:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 19:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=straightcurve user-2=wwwletsstalkfood user-3=bonifacegroup user-4=wwwevmhonda user-5=wwwnexidigital user-6=mrsclean user-7=palco123 user-8=gifterman user-9=phmetals user-10=kottayamcalldriv user-11=woodpeck user-12=wwwkapin user-13=disposeat user-14=wwwkmaorg user-15=remysagr user-16=pmcresources user-17=vfmassets user-18=shalinijames user-19=wwwtestugo user-20=wwwpmcresource user-21=keralaholi user-22=wwwresourcehunte user-23=wwwrmswll user-24=ugotscom user-25=travelboniface user-26=wwwkaretakers user-27=cochintaxi user-28=laundryboniface user-29=a2zgroup user-30=dartsimp feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 27 19:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 27 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-aJjbmjHzgfMExIGY.~ Dec 27 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-aJjbmjHzgfMExIGY.~' Dec 27 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-aJjbmjHzgfMExIGY.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 27 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 27 19:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 19:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 27 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 19:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 19:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 27 19:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 27 19:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 27 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 27 19:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 19:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 19:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 27 19:21:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 19:21:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 19:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 27 19:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 19:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 27 19:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 19:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 27 19:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 19:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 19:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 27 19:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 19:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 19:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 27 19:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 19:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 19:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 27 19:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 19:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 19:33:37 host sshd[7788]: Invalid user dq from 45.93.201.90 port 41416 Dec 27 19:33:37 host sshd[7788]: input_userauth_request: invalid user dq [preauth] Dec 27 19:33:37 host sshd[7788]: pam_unix(sshd:auth): check pass; user unknown Dec 27 19:33:37 host sshd[7788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 27 19:33:39 host sshd[7788]: Failed password for invalid user dq from 45.93.201.90 port 41416 ssh2 Dec 27 19:33:42 host sshd[7788]: pam_unix(sshd:auth): check pass; user unknown Dec 27 19:33:44 host sshd[7788]: Failed password for invalid user dq from 45.93.201.90 port 41416 ssh2 Dec 27 19:33:47 host sshd[7788]: pam_unix(sshd:auth): check pass; user unknown Dec 27 19:33:48 host sshd[7788]: Failed password for invalid user dq from 45.93.201.90 port 41416 ssh2 Dec 27 19:33:52 host sshd[7788]: Connection closed by 45.93.201.90 port 41416 [preauth] Dec 27 19:33:52 host sshd[7788]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 27 20:13:58 host sshd[14053]: Invalid user oracle from 92.46.108.20 port 50674 Dec 27 20:13:58 host sshd[14053]: input_userauth_request: invalid user oracle [preauth] Dec 27 20:13:59 host sshd[14053]: pam_unix(sshd:auth): check pass; user unknown Dec 27 20:13:59 host sshd[14053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 27 20:14:01 host sshd[14053]: Failed password for invalid user oracle from 92.46.108.20 port 50674 ssh2 Dec 27 20:14:01 host sshd[14053]: Connection closed by 92.46.108.20 port 50674 [preauth] Dec 27 20:20:26 host sshd[15162]: Invalid user mcserver from 106.10.122.53 port 54192 Dec 27 20:20:26 host sshd[15162]: input_userauth_request: invalid user mcserver [preauth] Dec 27 20:20:26 host sshd[15162]: pam_unix(sshd:auth): check pass; user unknown Dec 27 20:20:26 host sshd[15162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 27 20:20:28 host sshd[15162]: Failed password for invalid user mcserver from 106.10.122.53 port 54192 ssh2 Dec 27 20:20:28 host sshd[15162]: Connection closed by 106.10.122.53 port 54192 [preauth] Dec 27 20:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 20:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 20:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 20:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 20:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 20:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 20:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 20:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 20:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 20:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 27 20:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 20:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 20:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 27 20:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 20:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 20:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 27 20:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 27 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 27 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 27 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 27 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 27 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 20:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 20:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 20:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 20:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 27 20:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=keralaholi user-3=wwwresourcehunte user-4=wwwrmswll user-5=ugotscom user-6=travelboniface user-7=cochintaxi user-8=wwwkaretakers user-9=laundryboniface user-10=a2zgroup user-11=dartsimp user-12=wwwletsstalkfood user-13=straightcurve user-14=bonifacegroup user-15=wwwevmhonda user-16=mrsclean user-17=wwwnexidigital user-18=palco123 user-19=gifterman user-20=kottayamcalldriv user-21=phmetals user-22=wwwkapin user-23=woodpeck user-24=disposeat user-25=remysagr user-26=wwwkmaorg user-27=pmcresources user-28=vfmassets user-29=shalinijames user-30=wwwtestugo feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 27 20:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 27 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zXB8yZEz87gNoV8x.~ Dec 27 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zXB8yZEz87gNoV8x.~' Dec 27 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zXB8yZEz87gNoV8x.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 27 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 27 20:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 20:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 27 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 20:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 20:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 27 20:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 27 20:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 27 20:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 27 20:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 20:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 20:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 27 20:22:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 20:22:04 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 20:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 27 20:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 20:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 20:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 27 20:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 20:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 20:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 27 20:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 20:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 20:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 27 20:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 20:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 20:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 27 20:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 20:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 20:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 27 20:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 20:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 20:32:57 host sshd[17597]: User root from 103.13.40.2 not allowed because not listed in AllowUsers Dec 27 20:32:57 host sshd[17597]: input_userauth_request: invalid user root [preauth] Dec 27 20:32:57 host unix_chkpwd[17599]: password check failed for user (root) Dec 27 20:32:57 host sshd[17597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 user=root Dec 27 20:32:57 host sshd[17597]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 20:32:59 host sshd[17597]: Failed password for invalid user root from 103.13.40.2 port 45734 ssh2 Dec 27 20:32:59 host sshd[17597]: Connection closed by 103.13.40.2 port 45734 [preauth] Dec 27 20:43:17 host sshd[19683]: Invalid user ubuntu from 41.197.31.178 port 33930 Dec 27 20:43:17 host sshd[19683]: input_userauth_request: invalid user ubuntu [preauth] Dec 27 20:43:17 host sshd[19683]: pam_unix(sshd:auth): check pass; user unknown Dec 27 20:43:17 host sshd[19683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 27 20:43:19 host sshd[19683]: Failed password for invalid user ubuntu from 41.197.31.178 port 33930 ssh2 Dec 27 20:43:19 host sshd[19683]: Connection closed by 41.197.31.178 port 33930 [preauth] Dec 27 20:52:55 host sshd[21297]: User root from 206.189.192.163 not allowed because not listed in AllowUsers Dec 27 20:52:55 host sshd[21297]: input_userauth_request: invalid user root [preauth] Dec 27 20:52:55 host unix_chkpwd[21300]: password check failed for user (root) Dec 27 20:52:55 host sshd[21297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.192.163 user=root Dec 27 20:52:55 host sshd[21297]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 20:52:57 host sshd[21297]: Failed password for invalid user root from 206.189.192.163 port 42374 ssh2 Dec 27 20:52:58 host sshd[21297]: Received disconnect from 206.189.192.163 port 42374:11: Bye Bye [preauth] Dec 27 20:52:58 host sshd[21297]: Disconnected from 206.189.192.163 port 42374 [preauth] Dec 27 20:53:04 host sshd[21359]: User root from 51.250.89.215 not allowed because not listed in AllowUsers Dec 27 20:53:04 host sshd[21359]: input_userauth_request: invalid user root [preauth] Dec 27 20:53:04 host unix_chkpwd[21363]: password check failed for user (root) Dec 27 20:53:04 host sshd[21359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.89.215 user=root Dec 27 20:53:04 host sshd[21359]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 20:53:07 host sshd[21359]: Failed password for invalid user root from 51.250.89.215 port 50368 ssh2 Dec 27 20:53:07 host sshd[21359]: Received disconnect from 51.250.89.215 port 50368:11: Bye Bye [preauth] Dec 27 20:53:07 host sshd[21359]: Disconnected from 51.250.89.215 port 50368 [preauth] Dec 27 20:54:10 host sshd[21512]: User root from 157.230.50.22 not allowed because not listed in AllowUsers Dec 27 20:54:10 host sshd[21512]: input_userauth_request: invalid user root [preauth] Dec 27 20:54:10 host unix_chkpwd[21515]: password check failed for user (root) Dec 27 20:54:10 host sshd[21512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.50.22 user=root Dec 27 20:54:10 host sshd[21512]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 20:54:12 host sshd[21512]: Failed password for invalid user root from 157.230.50.22 port 39514 ssh2 Dec 27 20:54:13 host sshd[21512]: Received disconnect from 157.230.50.22 port 39514:11: Bye Bye [preauth] Dec 27 20:54:13 host sshd[21512]: Disconnected from 157.230.50.22 port 39514 [preauth] Dec 27 20:55:55 host sshd[21827]: User root from 34.126.71.110 not allowed because not listed in AllowUsers Dec 27 20:55:55 host sshd[21827]: input_userauth_request: invalid user root [preauth] Dec 27 20:55:55 host unix_chkpwd[21829]: password check failed for user (root) Dec 27 20:55:55 host sshd[21827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.126.71.110 user=root Dec 27 20:55:55 host sshd[21827]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 20:55:57 host sshd[21827]: Failed password for invalid user root from 34.126.71.110 port 58408 ssh2 Dec 27 20:55:57 host sshd[21827]: Received disconnect from 34.126.71.110 port 58408:11: Bye Bye [preauth] Dec 27 20:55:57 host sshd[21827]: Disconnected from 34.126.71.110 port 58408 [preauth] Dec 27 20:56:49 host sshd[21933]: User root from 51.250.89.215 not allowed because not listed in AllowUsers Dec 27 20:56:49 host sshd[21933]: input_userauth_request: invalid user root [preauth] Dec 27 20:56:49 host unix_chkpwd[21937]: password check failed for user (root) Dec 27 20:56:49 host sshd[21933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.89.215 user=root Dec 27 20:56:49 host sshd[21933]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 20:56:51 host sshd[21933]: Failed password for invalid user root from 51.250.89.215 port 39900 ssh2 Dec 27 20:56:51 host sshd[21933]: Received disconnect from 51.250.89.215 port 39900:11: Bye Bye [preauth] Dec 27 20:56:51 host sshd[21933]: Disconnected from 51.250.89.215 port 39900 [preauth] Dec 27 20:57:30 host sshd[22069]: User root from 206.189.192.163 not allowed because not listed in AllowUsers Dec 27 20:57:30 host sshd[22069]: input_userauth_request: invalid user root [preauth] Dec 27 20:57:30 host unix_chkpwd[22072]: password check failed for user (root) Dec 27 20:57:30 host sshd[22069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.192.163 user=root Dec 27 20:57:30 host sshd[22069]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 20:57:33 host sshd[22069]: Failed password for invalid user root from 206.189.192.163 port 58426 ssh2 Dec 27 20:57:33 host sshd[22069]: Received disconnect from 206.189.192.163 port 58426:11: Bye Bye [preauth] Dec 27 20:57:33 host sshd[22069]: Disconnected from 206.189.192.163 port 58426 [preauth] Dec 27 20:57:35 host sshd[22095]: User root from 157.230.50.22 not allowed because not listed in AllowUsers Dec 27 20:57:35 host sshd[22095]: input_userauth_request: invalid user root [preauth] Dec 27 20:57:35 host unix_chkpwd[22110]: password check failed for user (root) Dec 27 20:57:35 host sshd[22095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.50.22 user=root Dec 27 20:57:35 host sshd[22095]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 20:57:37 host sshd[22095]: Failed password for invalid user root from 157.230.50.22 port 57516 ssh2 Dec 27 20:57:37 host sshd[22095]: Received disconnect from 157.230.50.22 port 57516:11: Bye Bye [preauth] Dec 27 20:57:37 host sshd[22095]: Disconnected from 157.230.50.22 port 57516 [preauth] Dec 27 20:58:12 host sshd[22204]: User root from 165.232.139.128 not allowed because not listed in AllowUsers Dec 27 20:58:12 host sshd[22204]: input_userauth_request: invalid user root [preauth] Dec 27 20:58:12 host unix_chkpwd[22207]: password check failed for user (root) Dec 27 20:58:12 host sshd[22204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.139.128 user=root Dec 27 20:58:12 host sshd[22204]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 20:58:14 host sshd[22204]: Failed password for invalid user root from 165.232.139.128 port 41110 ssh2 Dec 27 20:58:14 host sshd[22204]: Received disconnect from 165.232.139.128 port 41110:11: Bye Bye [preauth] Dec 27 20:58:14 host sshd[22204]: Disconnected from 165.232.139.128 port 41110 [preauth] Dec 27 20:58:14 host sshd[22210]: User root from 34.126.71.110 not allowed because not listed in AllowUsers Dec 27 20:58:14 host sshd[22210]: input_userauth_request: invalid user root [preauth] Dec 27 20:58:14 host unix_chkpwd[22212]: password check failed for user (root) Dec 27 20:58:14 host sshd[22210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.126.71.110 user=root Dec 27 20:58:14 host sshd[22210]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 20:58:15 host sshd[22210]: Failed password for invalid user root from 34.126.71.110 port 33486 ssh2 Dec 27 20:58:15 host sshd[22210]: Received disconnect from 34.126.71.110 port 33486:11: Bye Bye [preauth] Dec 27 20:58:15 host sshd[22210]: Disconnected from 34.126.71.110 port 33486 [preauth] Dec 27 20:58:38 host sshd[22288]: User root from 35.223.246.35 not allowed because not listed in AllowUsers Dec 27 20:58:38 host sshd[22288]: input_userauth_request: invalid user root [preauth] Dec 27 20:58:38 host unix_chkpwd[22291]: password check failed for user (root) Dec 27 20:58:38 host sshd[22288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.223.246.35 user=root Dec 27 20:58:38 host sshd[22288]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 20:58:39 host sshd[22288]: Failed password for invalid user root from 35.223.246.35 port 47030 ssh2 Dec 27 20:58:40 host sshd[22288]: Received disconnect from 35.223.246.35 port 47030:11: Bye Bye [preauth] Dec 27 20:58:40 host sshd[22288]: Disconnected from 35.223.246.35 port 47030 [preauth] Dec 27 21:00:50 host sshd[22704]: User root from 20.255.161.154 not allowed because not listed in AllowUsers Dec 27 21:00:50 host sshd[22704]: input_userauth_request: invalid user root [preauth] Dec 27 21:00:50 host unix_chkpwd[22706]: password check failed for user (root) Dec 27 21:00:50 host sshd[22704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.255.161.154 user=root Dec 27 21:00:50 host sshd[22704]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 21:00:52 host sshd[22704]: Failed password for invalid user root from 20.255.161.154 port 37834 ssh2 Dec 27 21:00:52 host sshd[22704]: Received disconnect from 20.255.161.154 port 37834:11: Bye Bye [preauth] Dec 27 21:00:52 host sshd[22704]: Disconnected from 20.255.161.154 port 37834 [preauth] Dec 27 21:01:11 host sshd[22787]: User root from 134.209.227.212 not allowed because not listed in AllowUsers Dec 27 21:01:11 host sshd[22787]: input_userauth_request: invalid user root [preauth] Dec 27 21:01:12 host unix_chkpwd[22790]: password check failed for user (root) Dec 27 21:01:12 host sshd[22787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.227.212 user=root Dec 27 21:01:12 host sshd[22787]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 21:01:13 host sshd[22787]: Failed password for invalid user root from 134.209.227.212 port 36060 ssh2 Dec 27 21:01:13 host sshd[22787]: Received disconnect from 134.209.227.212 port 36060:11: Bye Bye [preauth] Dec 27 21:01:13 host sshd[22787]: Disconnected from 134.209.227.212 port 36060 [preauth] Dec 27 21:02:12 host sshd[22901]: User root from 202.91.33.165 not allowed because not listed in AllowUsers Dec 27 21:02:12 host sshd[22901]: input_userauth_request: invalid user root [preauth] Dec 27 21:02:12 host unix_chkpwd[22904]: password check failed for user (root) Dec 27 21:02:12 host sshd[22901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.91.33.165 user=root Dec 27 21:02:12 host sshd[22901]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 21:02:13 host sshd[22901]: Failed password for invalid user root from 202.91.33.165 port 47804 ssh2 Dec 27 21:02:13 host sshd[22901]: Received disconnect from 202.91.33.165 port 47804:11: Bye Bye [preauth] Dec 27 21:02:13 host sshd[22901]: Disconnected from 202.91.33.165 port 47804 [preauth] Dec 27 21:02:19 host sshd[22911]: User root from 149.56.111.41 not allowed because not listed in AllowUsers Dec 27 21:02:19 host sshd[22911]: input_userauth_request: invalid user root [preauth] Dec 27 21:02:19 host unix_chkpwd[22917]: password check failed for user (root) Dec 27 21:02:19 host sshd[22911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.111.41 user=root Dec 27 21:02:19 host sshd[22911]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 21:02:21 host sshd[22911]: Failed password for invalid user root from 149.56.111.41 port 57096 ssh2 Dec 27 21:02:21 host sshd[22911]: Received disconnect from 149.56.111.41 port 57096:11: Bye Bye [preauth] Dec 27 21:02:21 host sshd[22911]: Disconnected from 149.56.111.41 port 57096 [preauth] Dec 27 21:03:18 host sshd[23030]: User root from 211.58.232.134 not allowed because not listed in AllowUsers Dec 27 21:03:18 host sshd[23030]: input_userauth_request: invalid user root [preauth] Dec 27 21:03:18 host unix_chkpwd[23033]: password check failed for user (root) Dec 27 21:03:18 host sshd[23030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.58.232.134 user=root Dec 27 21:03:18 host sshd[23030]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 21:03:19 host sshd[23030]: Failed password for invalid user root from 211.58.232.134 port 40876 ssh2 Dec 27 21:03:20 host sshd[23030]: Received disconnect from 211.58.232.134 port 40876:11: Bye Bye [preauth] Dec 27 21:03:20 host sshd[23030]: Disconnected from 211.58.232.134 port 40876 [preauth] Dec 27 21:03:47 host sshd[23102]: User root from 134.209.227.212 not allowed because not listed in AllowUsers Dec 27 21:03:47 host sshd[23102]: input_userauth_request: invalid user root [preauth] Dec 27 21:03:47 host unix_chkpwd[23107]: password check failed for user (root) Dec 27 21:03:47 host sshd[23102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.227.212 user=root Dec 27 21:03:47 host sshd[23102]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 21:03:48 host sshd[23105]: User root from 207.249.96.97 not allowed because not listed in AllowUsers Dec 27 21:03:48 host sshd[23105]: input_userauth_request: invalid user root [preauth] Dec 27 21:03:48 host unix_chkpwd[23109]: password check failed for user (root) Dec 27 21:03:48 host sshd[23105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.249.96.97 user=root Dec 27 21:03:48 host sshd[23105]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 21:03:50 host sshd[23102]: Failed password for invalid user root from 134.209.227.212 port 46584 ssh2 Dec 27 21:03:50 host sshd[23105]: Failed password for invalid user root from 207.249.96.97 port 50198 ssh2 Dec 27 21:03:50 host sshd[23105]: Received disconnect from 207.249.96.97 port 50198:11: Bye Bye [preauth] Dec 27 21:03:50 host sshd[23105]: Disconnected from 207.249.96.97 port 50198 [preauth] Dec 27 21:04:20 host sshd[23202]: User root from 35.223.246.35 not allowed because not listed in AllowUsers Dec 27 21:04:20 host sshd[23202]: input_userauth_request: invalid user root [preauth] Dec 27 21:04:20 host unix_chkpwd[23207]: password check failed for user (root) Dec 27 21:04:20 host sshd[23202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.223.246.35 user=root Dec 27 21:04:20 host sshd[23202]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 21:04:22 host sshd[23202]: Failed password for invalid user root from 35.223.246.35 port 50442 ssh2 Dec 27 21:04:23 host sshd[23202]: Received disconnect from 35.223.246.35 port 50442:11: Bye Bye [preauth] Dec 27 21:04:23 host sshd[23202]: Disconnected from 35.223.246.35 port 50442 [preauth] Dec 27 21:05:02 host sshd[23308]: User root from 149.56.111.41 not allowed because not listed in AllowUsers Dec 27 21:05:02 host sshd[23308]: input_userauth_request: invalid user root [preauth] Dec 27 21:05:02 host unix_chkpwd[23334]: password check failed for user (root) Dec 27 21:05:02 host sshd[23308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.111.41 user=root Dec 27 21:05:02 host sshd[23308]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 21:05:04 host sshd[23308]: Failed password for invalid user root from 149.56.111.41 port 37790 ssh2 Dec 27 21:05:04 host sshd[23335]: User root from 202.91.33.165 not allowed because not listed in AllowUsers Dec 27 21:05:04 host sshd[23335]: input_userauth_request: invalid user root [preauth] Dec 27 21:05:04 host unix_chkpwd[23358]: password check failed for user (root) Dec 27 21:05:04 host sshd[23335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.91.33.165 user=root Dec 27 21:05:04 host sshd[23335]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 21:05:06 host sshd[23335]: Failed password for invalid user root from 202.91.33.165 port 57850 ssh2 Dec 27 21:05:06 host sshd[23335]: Received disconnect from 202.91.33.165 port 57850:11: Bye Bye [preauth] Dec 27 21:05:06 host sshd[23335]: Disconnected from 202.91.33.165 port 57850 [preauth] Dec 27 21:05:07 host sshd[23434]: User root from 165.232.139.128 not allowed because not listed in AllowUsers Dec 27 21:05:07 host sshd[23434]: input_userauth_request: invalid user root [preauth] Dec 27 21:05:07 host unix_chkpwd[23438]: password check failed for user (root) Dec 27 21:05:07 host sshd[23434]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.139.128 user=root Dec 27 21:05:07 host sshd[23434]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 21:05:09 host sshd[23434]: Failed password for invalid user root from 165.232.139.128 port 60060 ssh2 Dec 27 21:05:14 host sshd[23543]: User root from 211.58.232.134 not allowed because not listed in AllowUsers Dec 27 21:05:14 host sshd[23543]: input_userauth_request: invalid user root [preauth] Dec 27 21:05:14 host unix_chkpwd[23546]: password check failed for user (root) Dec 27 21:05:14 host sshd[23543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.58.232.134 user=root Dec 27 21:05:14 host sshd[23543]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 21:05:16 host sshd[23543]: Failed password for invalid user root from 211.58.232.134 port 44694 ssh2 Dec 27 21:05:16 host sshd[23543]: Received disconnect from 211.58.232.134 port 44694:11: Bye Bye [preauth] Dec 27 21:05:16 host sshd[23543]: Disconnected from 211.58.232.134 port 44694 [preauth] Dec 27 21:05:47 host sshd[23648]: User root from 207.249.96.97 not allowed because not listed in AllowUsers Dec 27 21:05:47 host sshd[23648]: input_userauth_request: invalid user root [preauth] Dec 27 21:05:47 host unix_chkpwd[23651]: password check failed for user (root) Dec 27 21:05:47 host sshd[23648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.249.96.97 user=root Dec 27 21:05:47 host sshd[23648]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 21:05:49 host sshd[23648]: Failed password for invalid user root from 207.249.96.97 port 49776 ssh2 Dec 27 21:05:49 host sshd[23648]: Received disconnect from 207.249.96.97 port 49776:11: Bye Bye [preauth] Dec 27 21:05:49 host sshd[23648]: Disconnected from 207.249.96.97 port 49776 [preauth] Dec 27 21:06:58 host sshd[23833]: User root from 20.255.161.154 not allowed because not listed in AllowUsers Dec 27 21:06:58 host sshd[23833]: input_userauth_request: invalid user root [preauth] Dec 27 21:06:58 host unix_chkpwd[23835]: password check failed for user (root) Dec 27 21:06:58 host sshd[23833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.255.161.154 user=root Dec 27 21:06:58 host sshd[23833]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 21:07:00 host sshd[23833]: Failed password for invalid user root from 20.255.161.154 port 37314 ssh2 Dec 27 21:18:52 host sshd[25536]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Dec 27 21:18:52 host sshd[25536]: input_userauth_request: invalid user root [preauth] Dec 27 21:18:53 host unix_chkpwd[25541]: password check failed for user (root) Dec 27 21:18:53 host sshd[25536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Dec 27 21:18:53 host sshd[25536]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 21:18:55 host sshd[25536]: Failed password for invalid user root from 162.218.126.136 port 38946 ssh2 Dec 27 21:18:55 host sshd[25536]: Connection closed by 162.218.126.136 port 38946 [preauth] Dec 27 21:20:54 host sshd[25834]: Invalid user dr from 45.93.201.90 port 50120 Dec 27 21:20:54 host sshd[25834]: input_userauth_request: invalid user dr [preauth] Dec 27 21:20:54 host sshd[25834]: pam_unix(sshd:auth): check pass; user unknown Dec 27 21:20:54 host sshd[25834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 27 21:20:56 host sshd[25834]: Failed password for invalid user dr from 45.93.201.90 port 50120 ssh2 Dec 27 21:20:59 host sshd[25834]: pam_unix(sshd:auth): check pass; user unknown Dec 27 21:21:01 host sshd[25834]: Failed password for invalid user dr from 45.93.201.90 port 50120 ssh2 Dec 27 21:21:04 host sshd[25834]: pam_unix(sshd:auth): check pass; user unknown Dec 27 21:21:06 host sshd[25834]: Failed password for invalid user dr from 45.93.201.90 port 50120 ssh2 Dec 27 21:21:09 host sshd[25834]: Connection closed by 45.93.201.90 port 50120 [preauth] Dec 27 21:21:09 host sshd[25834]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 27 21:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 21:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 21:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 21:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 21:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 21:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 21:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 21:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 21:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 21:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 27 21:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 21:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 21:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 27 21:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 21:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 27 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 27 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 27 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 27 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 27 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 27 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 21:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 21:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 21:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 21:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 27 21:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 21:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 21:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=laundryboniface user-4=dartsimp user-5=a2zgroup user-6=wwwpmcresource user-7=wwwrmswll user-8=keralaholi user-9=wwwresourcehunte user-10=ugotscom user-11=travelboniface user-12=wwwkapin user-13=woodpeck user-14=disposeat user-15=wwwkmaorg user-16=remysagr user-17=pmcresources user-18=vfmassets user-19=wwwtestugo user-20=shalinijames user-21=straightcurve user-22=wwwletsstalkfood user-23=bonifacegroup user-24=wwwevmhonda user-25=wwwnexidigital user-26=mrsclean user-27=gifterman user-28=palco123 user-29=phmetals user-30=kottayamcalldriv feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 27 21:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 27 21:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 21:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 21:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 21:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 21:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 21:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-glgYdBQWpljLzDUX.~ Dec 27 21:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 21:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 21:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-glgYdBQWpljLzDUX.~' Dec 27 21:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 21:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 21:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-glgYdBQWpljLzDUX.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 21:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 21:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 21:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 27 21:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 21:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 27 21:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 21:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 27 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 21:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 21:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 21:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 21:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 27 21:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 27 21:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 27 21:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 27 21:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 21:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 21:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 27 21:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 21:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 27 21:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 21:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 21:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 27 21:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 21:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 27 21:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 21:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 21:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 27 21:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 21:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 21:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 27 21:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 21:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 21:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 27 21:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 21:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 21:27:11 host sshd[26993]: Invalid user daniel from 107.189.30.59 port 59088 Dec 27 21:27:11 host sshd[26993]: input_userauth_request: invalid user daniel [preauth] Dec 27 21:27:11 host sshd[26993]: pam_unix(sshd:auth): check pass; user unknown Dec 27 21:27:11 host sshd[26993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Dec 27 21:27:12 host sshd[26993]: Failed password for invalid user daniel from 107.189.30.59 port 59088 ssh2 Dec 27 21:27:13 host sshd[26993]: Connection closed by 107.189.30.59 port 59088 [preauth] Dec 27 21:32:40 host sshd[27755]: Invalid user christopher from 209.141.56.48 port 53474 Dec 27 21:32:40 host sshd[27755]: input_userauth_request: invalid user christopher [preauth] Dec 27 21:32:40 host sshd[27755]: pam_unix(sshd:auth): check pass; user unknown Dec 27 21:32:40 host sshd[27755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Dec 27 21:32:42 host sshd[27755]: Failed password for invalid user christopher from 209.141.56.48 port 53474 ssh2 Dec 27 21:32:42 host sshd[27755]: Connection closed by 209.141.56.48 port 53474 [preauth] Dec 27 21:42:52 host sshd[29148]: User root from 207.154.205.115 not allowed because not listed in AllowUsers Dec 27 21:42:52 host sshd[29148]: input_userauth_request: invalid user root [preauth] Dec 27 21:42:52 host unix_chkpwd[29151]: password check failed for user (root) Dec 27 21:42:52 host sshd[29148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.205.115 user=root Dec 27 21:42:52 host sshd[29148]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 21:42:54 host sshd[29148]: Failed password for invalid user root from 207.154.205.115 port 57020 ssh2 Dec 27 21:42:54 host sshd[29148]: Received disconnect from 207.154.205.115 port 57020:11: Bye Bye [preauth] Dec 27 21:42:54 host sshd[29148]: Disconnected from 207.154.205.115 port 57020 [preauth] Dec 27 21:47:59 host sshd[29773]: Invalid user nagios from 117.52.173.97 port 43348 Dec 27 21:47:59 host sshd[29773]: input_userauth_request: invalid user nagios [preauth] Dec 27 21:47:59 host sshd[29773]: pam_unix(sshd:auth): check pass; user unknown Dec 27 21:47:59 host sshd[29773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.52.173.97 Dec 27 21:48:01 host sshd[29773]: Failed password for invalid user nagios from 117.52.173.97 port 43348 ssh2 Dec 27 21:48:01 host sshd[29773]: Received disconnect from 117.52.173.97 port 43348:11: Bye Bye [preauth] Dec 27 21:48:01 host sshd[29773]: Disconnected from 117.52.173.97 port 43348 [preauth] Dec 27 21:48:07 host sshd[29794]: User root from 207.154.205.115 not allowed because not listed in AllowUsers Dec 27 21:48:07 host sshd[29794]: input_userauth_request: invalid user root [preauth] Dec 27 21:48:07 host unix_chkpwd[29797]: password check failed for user (root) Dec 27 21:48:07 host sshd[29794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.205.115 user=root Dec 27 21:48:07 host sshd[29794]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 21:48:09 host sshd[29794]: Failed password for invalid user root from 207.154.205.115 port 33166 ssh2 Dec 27 21:48:09 host sshd[29794]: Received disconnect from 207.154.205.115 port 33166:11: Bye Bye [preauth] Dec 27 21:48:09 host sshd[29794]: Disconnected from 207.154.205.115 port 33166 [preauth] Dec 27 21:48:59 host sshd[29920]: Invalid user user from 106.10.122.53 port 33124 Dec 27 21:48:59 host sshd[29920]: input_userauth_request: invalid user user [preauth] Dec 27 21:48:59 host sshd[29920]: pam_unix(sshd:auth): check pass; user unknown Dec 27 21:48:59 host sshd[29920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 27 21:49:02 host sshd[29920]: Failed password for invalid user user from 106.10.122.53 port 33124 ssh2 Dec 27 21:49:02 host sshd[29920]: Connection closed by 106.10.122.53 port 33124 [preauth] Dec 27 21:50:34 host sshd[30223]: Invalid user uc from 117.52.173.97 port 45660 Dec 27 21:50:34 host sshd[30223]: input_userauth_request: invalid user uc [preauth] Dec 27 21:50:35 host sshd[30223]: pam_unix(sshd:auth): check pass; user unknown Dec 27 21:50:35 host sshd[30223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.52.173.97 Dec 27 21:50:37 host sshd[30223]: Failed password for invalid user uc from 117.52.173.97 port 45660 ssh2 Dec 27 21:50:37 host sshd[30223]: Received disconnect from 117.52.173.97 port 45660:11: Bye Bye [preauth] Dec 27 21:50:37 host sshd[30223]: Disconnected from 117.52.173.97 port 45660 [preauth] Dec 27 21:50:40 host sshd[30231]: Did not receive identification string from 64.227.181.236 port 61000 Dec 27 21:52:01 host sshd[30362]: User root from 117.52.173.97 not allowed because not listed in AllowUsers Dec 27 21:52:01 host sshd[30362]: input_userauth_request: invalid user root [preauth] Dec 27 21:52:01 host unix_chkpwd[30365]: password check failed for user (root) Dec 27 21:52:01 host sshd[30362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.52.173.97 user=root Dec 27 21:52:01 host sshd[30362]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 21:52:02 host sshd[30362]: Failed password for invalid user root from 117.52.173.97 port 41698 ssh2 Dec 27 21:52:03 host sshd[30362]: Received disconnect from 117.52.173.97 port 41698:11: Bye Bye [preauth] Dec 27 21:52:03 host sshd[30362]: Disconnected from 117.52.173.97 port 41698 [preauth] Dec 27 22:00:05 host sshd[31433]: Invalid user admin from 103.13.40.2 port 57242 Dec 27 22:00:05 host sshd[31433]: input_userauth_request: invalid user admin [preauth] Dec 27 22:00:05 host sshd[31433]: pam_unix(sshd:auth): check pass; user unknown Dec 27 22:00:05 host sshd[31433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 27 22:00:07 host sshd[31433]: Failed password for invalid user admin from 103.13.40.2 port 57242 ssh2 Dec 27 22:00:07 host sshd[31433]: Connection closed by 103.13.40.2 port 57242 [preauth] Dec 27 22:16:18 host sshd[1154]: Invalid user admin from 125.139.58.175 port 60002 Dec 27 22:16:18 host sshd[1154]: input_userauth_request: invalid user admin [preauth] Dec 27 22:16:18 host sshd[1154]: pam_unix(sshd:auth): check pass; user unknown Dec 27 22:16:18 host sshd[1154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.139.58.175 Dec 27 22:16:20 host sshd[1154]: Failed password for invalid user admin from 125.139.58.175 port 60002 ssh2 Dec 27 22:16:26 host sshd[1154]: Connection closed by 125.139.58.175 port 60002 [preauth] Dec 27 22:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 22:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 22:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 22:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 22:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 22:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 22:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 22:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 22:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 22:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 27 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 27 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 27 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 27 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 27 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 27 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 27 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 27 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 22:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 22:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 22:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 22:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 27 22:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 22:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 22:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=gifterman user-2=palco123 user-3=kottayamcalldriv user-4=phmetals user-5=wwwnexidigital user-6=mrsclean user-7=bonifacegroup user-8=wwwevmhonda user-9=wwwletsstalkfood user-10=straightcurve user-11=vfmassets user-12=wwwtestugo user-13=shalinijames user-14=pmcresources user-15=disposeat user-16=wwwkmaorg user-17=remysagr user-18=woodpeck user-19=wwwkapin user-20=travelboniface user-21=wwwrmswll user-22=keralaholi user-23=wwwresourcehunte user-24=ugotscom user-25=wwwpmcresource user-26=dartsimp user-27=a2zgroup user-28=laundryboniface user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 27 22:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 27 22:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 22:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 22:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 22:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 22:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 22:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zzyglUfk8GdGwHJ7.~ Dec 27 22:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 22:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 22:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zzyglUfk8GdGwHJ7.~' Dec 27 22:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 22:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 22:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zzyglUfk8GdGwHJ7.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 22:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 22:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 22:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 27 22:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 27 22:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 22:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 27 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 27 22:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 27 22:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 27 22:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 27 22:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 22:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 22:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 27 22:21:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 22:21:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 27 22:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 22:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 27 22:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 22:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 27 22:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 22:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 22:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 27 22:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 22:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 22:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 27 22:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 22:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 22:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 27 22:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 22:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 22:32:41 host sshd[3707]: Invalid user nvidia from 41.197.31.178 port 46644 Dec 27 22:32:41 host sshd[3707]: input_userauth_request: invalid user nvidia [preauth] Dec 27 22:32:42 host sshd[3707]: pam_unix(sshd:auth): check pass; user unknown Dec 27 22:32:42 host sshd[3707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 27 22:32:44 host sshd[3707]: Failed password for invalid user nvidia from 41.197.31.178 port 46644 ssh2 Dec 27 22:32:44 host sshd[3707]: Connection closed by 41.197.31.178 port 46644 [preauth] Dec 27 22:37:21 host sshd[4337]: Did not receive identification string from 107.170.232.14 port 52124 Dec 27 22:42:46 host sshd[5066]: User tomcat from 92.46.108.20 not allowed because not listed in AllowUsers Dec 27 22:42:46 host sshd[5066]: input_userauth_request: invalid user tomcat [preauth] Dec 27 22:42:47 host unix_chkpwd[5072]: password check failed for user (tomcat) Dec 27 22:42:47 host sshd[5066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 user=tomcat Dec 27 22:42:47 host sshd[5066]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "tomcat" Dec 27 22:42:48 host sshd[5066]: Failed password for invalid user tomcat from 92.46.108.20 port 43642 ssh2 Dec 27 22:42:49 host sshd[5066]: Connection closed by 92.46.108.20 port 43642 [preauth] Dec 27 23:05:11 host sshd[8036]: Invalid user ds from 45.93.201.90 port 38284 Dec 27 23:05:11 host sshd[8036]: input_userauth_request: invalid user ds [preauth] Dec 27 23:05:11 host sshd[8036]: pam_unix(sshd:auth): check pass; user unknown Dec 27 23:05:11 host sshd[8036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 27 23:05:14 host sshd[8036]: Failed password for invalid user ds from 45.93.201.90 port 38284 ssh2 Dec 27 23:05:17 host sshd[8036]: pam_unix(sshd:auth): check pass; user unknown Dec 27 23:05:19 host sshd[8036]: Failed password for invalid user ds from 45.93.201.90 port 38284 ssh2 Dec 27 23:05:23 host sshd[8036]: pam_unix(sshd:auth): check pass; user unknown Dec 27 23:05:25 host sshd[8036]: Failed password for invalid user ds from 45.93.201.90 port 38284 ssh2 Dec 27 23:05:28 host sshd[8036]: Connection closed by 45.93.201.90 port 38284 [preauth] Dec 27 23:05:28 host sshd[8036]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 27 23:14:20 host sshd[9330]: Invalid user chinarb from 189.206.165.62 port 36586 Dec 27 23:14:20 host sshd[9330]: input_userauth_request: invalid user chinarb [preauth] Dec 27 23:14:20 host sshd[9330]: pam_unix(sshd:auth): check pass; user unknown Dec 27 23:14:20 host sshd[9330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.206.165.62 Dec 27 23:14:22 host sshd[9330]: Failed password for invalid user chinarb from 189.206.165.62 port 36586 ssh2 Dec 27 23:14:22 host sshd[9330]: Received disconnect from 189.206.165.62 port 36586:11: Bye Bye [preauth] Dec 27 23:14:22 host sshd[9330]: Disconnected from 189.206.165.62 port 36586 [preauth] Dec 27 23:14:34 host sshd[9382]: Invalid user gq from 45.118.145.221 port 45610 Dec 27 23:14:34 host sshd[9382]: input_userauth_request: invalid user gq [preauth] Dec 27 23:14:34 host sshd[9382]: pam_unix(sshd:auth): check pass; user unknown Dec 27 23:14:34 host sshd[9382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.118.145.221 Dec 27 23:14:34 host sshd[9385]: Invalid user noah from 188.166.247.82 port 35666 Dec 27 23:14:34 host sshd[9385]: input_userauth_request: invalid user noah [preauth] Dec 27 23:14:34 host sshd[9385]: pam_unix(sshd:auth): check pass; user unknown Dec 27 23:14:34 host sshd[9385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.247.82 Dec 27 23:14:36 host sshd[9382]: Failed password for invalid user gq from 45.118.145.221 port 45610 ssh2 Dec 27 23:14:36 host sshd[9382]: Received disconnect from 45.118.145.221 port 45610:11: Bye Bye [preauth] Dec 27 23:14:36 host sshd[9382]: Disconnected from 45.118.145.221 port 45610 [preauth] Dec 27 23:14:36 host sshd[9385]: Failed password for invalid user noah from 188.166.247.82 port 35666 ssh2 Dec 27 23:14:37 host sshd[9385]: Received disconnect from 188.166.247.82 port 35666:11: Bye Bye [preauth] Dec 27 23:14:37 host sshd[9385]: Disconnected from 188.166.247.82 port 35666 [preauth] Dec 27 23:14:50 host sshd[9400]: User root from 188.166.180.17 not allowed because not listed in AllowUsers Dec 27 23:14:50 host sshd[9400]: input_userauth_request: invalid user root [preauth] Dec 27 23:14:50 host unix_chkpwd[9403]: password check failed for user (root) Dec 27 23:14:50 host sshd[9400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.180.17 user=root Dec 27 23:14:50 host sshd[9400]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 23:14:52 host sshd[9400]: Failed password for invalid user root from 188.166.180.17 port 48690 ssh2 Dec 27 23:14:52 host sshd[9400]: Received disconnect from 188.166.180.17 port 48690:11: Bye Bye [preauth] Dec 27 23:14:52 host sshd[9400]: Disconnected from 188.166.180.17 port 48690 [preauth] Dec 27 23:14:58 host sshd[9422]: Invalid user wildfly from 128.199.73.168 port 46354 Dec 27 23:14:58 host sshd[9422]: input_userauth_request: invalid user wildfly [preauth] Dec 27 23:14:58 host sshd[9422]: pam_unix(sshd:auth): check pass; user unknown Dec 27 23:14:58 host sshd[9422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.73.168 Dec 27 23:15:01 host sshd[9422]: Failed password for invalid user wildfly from 128.199.73.168 port 46354 ssh2 Dec 27 23:15:01 host sshd[9422]: Received disconnect from 128.199.73.168 port 46354:11: Bye Bye [preauth] Dec 27 23:15:01 host sshd[9422]: Disconnected from 128.199.73.168 port 46354 [preauth] Dec 27 23:18:38 host sshd[9956]: User root from 106.10.122.53 not allowed because not listed in AllowUsers Dec 27 23:18:38 host sshd[9956]: input_userauth_request: invalid user root [preauth] Dec 27 23:18:39 host unix_chkpwd[9959]: password check failed for user (root) Dec 27 23:18:39 host sshd[9956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 user=root Dec 27 23:18:39 host sshd[9956]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 23:18:40 host sshd[9956]: Failed password for invalid user root from 106.10.122.53 port 43068 ssh2 Dec 27 23:18:40 host sshd[9956]: Connection closed by 106.10.122.53 port 43068 [preauth] Dec 27 23:19:26 host sshd[10055]: Invalid user bob from 188.166.247.82 port 60442 Dec 27 23:19:26 host sshd[10055]: input_userauth_request: invalid user bob [preauth] Dec 27 23:19:26 host sshd[10055]: pam_unix(sshd:auth): check pass; user unknown Dec 27 23:19:26 host sshd[10055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.247.82 Dec 27 23:19:28 host sshd[10055]: Failed password for invalid user bob from 188.166.247.82 port 60442 ssh2 Dec 27 23:19:28 host sshd[10055]: Received disconnect from 188.166.247.82 port 60442:11: Bye Bye [preauth] Dec 27 23:19:28 host sshd[10055]: Disconnected from 188.166.247.82 port 60442 [preauth] Dec 27 23:19:33 host sshd[10064]: Invalid user danny from 128.199.73.168 port 40760 Dec 27 23:19:33 host sshd[10064]: input_userauth_request: invalid user danny [preauth] Dec 27 23:19:33 host sshd[10064]: pam_unix(sshd:auth): check pass; user unknown Dec 27 23:19:33 host sshd[10064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.73.168 Dec 27 23:19:35 host sshd[10064]: Failed password for invalid user danny from 128.199.73.168 port 40760 ssh2 Dec 27 23:19:35 host sshd[10064]: Received disconnect from 128.199.73.168 port 40760:11: Bye Bye [preauth] Dec 27 23:19:35 host sshd[10064]: Disconnected from 128.199.73.168 port 40760 [preauth] Dec 27 23:19:38 host sshd[10072]: Invalid user globe from 45.118.145.221 port 50864 Dec 27 23:19:38 host sshd[10072]: input_userauth_request: invalid user globe [preauth] Dec 27 23:19:38 host sshd[10072]: pam_unix(sshd:auth): check pass; user unknown Dec 27 23:19:38 host sshd[10072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.118.145.221 Dec 27 23:19:40 host sshd[10072]: Failed password for invalid user globe from 45.118.145.221 port 50864 ssh2 Dec 27 23:19:40 host sshd[10072]: Received disconnect from 45.118.145.221 port 50864:11: Bye Bye [preauth] Dec 27 23:19:40 host sshd[10072]: Disconnected from 45.118.145.221 port 50864 [preauth] Dec 27 23:20:15 host sshd[10161]: Invalid user ubuntu from 188.166.180.17 port 43676 Dec 27 23:20:15 host sshd[10161]: input_userauth_request: invalid user ubuntu [preauth] Dec 27 23:20:15 host sshd[10161]: pam_unix(sshd:auth): check pass; user unknown Dec 27 23:20:15 host sshd[10161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.180.17 Dec 27 23:20:17 host sshd[10161]: Failed password for invalid user ubuntu from 188.166.180.17 port 43676 ssh2 Dec 27 23:20:17 host sshd[10161]: Received disconnect from 188.166.180.17 port 43676:11: Bye Bye [preauth] Dec 27 23:20:17 host sshd[10161]: Disconnected from 188.166.180.17 port 43676 [preauth] Dec 27 23:20:47 host sshd[10293]: User root from 189.206.165.62 not allowed because not listed in AllowUsers Dec 27 23:20:47 host sshd[10293]: input_userauth_request: invalid user root [preauth] Dec 27 23:20:47 host unix_chkpwd[10301]: password check failed for user (root) Dec 27 23:20:47 host sshd[10293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.206.165.62 user=root Dec 27 23:20:47 host sshd[10293]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 23:20:47 host sshd[10298]: Invalid user cmbc from 188.166.247.82 port 60682 Dec 27 23:20:47 host sshd[10298]: input_userauth_request: invalid user cmbc [preauth] Dec 27 23:20:47 host sshd[10298]: pam_unix(sshd:auth): check pass; user unknown Dec 27 23:20:47 host sshd[10298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.247.82 Dec 27 23:20:48 host sshd[10293]: Failed password for invalid user root from 189.206.165.62 port 36042 ssh2 Dec 27 23:20:49 host sshd[10298]: Failed password for invalid user cmbc from 188.166.247.82 port 60682 ssh2 Dec 27 23:20:49 host sshd[10298]: Received disconnect from 188.166.247.82 port 60682:11: Bye Bye [preauth] Dec 27 23:20:49 host sshd[10298]: Disconnected from 188.166.247.82 port 60682 [preauth] Dec 27 23:20:49 host sshd[10293]: Received disconnect from 189.206.165.62 port 36042:11: Bye Bye [preauth] Dec 27 23:20:49 host sshd[10293]: Disconnected from 189.206.165.62 port 36042 [preauth] Dec 27 23:20:52 host sshd[10341]: Invalid user dinesh from 128.199.73.168 port 41302 Dec 27 23:20:52 host sshd[10341]: input_userauth_request: invalid user dinesh [preauth] Dec 27 23:20:52 host sshd[10341]: pam_unix(sshd:auth): check pass; user unknown Dec 27 23:20:52 host sshd[10341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.73.168 Dec 27 23:20:54 host sshd[10341]: Failed password for invalid user dinesh from 128.199.73.168 port 41302 ssh2 Dec 27 23:21:02 host sshd[10430]: Invalid user api from 45.118.145.221 port 56096 Dec 27 23:21:02 host sshd[10430]: input_userauth_request: invalid user api [preauth] Dec 27 23:21:02 host sshd[10430]: pam_unix(sshd:auth): check pass; user unknown Dec 27 23:21:02 host sshd[10430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.118.145.221 Dec 27 23:21:04 host sshd[10430]: Failed password for invalid user api from 45.118.145.221 port 56096 ssh2 Dec 27 23:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 23:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 23:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 23:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 23:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 23:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 23:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 23:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 23:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 27 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 27 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 27 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 27 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 27 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 27 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 27 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 27 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 23:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 23:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 23:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 23:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 27 23:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 23:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 23:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=wwwtestugo user-3=shalinijames user-4=vfmassets user-5=wwwkapin user-6=woodpeck user-7=remysagr user-8=disposeat user-9=wwwkmaorg user-10=mrsclean user-11=wwwnexidigital user-12=phmetals user-13=kottayamcalldriv user-14=gifterman user-15=palco123 user-16=wwwletsstalkfood user-17=straightcurve user-18=wwwevmhonda user-19=bonifacegroup user-20=laundryboniface user-21=dartsimp user-22=a2zgroup user-23=cochintaxi user-24=wwwkaretakers user-25=ugotscom user-26=wwwrmswll user-27=wwwresourcehunte user-28=keralaholi user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 27 23:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 27 23:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 23:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 23:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 23:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 23:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 23:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-dQ3Yejx7TRuKlROk.~ Dec 27 23:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 23:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 23:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-dQ3Yejx7TRuKlROk.~' Dec 27 23:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 23:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-dQ3Yejx7TRuKlROk.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 27 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 27 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 27 23:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 23:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 27 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 27 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 27 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 27 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 23:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 27 23:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 27 23:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 27 23:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 27 23:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 27 23:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 27 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 27 23:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 27 23:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 27 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 27 23:21:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 27 23:21:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 27 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 27 23:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 23:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 27 23:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 23:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 27 23:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 27 23:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 27 23:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 27 23:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 23:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 23:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 27 23:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 27 23:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 27 23:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 27 23:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 27 23:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 27 23:25:36 host sshd[11171]: Invalid user user from 162.218.126.136 port 50708 Dec 27 23:25:36 host sshd[11171]: input_userauth_request: invalid user user [preauth] Dec 27 23:25:37 host sshd[11171]: pam_unix(sshd:auth): check pass; user unknown Dec 27 23:25:37 host sshd[11171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 27 23:25:38 host sshd[11171]: Failed password for invalid user user from 162.218.126.136 port 50708 ssh2 Dec 27 23:25:39 host sshd[11171]: Connection closed by 162.218.126.136 port 50708 [preauth] Dec 27 23:27:03 host sshd[11429]: Invalid user user1 from 103.13.40.2 port 50958 Dec 27 23:27:03 host sshd[11429]: input_userauth_request: invalid user user1 [preauth] Dec 27 23:27:03 host sshd[11429]: pam_unix(sshd:auth): check pass; user unknown Dec 27 23:27:03 host sshd[11429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 27 23:27:05 host sshd[11429]: Failed password for invalid user user1 from 103.13.40.2 port 50958 ssh2 Dec 27 23:27:06 host sshd[11429]: Connection closed by 103.13.40.2 port 50958 [preauth] Dec 27 23:27:12 host sshd[11438]: Invalid user mongo from 45.154.12.171 port 37870 Dec 27 23:27:12 host sshd[11438]: input_userauth_request: invalid user mongo [preauth] Dec 27 23:27:12 host sshd[11438]: pam_unix(sshd:auth): check pass; user unknown Dec 27 23:27:12 host sshd[11438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.154.12.171 Dec 27 23:27:14 host sshd[11438]: Failed password for invalid user mongo from 45.154.12.171 port 37870 ssh2 Dec 27 23:27:14 host sshd[11438]: Received disconnect from 45.154.12.171 port 37870:11: Bye Bye [preauth] Dec 27 23:27:14 host sshd[11438]: Disconnected from 45.154.12.171 port 37870 [preauth] Dec 27 23:29:38 host sshd[11688]: Invalid user www from 45.154.12.171 port 46332 Dec 27 23:29:38 host sshd[11688]: input_userauth_request: invalid user www [preauth] Dec 27 23:29:38 host sshd[11688]: pam_unix(sshd:auth): check pass; user unknown Dec 27 23:29:38 host sshd[11688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.154.12.171 Dec 27 23:29:40 host sshd[11688]: Failed password for invalid user www from 45.154.12.171 port 46332 ssh2 Dec 27 23:29:41 host sshd[11688]: Received disconnect from 45.154.12.171 port 46332:11: Bye Bye [preauth] Dec 27 23:29:41 host sshd[11688]: Disconnected from 45.154.12.171 port 46332 [preauth] Dec 27 23:31:05 host sshd[11982]: User root from 45.154.12.171 not allowed because not listed in AllowUsers Dec 27 23:31:05 host sshd[11982]: input_userauth_request: invalid user root [preauth] Dec 27 23:31:05 host unix_chkpwd[11985]: password check failed for user (root) Dec 27 23:31:05 host sshd[11982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.154.12.171 user=root Dec 27 23:31:05 host sshd[11982]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 27 23:31:07 host sshd[11982]: Failed password for invalid user root from 45.154.12.171 port 46898 ssh2 Dec 27 23:31:07 host sshd[11982]: Received disconnect from 45.154.12.171 port 46898:11: Bye Bye [preauth] Dec 27 23:31:07 host sshd[11982]: Disconnected from 45.154.12.171 port 46898 [preauth] Dec 28 00:12:37 host sshd[17570]: Connection closed by 45.79.181.179 port 31488 [preauth] Dec 28 00:12:39 host sshd[17575]: Connection closed by 45.79.181.179 port 27822 [preauth] Dec 28 00:12:41 host sshd[17578]: Connection closed by 45.79.181.179 port 27824 [preauth] Dec 28 00:20:35 host sshd[19567]: Invalid user oracle from 41.197.31.178 port 44562 Dec 28 00:20:35 host sshd[19567]: input_userauth_request: invalid user oracle [preauth] Dec 28 00:20:35 host sshd[19567]: pam_unix(sshd:auth): check pass; user unknown Dec 28 00:20:35 host sshd[19567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 28 00:20:36 host sshd[19571]: Invalid user christopher from 209.141.56.48 port 46074 Dec 28 00:20:36 host sshd[19571]: input_userauth_request: invalid user christopher [preauth] Dec 28 00:20:36 host sshd[19571]: pam_unix(sshd:auth): check pass; user unknown Dec 28 00:20:36 host sshd[19571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Dec 28 00:20:37 host sshd[19567]: Failed password for invalid user oracle from 41.197.31.178 port 44562 ssh2 Dec 28 00:20:38 host sshd[19567]: Connection closed by 41.197.31.178 port 44562 [preauth] Dec 28 00:20:38 host sshd[19571]: Failed password for invalid user christopher from 209.141.56.48 port 46074 ssh2 Dec 28 00:20:38 host sshd[19571]: Connection closed by 209.141.56.48 port 46074 [preauth] Dec 28 00:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 00:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 00:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 00:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 00:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 28 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 28 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 28 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 28 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 28 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 28 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 28 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 28 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 28 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=phmetals user-2=kottayamcalldriv user-3=palco123 user-4=gifterman user-5=wwwnexidigital user-6=mrsclean user-7=wwwevmhonda user-8=bonifacegroup user-9=wwwletsstalkfood user-10=straightcurve user-11=shalinijames user-12=wwwtestugo user-13=vfmassets user-14=pmcresources user-15=disposeat user-16=wwwkmaorg user-17=remysagr user-18=woodpeck user-19=wwwkapin user-20=travelboniface user-21=ugotscom user-22=keralaholi user-23=wwwresourcehunte user-24=wwwrmswll user-25=wwwpmcresource user-26=a2zgroup user-27=dartsimp user-28=laundryboniface user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 28 00:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 28 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-EcoinLVAJg33XwLF.~ Dec 28 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-EcoinLVAJg33XwLF.~' Dec 28 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-EcoinLVAJg33XwLF.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 28 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 28 00:21:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 00:21:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 00:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 00:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 00:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 00:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 00:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 00:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 28 00:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 00:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 00:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 00:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 00:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 00:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 28 00:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 28 00:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 28 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 28 00:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 00:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 00:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 28 00:21:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 00:21:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 00:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 28 00:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 00:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 00:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 28 00:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 00:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 00:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 28 00:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 00:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 00:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 28 00:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 00:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 00:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 28 00:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 00:22:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 00:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 28 00:22:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 00:22:15 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 00:24:46 host sshd[20219]: Invalid user christopher from 209.141.56.48 port 59640 Dec 28 00:24:46 host sshd[20219]: input_userauth_request: invalid user christopher [preauth] Dec 28 00:24:46 host sshd[20219]: pam_unix(sshd:auth): check pass; user unknown Dec 28 00:24:46 host sshd[20219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Dec 28 00:24:48 host sshd[20219]: Failed password for invalid user christopher from 209.141.56.48 port 59640 ssh2 Dec 28 00:24:53 host sshd[20219]: Connection closed by 209.141.56.48 port 59640 [preauth] Dec 28 00:47:02 host sshd[23232]: Invalid user user1 from 106.10.122.53 port 42386 Dec 28 00:47:02 host sshd[23232]: input_userauth_request: invalid user user1 [preauth] Dec 28 00:47:02 host sshd[23232]: pam_unix(sshd:auth): check pass; user unknown Dec 28 00:47:02 host sshd[23232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 28 00:47:04 host sshd[23232]: Failed password for invalid user user1 from 106.10.122.53 port 42386 ssh2 Dec 28 00:47:04 host sshd[23232]: Connection closed by 106.10.122.53 port 42386 [preauth] Dec 28 00:48:42 host sshd[23510]: Invalid user hkitc from 129.205.124.253 port 59162 Dec 28 00:48:42 host sshd[23510]: input_userauth_request: invalid user hkitc [preauth] Dec 28 00:48:42 host sshd[23510]: pam_unix(sshd:auth): check pass; user unknown Dec 28 00:48:42 host sshd[23510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.205.124.253 Dec 28 00:48:44 host sshd[23510]: Failed password for invalid user hkitc from 129.205.124.253 port 59162 ssh2 Dec 28 00:48:45 host sshd[23510]: Received disconnect from 129.205.124.253 port 59162:11: Bye Bye [preauth] Dec 28 00:48:45 host sshd[23510]: Disconnected from 129.205.124.253 port 59162 [preauth] Dec 28 00:48:55 host sshd[23537]: User root from 134.209.127.189 not allowed because not listed in AllowUsers Dec 28 00:48:55 host sshd[23537]: input_userauth_request: invalid user root [preauth] Dec 28 00:48:55 host unix_chkpwd[23540]: password check failed for user (root) Dec 28 00:48:55 host sshd[23537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.127.189 user=root Dec 28 00:48:55 host sshd[23537]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 00:48:57 host sshd[23537]: Failed password for invalid user root from 134.209.127.189 port 40584 ssh2 Dec 28 00:48:58 host sshd[23537]: Received disconnect from 134.209.127.189 port 40584:11: Bye Bye [preauth] Dec 28 00:48:58 host sshd[23537]: Disconnected from 134.209.127.189 port 40584 [preauth] Dec 28 00:49:07 host sshd[23562]: User root from 212.68.38.180 not allowed because not listed in AllowUsers Dec 28 00:49:07 host sshd[23562]: input_userauth_request: invalid user root [preauth] Dec 28 00:49:07 host unix_chkpwd[23565]: password check failed for user (root) Dec 28 00:49:07 host sshd[23562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.68.38.180 user=root Dec 28 00:49:07 host sshd[23562]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 00:49:09 host sshd[23562]: Failed password for invalid user root from 212.68.38.180 port 60294 ssh2 Dec 28 00:49:10 host sshd[23562]: Received disconnect from 212.68.38.180 port 60294:11: Bye Bye [preauth] Dec 28 00:49:10 host sshd[23562]: Disconnected from 212.68.38.180 port 60294 [preauth] Dec 28 00:49:48 host sshd[23634]: User root from 40.117.144.54 not allowed because not listed in AllowUsers Dec 28 00:49:48 host sshd[23634]: input_userauth_request: invalid user root [preauth] Dec 28 00:49:48 host unix_chkpwd[23637]: password check failed for user (root) Dec 28 00:49:48 host sshd[23634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.117.144.54 user=root Dec 28 00:49:48 host sshd[23634]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 00:49:50 host sshd[23634]: Failed password for invalid user root from 40.117.144.54 port 41189 ssh2 Dec 28 00:49:51 host sshd[23634]: Received disconnect from 40.117.144.54 port 41189:11: Bye Bye [preauth] Dec 28 00:49:51 host sshd[23634]: Disconnected from 40.117.144.54 port 41189 [preauth] Dec 28 00:50:25 host sshd[23718]: Invalid user andrew from 212.170.240.195 port 40134 Dec 28 00:50:25 host sshd[23718]: input_userauth_request: invalid user andrew [preauth] Dec 28 00:50:25 host sshd[23718]: pam_unix(sshd:auth): check pass; user unknown Dec 28 00:50:25 host sshd[23718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.170.240.195 Dec 28 00:50:27 host sshd[23718]: Failed password for invalid user andrew from 212.170.240.195 port 40134 ssh2 Dec 28 00:50:27 host sshd[23718]: Received disconnect from 212.170.240.195 port 40134:11: Bye Bye [preauth] Dec 28 00:50:27 host sshd[23718]: Disconnected from 212.170.240.195 port 40134 [preauth] Dec 28 00:51:20 host sshd[23817]: Invalid user id from 139.59.231.120 port 54698 Dec 28 00:51:20 host sshd[23817]: input_userauth_request: invalid user id [preauth] Dec 28 00:51:20 host sshd[23817]: pam_unix(sshd:auth): check pass; user unknown Dec 28 00:51:20 host sshd[23817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.231.120 Dec 28 00:51:22 host sshd[23817]: Failed password for invalid user id from 139.59.231.120 port 54698 ssh2 Dec 28 00:51:23 host sshd[23817]: Received disconnect from 139.59.231.120 port 54698:11: Bye Bye [preauth] Dec 28 00:51:23 host sshd[23817]: Disconnected from 139.59.231.120 port 54698 [preauth] Dec 28 00:51:26 host sshd[23848]: Invalid user ifrs from 143.198.123.124 port 40246 Dec 28 00:51:26 host sshd[23848]: input_userauth_request: invalid user ifrs [preauth] Dec 28 00:51:26 host sshd[23848]: pam_unix(sshd:auth): check pass; user unknown Dec 28 00:51:26 host sshd[23848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.123.124 Dec 28 00:51:29 host sshd[23848]: Failed password for invalid user ifrs from 143.198.123.124 port 40246 ssh2 Dec 28 00:51:29 host sshd[23848]: Received disconnect from 143.198.123.124 port 40246:11: Bye Bye [preauth] Dec 28 00:51:29 host sshd[23848]: Disconnected from 143.198.123.124 port 40246 [preauth] Dec 28 00:51:55 host sshd[23878]: User root from 52.157.149.77 not allowed because not listed in AllowUsers Dec 28 00:51:55 host sshd[23878]: input_userauth_request: invalid user root [preauth] Dec 28 00:51:55 host unix_chkpwd[23882]: password check failed for user (root) Dec 28 00:51:55 host sshd[23878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.157.149.77 user=root Dec 28 00:51:55 host sshd[23878]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 00:51:57 host sshd[23878]: Failed password for invalid user root from 52.157.149.77 port 55904 ssh2 Dec 28 00:51:57 host sshd[23878]: Received disconnect from 52.157.149.77 port 55904:11: Bye Bye [preauth] Dec 28 00:51:57 host sshd[23878]: Disconnected from 52.157.149.77 port 55904 [preauth] Dec 28 00:52:02 host sshd[23900]: User root from 92.241.82.242 not allowed because not listed in AllowUsers Dec 28 00:52:02 host sshd[23900]: input_userauth_request: invalid user root [preauth] Dec 28 00:52:02 host unix_chkpwd[23903]: password check failed for user (root) Dec 28 00:52:02 host sshd[23900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.241.82.242 user=root Dec 28 00:52:02 host sshd[23900]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 00:52:05 host sshd[23900]: Failed password for invalid user root from 92.241.82.242 port 59953 ssh2 Dec 28 00:52:05 host sshd[23900]: Received disconnect from 92.241.82.242 port 59953:11: Bye Bye [preauth] Dec 28 00:52:05 host sshd[23900]: Disconnected from 92.241.82.242 port 59953 [preauth] Dec 28 00:52:10 host sshd[23909]: User root from 157.245.81.154 not allowed because not listed in AllowUsers Dec 28 00:52:10 host sshd[23909]: input_userauth_request: invalid user root [preauth] Dec 28 00:52:10 host unix_chkpwd[23917]: password check failed for user (root) Dec 28 00:52:10 host sshd[23909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.81.154 user=root Dec 28 00:52:10 host sshd[23909]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 00:52:12 host sshd[23909]: Failed password for invalid user root from 157.245.81.154 port 53892 ssh2 Dec 28 00:52:12 host sshd[23909]: Received disconnect from 157.245.81.154 port 53892:11: Bye Bye [preauth] Dec 28 00:52:12 host sshd[23909]: Disconnected from 157.245.81.154 port 53892 [preauth] Dec 28 00:52:28 host sshd[23959]: Invalid user if from 42.200.11.53 port 34068 Dec 28 00:52:28 host sshd[23959]: input_userauth_request: invalid user if [preauth] Dec 28 00:52:28 host sshd[23959]: pam_unix(sshd:auth): check pass; user unknown Dec 28 00:52:28 host sshd[23959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.11.53 Dec 28 00:52:30 host sshd[23959]: Failed password for invalid user if from 42.200.11.53 port 34068 ssh2 Dec 28 00:52:30 host sshd[23959]: Received disconnect from 42.200.11.53 port 34068:11: Bye Bye [preauth] Dec 28 00:52:30 host sshd[23959]: Disconnected from 42.200.11.53 port 34068 [preauth] Dec 28 00:52:31 host sshd[23964]: Invalid user vk from 128.199.87.210 port 33842 Dec 28 00:52:31 host sshd[23964]: input_userauth_request: invalid user vk [preauth] Dec 28 00:52:31 host sshd[23964]: pam_unix(sshd:auth): check pass; user unknown Dec 28 00:52:31 host sshd[23964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.87.210 Dec 28 00:52:33 host sshd[23964]: Failed password for invalid user vk from 128.199.87.210 port 33842 ssh2 Dec 28 00:52:33 host sshd[23964]: Received disconnect from 128.199.87.210 port 33842:11: Bye Bye [preauth] Dec 28 00:52:33 host sshd[23964]: Disconnected from 128.199.87.210 port 33842 [preauth] Dec 28 00:53:31 host sshd[24188]: Invalid user blake from 118.70.180.174 port 56773 Dec 28 00:53:31 host sshd[24188]: input_userauth_request: invalid user blake [preauth] Dec 28 00:53:31 host sshd[24188]: pam_unix(sshd:auth): check pass; user unknown Dec 28 00:53:31 host sshd[24188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.180.174 Dec 28 00:53:33 host sshd[24188]: Failed password for invalid user blake from 118.70.180.174 port 56773 ssh2 Dec 28 00:53:33 host sshd[24188]: Received disconnect from 118.70.180.174 port 56773:11: Bye Bye [preauth] Dec 28 00:53:33 host sshd[24188]: Disconnected from 118.70.180.174 port 56773 [preauth] Dec 28 00:53:44 host sshd[24202]: User root from 212.170.240.195 not allowed because not listed in AllowUsers Dec 28 00:53:44 host sshd[24202]: input_userauth_request: invalid user root [preauth] Dec 28 00:53:44 host unix_chkpwd[24205]: password check failed for user (root) Dec 28 00:53:44 host sshd[24202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.170.240.195 user=root Dec 28 00:53:44 host sshd[24202]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 00:53:46 host sshd[24202]: Failed password for invalid user root from 212.170.240.195 port 54172 ssh2 Dec 28 00:53:46 host sshd[24202]: Received disconnect from 212.170.240.195 port 54172:11: Bye Bye [preauth] Dec 28 00:53:46 host sshd[24202]: Disconnected from 212.170.240.195 port 54172 [preauth] Dec 28 00:53:47 host sshd[24215]: Invalid user dt from 45.93.201.90 port 56572 Dec 28 00:53:47 host sshd[24215]: input_userauth_request: invalid user dt [preauth] Dec 28 00:53:47 host sshd[24215]: pam_unix(sshd:auth): check pass; user unknown Dec 28 00:53:47 host sshd[24215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 28 00:53:49 host sshd[24215]: Failed password for invalid user dt from 45.93.201.90 port 56572 ssh2 Dec 28 00:53:52 host sshd[24215]: pam_unix(sshd:auth): check pass; user unknown Dec 28 00:53:55 host sshd[24215]: Failed password for invalid user dt from 45.93.201.90 port 56572 ssh2 Dec 28 00:53:55 host sshd[24256]: Invalid user smartworldmss from 212.68.38.180 port 35790 Dec 28 00:53:55 host sshd[24256]: input_userauth_request: invalid user smartworldmss [preauth] Dec 28 00:53:55 host sshd[24256]: pam_unix(sshd:auth): check pass; user unknown Dec 28 00:53:55 host sshd[24256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.68.38.180 Dec 28 00:53:55 host sshd[24258]: Invalid user oracle from 103.13.40.2 port 35872 Dec 28 00:53:55 host sshd[24258]: input_userauth_request: invalid user oracle [preauth] Dec 28 00:53:55 host sshd[24258]: pam_unix(sshd:auth): check pass; user unknown Dec 28 00:53:55 host sshd[24258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 28 00:53:57 host sshd[24256]: Failed password for invalid user smartworldmss from 212.68.38.180 port 35790 ssh2 Dec 28 00:53:57 host sshd[24258]: Failed password for invalid user oracle from 103.13.40.2 port 35872 ssh2 Dec 28 00:53:57 host sshd[24258]: Connection closed by 103.13.40.2 port 35872 [preauth] Dec 28 00:53:57 host sshd[24256]: Received disconnect from 212.68.38.180 port 35790:11: Bye Bye [preauth] Dec 28 00:53:57 host sshd[24256]: Disconnected from 212.68.38.180 port 35790 [preauth] Dec 28 00:53:58 host sshd[24261]: Invalid user fm from 143.198.123.124 port 50114 Dec 28 00:53:58 host sshd[24261]: input_userauth_request: invalid user fm [preauth] Dec 28 00:53:58 host sshd[24261]: pam_unix(sshd:auth): check pass; user unknown Dec 28 00:53:58 host sshd[24261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.123.124 Dec 28 00:53:58 host sshd[24215]: pam_unix(sshd:auth): check pass; user unknown Dec 28 00:53:59 host sshd[24265]: User root from 40.117.144.54 not allowed because not listed in AllowUsers Dec 28 00:53:59 host sshd[24265]: input_userauth_request: invalid user root [preauth] Dec 28 00:53:59 host unix_chkpwd[24274]: password check failed for user (root) Dec 28 00:53:59 host sshd[24265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.117.144.54 user=root Dec 28 00:53:59 host sshd[24265]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 00:54:00 host sshd[24261]: Failed password for invalid user fm from 143.198.123.124 port 50114 ssh2 Dec 28 00:54:00 host sshd[24261]: Received disconnect from 143.198.123.124 port 50114:11: Bye Bye [preauth] Dec 28 00:54:00 host sshd[24261]: Disconnected from 143.198.123.124 port 50114 [preauth] Dec 28 00:54:00 host sshd[24215]: Failed password for invalid user dt from 45.93.201.90 port 56572 ssh2 Dec 28 00:54:00 host sshd[24265]: Failed password for invalid user root from 40.117.144.54 port 37456 ssh2 Dec 28 00:54:00 host sshd[24265]: Received disconnect from 40.117.144.54 port 37456:11: Bye Bye [preauth] Dec 28 00:54:00 host sshd[24265]: Disconnected from 40.117.144.54 port 37456 [preauth] Dec 28 00:54:03 host sshd[24264]: Invalid user ts3 from 129.205.124.253 port 60840 Dec 28 00:54:03 host sshd[24264]: input_userauth_request: invalid user ts3 [preauth] Dec 28 00:54:03 host sshd[24264]: pam_unix(sshd:auth): check pass; user unknown Dec 28 00:54:03 host sshd[24264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.205.124.253 Dec 28 00:54:03 host sshd[24215]: Connection closed by 45.93.201.90 port 56572 [preauth] Dec 28 00:54:03 host sshd[24215]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 28 00:54:05 host sshd[24323]: User root from 52.157.149.77 not allowed because not listed in AllowUsers Dec 28 00:54:05 host sshd[24323]: input_userauth_request: invalid user root [preauth] Dec 28 00:54:05 host unix_chkpwd[24348]: password check failed for user (root) Dec 28 00:54:05 host sshd[24323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.157.149.77 user=root Dec 28 00:54:05 host sshd[24323]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 00:54:05 host sshd[24264]: Failed password for invalid user ts3 from 129.205.124.253 port 60840 ssh2 Dec 28 00:54:05 host sshd[24264]: Received disconnect from 129.205.124.253 port 60840:11: Bye Bye [preauth] Dec 28 00:54:05 host sshd[24264]: Disconnected from 129.205.124.253 port 60840 [preauth] Dec 28 00:54:07 host sshd[24323]: Failed password for invalid user root from 52.157.149.77 port 34854 ssh2 Dec 28 00:54:07 host sshd[24323]: Received disconnect from 52.157.149.77 port 34854:11: Bye Bye [preauth] Dec 28 00:54:07 host sshd[24323]: Disconnected from 52.157.149.77 port 34854 [preauth] Dec 28 00:54:17 host sshd[24395]: Invalid user ftpuser2 from 157.245.81.154 port 51430 Dec 28 00:54:17 host sshd[24395]: input_userauth_request: invalid user ftpuser2 [preauth] Dec 28 00:54:17 host sshd[24395]: pam_unix(sshd:auth): check pass; user unknown Dec 28 00:54:17 host sshd[24395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.81.154 Dec 28 00:54:18 host sshd[24395]: Failed password for invalid user ftpuser2 from 157.245.81.154 port 51430 ssh2 Dec 28 00:54:19 host sshd[24395]: Received disconnect from 157.245.81.154 port 51430:11: Bye Bye [preauth] Dec 28 00:54:19 host sshd[24395]: Disconnected from 157.245.81.154 port 51430 [preauth] Dec 28 00:54:29 host sshd[24459]: Invalid user jn from 134.209.127.189 port 37912 Dec 28 00:54:29 host sshd[24459]: input_userauth_request: invalid user jn [preauth] Dec 28 00:54:29 host sshd[24459]: pam_unix(sshd:auth): check pass; user unknown Dec 28 00:54:29 host sshd[24459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.127.189 Dec 28 00:54:30 host sshd[24459]: Failed password for invalid user jn from 134.209.127.189 port 37912 ssh2 Dec 28 00:54:31 host sshd[24459]: Received disconnect from 134.209.127.189 port 37912:11: Bye Bye [preauth] Dec 28 00:54:31 host sshd[24459]: Disconnected from 134.209.127.189 port 37912 [preauth] Dec 28 00:54:44 host sshd[24513]: Invalid user vk from 139.59.231.120 port 40428 Dec 28 00:54:44 host sshd[24513]: input_userauth_request: invalid user vk [preauth] Dec 28 00:54:44 host sshd[24513]: pam_unix(sshd:auth): check pass; user unknown Dec 28 00:54:44 host sshd[24513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.231.120 Dec 28 00:54:45 host sshd[24513]: Failed password for invalid user vk from 139.59.231.120 port 40428 ssh2 Dec 28 00:54:45 host sshd[24513]: Received disconnect from 139.59.231.120 port 40428:11: Bye Bye [preauth] Dec 28 00:54:45 host sshd[24513]: Disconnected from 139.59.231.120 port 40428 [preauth] Dec 28 00:54:54 host sshd[24527]: Invalid user ssl from 128.199.87.210 port 58230 Dec 28 00:54:44 host sshd[24513]: Invalid user vk from 139.59.231.120 port 40428 Dec 28 00:54:44 host sshd[24513]: input_userauth_request: invalid user vk [preauth] Dec 28 00:54:44 host sshd[24513]: pam_unix(sshd:auth): check pass; user unknown Dec 28 00:54:44 host sshd[24513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.231.120 Dec 28 00:54:45 host sshd[24513]: Failed password for invalid user vk from 139.59.231.120 port 40428 ssh2 Dec 28 00:54:45 host sshd[24513]: Received disconnect from 139.59.231.120 port 40428:11: Bye Bye [preauth] Dec 28 00:54:45 host sshd[24513]: Disconnected from 139.59.231.120 port 40428 [preauth] Dec 28 00:54:54 host sshd[24527]: Invalid user ssl from 128.199.87.210 port 58230 Dec 28 00:54:44 host sshd[24513]: input_userauth_request: invalid user vk [preauth] Dec 28 00:54:44 host sshd[24513]: pam_unix(sshd:auth): check pass; user unknown Dec 28 00:54:44 host sshd[24513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.231.120 Dec 28 00:54:45 host sshd[24513]: Failed password for invalid user vk from 139.59.231.120 port 40428 ssh2 Dec 28 00:54:45 host sshd[24513]: Received disconnect from 139.59.231.120 port 40428:11: Bye Bye [preauth] Dec 28 00:54:45 host sshd[24513]: Disconnected from 139.59.231.120 port 40428 [preauth] Dec 28 00:54:54 host sshd[24527]: Invalid user ssl from 128.199.87.210 port 58230 Dec 28 00:54:54 host sshd[24527]: input_userauth_request: invalid user ssl [preauth] Dec 28 00:54:54 host sshd[24527]: pam_unix(sshd:auth): check pass; user unknown Dec 28 00:54:54 host sshd[24527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.87.210 Dec 28 00:54:56 host sshd[24527]: Failed password for invalid user ssl from 128.199.87.210 port 58230 ssh2 Dec 28 00:54:56 host sshd[24527]: Received disconnect from 128.199.87.210 port 58230:11: Bye Bye [preauth] Dec 28 00:54:56 host sshd[24527]: Disconnected from 128.199.87.210 port 58230 [preauth] Dec 28 00:55:04 host sshd[24616]: Invalid user swpro from 143.198.123.124 port 50676 Dec 28 00:55:04 host sshd[24616]: input_userauth_request: invalid user swpro [preauth] Dec 28 00:55:04 host sshd[24616]: pam_unix(sshd:auth): check pass; user unknown Dec 28 00:55:04 host sshd[24616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.123.124 Dec 28 00:55:05 host sshd[24630]: Invalid user id from 42.200.11.53 port 42668 Dec 28 00:55:05 host sshd[24630]: input_userauth_request: invalid user id [preauth] Dec 28 00:55:05 host sshd[24630]: pam_unix(sshd:auth): check pass; user unknown Dec 28 00:55:05 host sshd[24630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.11.53 Dec 28 00:55:06 host sshd[24616]: Failed password for invalid user swpro from 143.198.123.124 port 50676 ssh2 Dec 28 00:55:07 host sshd[24616]: Received disconnect from 143.198.123.124 port 50676:11: Bye Bye [preauth] Dec 28 00:55:07 host sshd[24616]: Disconnected from 143.198.123.124 port 50676 [preauth] Dec 28 00:55:07 host sshd[24630]: Failed password for invalid user id from 42.200.11.53 port 42668 ssh2 Dec 28 00:55:07 host sshd[24630]: Received disconnect from 42.200.11.53 port 42668:11: Bye Bye [preauth] Dec 28 00:55:07 host sshd[24630]: Disconnected from 42.200.11.53 port 42668 [preauth] Dec 28 00:55:13 host sshd[24679]: User root from 92.241.82.242 not allowed because not listed in AllowUsers Dec 28 00:55:13 host sshd[24679]: input_userauth_request: invalid user root [preauth] Dec 28 00:55:13 host unix_chkpwd[24682]: password check failed for user (root) Dec 28 00:55:13 host sshd[24679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.241.82.242 user=root Dec 28 00:55:13 host sshd[24679]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 00:55:15 host sshd[24679]: Failed password for invalid user root from 92.241.82.242 port 49955 ssh2 Dec 28 00:55:27 host sshd[24751]: Invalid user jwb from 222.252.25.186 port 60613 Dec 28 00:55:27 host sshd[24751]: input_userauth_request: invalid user jwb [preauth] Dec 28 00:55:27 host sshd[24751]: pam_unix(sshd:auth): check pass; user unknown Dec 28 00:55:27 host sshd[24751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.252.25.186 Dec 28 00:55:29 host sshd[24751]: Failed password for invalid user jwb from 222.252.25.186 port 60613 ssh2 Dec 28 00:55:29 host sshd[24751]: Received disconnect from 222.252.25.186 port 60613:11: Bye Bye [preauth] Dec 28 00:55:29 host sshd[24751]: Disconnected from 222.252.25.186 port 60613 [preauth] Dec 28 00:55:53 host sshd[24775]: User root from 129.205.124.253 not allowed because not listed in AllowUsers Dec 28 00:55:53 host sshd[24775]: input_userauth_request: invalid user root [preauth] Dec 28 00:55:53 host unix_chkpwd[24782]: password check failed for user (root) Dec 28 00:55:53 host sshd[24775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.205.124.253 user=root Dec 28 00:55:53 host sshd[24775]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 00:55:55 host sshd[24775]: Failed password for invalid user root from 129.205.124.253 port 38550 ssh2 Dec 28 00:56:26 host sshd[24889]: Invalid user nam from 42.200.11.53 port 43188 Dec 28 00:56:26 host sshd[24889]: input_userauth_request: invalid user nam [preauth] Dec 28 00:56:26 host sshd[24889]: pam_unix(sshd:auth): check pass; user unknown Dec 28 00:56:26 host sshd[24889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.11.53 Dec 28 00:56:29 host sshd[24889]: Failed password for invalid user nam from 42.200.11.53 port 43188 ssh2 Dec 28 00:56:29 host sshd[24889]: Received disconnect from 42.200.11.53 port 43188:11: Bye Bye [preauth] Dec 28 00:56:29 host sshd[24889]: Disconnected from 42.200.11.53 port 43188 [preauth] Dec 28 00:56:57 host sshd[24961]: Invalid user uwsgi from 222.252.25.186 port 61655 Dec 28 00:56:57 host sshd[24961]: input_userauth_request: invalid user uwsgi [preauth] Dec 28 00:56:57 host sshd[24961]: pam_unix(sshd:auth): check pass; user unknown Dec 28 00:56:57 host sshd[24961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.252.25.186 Dec 28 00:57:00 host sshd[24961]: Failed password for invalid user uwsgi from 222.252.25.186 port 61655 ssh2 Dec 28 00:57:00 host sshd[24961]: Received disconnect from 222.252.25.186 port 61655:11: Bye Bye [preauth] Dec 28 00:57:00 host sshd[24961]: Disconnected from 222.252.25.186 port 61655 [preauth] Dec 28 00:58:28 host sshd[25309]: User root from 118.70.180.174 not allowed because not listed in AllowUsers Dec 28 00:58:28 host sshd[25309]: input_userauth_request: invalid user root [preauth] Dec 28 00:58:28 host unix_chkpwd[25311]: password check failed for user (root) Dec 28 00:58:28 host sshd[25309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.180.174 user=root Dec 28 00:58:28 host sshd[25309]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 00:58:31 host sshd[25309]: Failed password for invalid user root from 118.70.180.174 port 62707 ssh2 Dec 28 00:58:31 host sshd[25309]: Received disconnect from 118.70.180.174 port 62707:11: Bye Bye [preauth] Dec 28 00:58:31 host sshd[25309]: Disconnected from 118.70.180.174 port 62707 [preauth] Dec 28 01:00:04 host sshd[25515]: User root from 222.252.25.186 not allowed because not listed in AllowUsers Dec 28 01:00:04 host sshd[25515]: input_userauth_request: invalid user root [preauth] Dec 28 01:00:04 host unix_chkpwd[25517]: password check failed for user (root) Dec 28 01:00:04 host sshd[25515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.252.25.186 user=root Dec 28 01:00:04 host sshd[25515]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 01:00:06 host sshd[25515]: Failed password for invalid user root from 222.252.25.186 port 63747 ssh2 Dec 28 01:04:34 host sshd[26144]: Invalid user user from 162.218.126.136 port 57180 Dec 28 01:04:34 host sshd[26144]: input_userauth_request: invalid user user [preauth] Dec 28 01:04:34 host sshd[26144]: pam_unix(sshd:auth): check pass; user unknown Dec 28 01:04:34 host sshd[26144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 28 01:04:36 host sshd[26144]: Failed password for invalid user user from 162.218.126.136 port 57180 ssh2 Dec 28 01:04:36 host sshd[26144]: Connection closed by 162.218.126.136 port 57180 [preauth] Dec 28 01:09:22 host sshd[26659]: Invalid user www from 92.46.108.20 port 42174 Dec 28 01:09:22 host sshd[26659]: input_userauth_request: invalid user www [preauth] Dec 28 01:09:22 host sshd[26659]: pam_unix(sshd:auth): check pass; user unknown Dec 28 01:09:22 host sshd[26659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 28 01:09:24 host sshd[26659]: Failed password for invalid user www from 92.46.108.20 port 42174 ssh2 Dec 28 01:09:25 host sshd[26659]: Connection closed by 92.46.108.20 port 42174 [preauth] Dec 28 01:21:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 01:21:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 01:21:45 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 28 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 28 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 28 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 28 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 28 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 28 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 28 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 28 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 01:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 01:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 01:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 01:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 28 01:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 01:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 01:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=gifterman user-2=palco123 user-3=phmetals user-4=kottayamcalldriv user-5=wwwnexidigital user-6=mrsclean user-7=bonifacegroup user-8=wwwevmhonda user-9=straightcurve user-10=wwwletsstalkfood user-11=vfmassets user-12=wwwtestugo user-13=shalinijames user-14=pmcresources user-15=wwwkmaorg user-16=disposeat user-17=remysagr user-18=wwwkapin user-19=woodpeck user-20=travelboniface user-21=wwwrmswll user-22=keralaholi user-23=wwwresourcehunte user-24=ugotscom user-25=wwwpmcresource user-26=dartsimp user-27=a2zgroup user-28=laundryboniface user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 28 01:21:47 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 28 01:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 01:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 01:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 01:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 01:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 01:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-a6IHtOPfMMbryKpp.~ Dec 28 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-a6IHtOPfMMbryKpp.~' Dec 28 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-a6IHtOPfMMbryKpp.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 28 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 28 01:21:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 01:21:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 28 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 01:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 28 01:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 28 01:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 28 01:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 28 01:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 01:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 28 01:21:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 01:21:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 28 01:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 01:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 01:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 28 01:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 01:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 01:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 28 01:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 01:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 01:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 28 01:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 01:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 28 01:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 01:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 01:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 28 01:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 01:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 01:38:45 host sshd[32326]: Invalid user christopher from 209.141.56.48 port 35134 Dec 28 01:38:45 host sshd[32326]: input_userauth_request: invalid user christopher [preauth] Dec 28 01:38:45 host sshd[32326]: pam_unix(sshd:auth): check pass; user unknown Dec 28 01:38:45 host sshd[32326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Dec 28 01:38:47 host sshd[32326]: Failed password for invalid user christopher from 209.141.56.48 port 35134 ssh2 Dec 28 01:38:48 host sshd[32326]: Connection closed by 209.141.56.48 port 35134 [preauth] Dec 28 01:39:25 host sshd[32393]: Invalid user christopher from 209.141.56.48 port 54870 Dec 28 01:39:25 host sshd[32393]: input_userauth_request: invalid user christopher [preauth] Dec 28 01:39:25 host sshd[32393]: pam_unix(sshd:auth): check pass; user unknown Dec 28 01:39:25 host sshd[32393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Dec 28 01:39:27 host sshd[32393]: Failed password for invalid user christopher from 209.141.56.48 port 54870 ssh2 Dec 28 01:39:27 host sshd[32393]: Connection closed by 209.141.56.48 port 54870 [preauth] Dec 28 02:08:09 host sshd[4224]: Invalid user paul from 107.189.30.59 port 45548 Dec 28 02:08:09 host sshd[4224]: input_userauth_request: invalid user paul [preauth] Dec 28 02:08:09 host sshd[4224]: pam_unix(sshd:auth): check pass; user unknown Dec 28 02:08:09 host sshd[4224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Dec 28 02:08:11 host sshd[4224]: Failed password for invalid user paul from 107.189.30.59 port 45548 ssh2 Dec 28 02:08:13 host sshd[4224]: Connection closed by 107.189.30.59 port 45548 [preauth] Dec 28 02:08:27 host sshd[4270]: Invalid user christopher from 209.141.56.48 port 57658 Dec 28 02:08:27 host sshd[4270]: input_userauth_request: invalid user christopher [preauth] Dec 28 02:08:27 host sshd[4270]: pam_unix(sshd:auth): check pass; user unknown Dec 28 02:08:27 host sshd[4270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Dec 28 02:08:29 host sshd[4270]: Failed password for invalid user christopher from 209.141.56.48 port 57658 ssh2 Dec 28 02:08:29 host sshd[4270]: Connection closed by 209.141.56.48 port 57658 [preauth] Dec 28 02:08:51 host sshd[4452]: Did not receive identification string from 185.51.61.82 port 36064 Dec 28 02:08:54 host sshd[4477]: Invalid user ftpuser from 185.51.61.82 port 41080 Dec 28 02:08:54 host sshd[4477]: input_userauth_request: invalid user ftpuser [preauth] Dec 28 02:08:54 host sshd[4479]: User mysql from 185.51.61.82 not allowed because not listed in AllowUsers Dec 28 02:08:54 host sshd[4479]: input_userauth_request: invalid user mysql [preauth] Dec 28 02:08:54 host sshd[4482]: Invalid user web from 185.51.61.82 port 41068 Dec 28 02:08:54 host sshd[4482]: input_userauth_request: invalid user web [preauth] Dec 28 02:08:54 host sshd[4476]: Invalid user user from 185.51.61.82 port 40902 Dec 28 02:08:54 host sshd[4476]: input_userauth_request: invalid user user [preauth] Dec 28 02:08:54 host sshd[4457]: User root from 185.51.61.82 not allowed because not listed in AllowUsers Dec 28 02:08:54 host sshd[4457]: input_userauth_request: invalid user root [preauth] Dec 28 02:08:54 host sshd[4474]: Invalid user test from 185.51.61.82 port 41020 Dec 28 02:08:54 host sshd[4474]: input_userauth_request: invalid user test [preauth] Dec 28 02:08:54 host sshd[4463]: Invalid user test from 185.51.61.82 port 40890 Dec 28 02:08:54 host sshd[4463]: input_userauth_request: invalid user test [preauth] Dec 28 02:08:54 host sshd[4472]: Invalid user pi from 185.51.61.82 port 40898 Dec 28 02:08:54 host sshd[4472]: input_userauth_request: invalid user pi [preauth] Dec 28 02:08:54 host sshd[4466]: User root from 185.51.61.82 not allowed because not listed in AllowUsers Dec 28 02:08:54 host sshd[4466]: input_userauth_request: invalid user root [preauth] Dec 28 02:08:54 host sshd[4484]: Invalid user bot from 185.51.61.82 port 41094 Dec 28 02:08:54 host sshd[4484]: input_userauth_request: invalid user bot [preauth] Dec 28 02:08:54 host sshd[4477]: pam_unix(sshd:auth): check pass; user unknown Dec 28 02:08:54 host sshd[4477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.51.61.82 Dec 28 02:08:54 host sshd[4464]: Invalid user pi from 185.51.61.82 port 40884 Dec 28 02:08:54 host sshd[4464]: input_userauth_request: invalid user pi [preauth] Dec 28 02:08:54 host sshd[4470]: Invalid user ubuntu from 185.51.61.82 port 40888 Dec 28 02:08:54 host sshd[4470]: input_userauth_request: invalid user ubuntu [preauth] Dec 28 02:08:54 host sshd[4476]: pam_unix(sshd:auth): check pass; user unknown Dec 28 02:08:54 host sshd[4476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.51.61.82 Dec 28 02:08:54 host sshd[4482]: pam_unix(sshd:auth): check pass; user unknown Dec 28 02:08:54 host sshd[4482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.51.61.82 Dec 28 02:08:54 host unix_chkpwd[4518]: password check failed for user (mysql) Dec 28 02:08:54 host sshd[4479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.51.61.82 user=mysql Dec 28 02:08:54 host sshd[4479]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql" Dec 28 02:08:54 host sshd[4463]: pam_unix(sshd:auth): check pass; user unknown Dec 28 02:08:54 host sshd[4463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.51.61.82 Dec 28 02:08:54 host sshd[4483]: Invalid user zjw from 185.51.61.82 port 41100 Dec 28 02:08:54 host sshd[4483]: input_userauth_request: invalid user zjw [preauth] Dec 28 02:08:54 host sshd[4474]: pam_unix(sshd:auth): check pass; user unknown Dec 28 02:08:54 host sshd[4474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.51.61.82 Dec 28 02:08:54 host sshd[4475]: Invalid user user from 185.51.61.82 port 41036 Dec 28 02:08:54 host sshd[4475]: input_userauth_request: invalid user user [preauth] Dec 28 02:08:54 host sshd[4472]: pam_unix(sshd:auth): check pass; user unknown Dec 28 02:08:54 host sshd[4472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.51.61.82 Dec 28 02:08:54 host sshd[4484]: pam_unix(sshd:auth): check pass; user unknown Dec 28 02:08:54 host sshd[4484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.51.61.82 Dec 28 02:08:54 host unix_chkpwd[4519]: password check failed for user (root) Dec 28 02:08:54 host sshd[4466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.51.61.82 user=root Dec 28 02:08:54 host sshd[4466]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 02:08:54 host sshd[4459]: Invalid user testuser from 185.51.61.82 port 40880 Dec 28 02:08:54 host sshd[4459]: input_userauth_request: invalid user testuser [preauth] Dec 28 02:08:54 host sshd[4464]: pam_unix(sshd:auth): check pass; user unknown Dec 28 02:08:54 host sshd[4464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.51.61.82 Dec 28 02:08:54 host unix_chkpwd[4520]: password check failed for user (root) Dec 28 02:08:54 host sshd[4457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.51.61.82 user=root Dec 28 02:08:54 host sshd[4457]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 02:08:54 host sshd[4470]: pam_unix(sshd:auth): check pass; user unknown Dec 28 02:08:54 host sshd[4470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.51.61.82 Dec 28 02:08:54 host sshd[4471]: User root from 185.51.61.82 not allowed because not listed in AllowUsers Dec 28 02:08:54 host sshd[4471]: input_userauth_request: invalid user root [preauth] Dec 28 02:08:54 host sshd[4493]: Invalid user admin from 185.51.61.82 port 40892 Dec 28 02:08:54 host sshd[4493]: input_userauth_request: invalid user admin [preauth] Dec 28 02:08:54 host sshd[4483]: pam_unix(sshd:auth): check pass; user unknown Dec 28 02:08:54 host sshd[4483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.51.61.82 Dec 28 02:08:54 host sshd[4460]: Invalid user ubuntu from 185.51.61.82 port 40886 Dec 28 02:08:54 host sshd[4460]: input_userauth_request: invalid user ubuntu [preauth] Dec 28 02:08:54 host sshd[4475]: pam_unix(sshd:auth): check pass; user unknown Dec 28 02:08:54 host sshd[4475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.51.61.82 Dec 28 02:08:54 host sshd[4468]: Invalid user ubuntu from 185.51.61.82 port 41104 Dec 28 02:08:54 host sshd[4469]: Invalid user test from 185.51.61.82 port 41108 Dec 28 02:08:54 host sshd[4469]: input_userauth_request: invalid user test [preauth] Dec 28 02:08:54 host sshd[4468]: input_userauth_request: invalid user ubuntu [preauth] Dec 28 02:08:54 host sshd[4459]: pam_unix(sshd:auth): check pass; user unknown Dec 28 02:08:54 host sshd[4459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.51.61.82 Dec 28 02:08:54 host sshd[4473]: Invalid user guest from 185.51.61.82 port 41114 Dec 28 02:08:54 host sshd[4473]: input_userauth_request: invalid user guest [preauth] Dec 28 02:08:54 host sshd[4467]: Invalid user oracle from 185.51.61.82 port 41024 Dec 28 02:08:54 host sshd[4467]: input_userauth_request: invalid user oracle [preauth] Dec 28 02:08:54 host unix_chkpwd[4521]: password check failed for user (root) Dec 28 02:08:54 host sshd[4471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.51.61.82 user=root Dec 28 02:08:54 host sshd[4471]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 02:08:54 host sshd[4493]: pam_unix(sshd:auth): check pass; user unknown Dec 28 02:08:54 host sshd[4493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.51.61.82 Dec 28 02:08:54 host sshd[4460]: pam_unix(sshd:auth): check pass; user unknown Dec 28 02:08:54 host sshd[4460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.51.61.82 Dec 28 02:08:54 host sshd[4481]: User mysql from 185.51.61.82 not allowed because not listed in AllowUsers Dec 28 02:08:54 host sshd[4481]: input_userauth_request: invalid user mysql [preauth] Dec 28 02:08:54 host sshd[4468]: pam_unix(sshd:auth): check pass; user unknown Dec 28 02:08:54 host sshd[4468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.51.61.82 Dec 28 02:08:54 host sshd[4469]: pam_unix(sshd:auth): check pass; user unknown Dec 28 02:08:54 host sshd[4469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.51.61.82 Dec 28 02:08:54 host sshd[4473]: pam_unix(sshd:auth): check pass; user unknown Dec 28 02:08:54 host sshd[4473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.51.61.82 Dec 28 02:08:54 host sshd[4458]: Invalid user web from 185.51.61.82 port 40878 Dec 28 02:08:54 host sshd[4458]: input_userauth_request: invalid user web [preauth] Dec 28 02:08:54 host sshd[4467]: pam_unix(sshd:auth): check pass; user unknown Dec 28 02:08:54 host sshd[4467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.51.61.82 Dec 28 02:08:54 host sshd[4465]: User root from 185.51.61.82 not allowed because not listed in AllowUsers Dec 28 02:08:54 host sshd[4465]: input_userauth_request: invalid user root [preauth] Dec 28 02:08:54 host unix_chkpwd[4522]: password check failed for user (mysql) Dec 28 02:08:54 host sshd[4481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.51.61.82 user=mysql Dec 28 02:08:54 host sshd[4481]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql" Dec 28 02:08:54 host sshd[4480]: Invalid user ansadmin from 185.51.61.82 port 41098 Dec 28 02:08:54 host sshd[4480]: input_userauth_request: invalid user ansadmin [preauth] Dec 28 02:08:54 host sshd[4458]: pam_unix(sshd:auth): check pass; user unknown Dec 28 02:08:54 host sshd[4458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.51.61.82 Dec 28 02:08:55 host unix_chkpwd[4523]: password check failed for user (root) Dec 28 02:08:55 host sshd[4465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.51.61.82 user=root Dec 28 02:08:55 host sshd[4465]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 02:08:55 host sshd[4478]: User root from 185.51.61.82 not allowed because not listed in AllowUsers Dec 28 02:08:55 host sshd[4478]: input_userauth_request: invalid user root [preauth] Dec 28 02:08:55 host sshd[4480]: pam_unix(sshd:auth): check pass; user unknown Dec 28 02:08:55 host sshd[4480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.51.61.82 Dec 28 02:08:55 host unix_chkpwd[4525]: password check failed for user (root) Dec 28 02:08:55 host sshd[4478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.51.61.82 user=root Dec 28 02:08:55 host sshd[4478]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 02:08:55 host sshd[4514]: Invalid user gitlab-runner from 185.51.61.82 port 41084 Dec 28 02:08:55 host sshd[4514]: input_userauth_request: invalid user gitlab-runner [preauth] Dec 28 02:08:56 host sshd[4477]: Failed password for invalid user ftpuser from 185.51.61.82 port 41080 ssh2 Dec 28 02:08:56 host sshd[4476]: Failed password for invalid user user from 185.51.61.82 port 40902 ssh2 Dec 28 02:08:56 host sshd[4482]: Failed password for invalid user web from 185.51.61.82 port 41068 ssh2 Dec 28 02:08:56 host sshd[4479]: Failed password for invalid user mysql from 185.51.61.82 port 41110 ssh2 Dec 28 02:08:56 host sshd[4463]: Failed password for invalid user test from 185.51.61.82 port 40890 ssh2 Dec 28 02:08:56 host sshd[4474]: Failed password for invalid user test from 185.51.61.82 port 41020 ssh2 Dec 28 02:08:56 host sshd[4472]: Failed password for invalid user pi from 185.51.61.82 port 40898 ssh2 Dec 28 02:08:56 host sshd[4484]: Failed password for invalid user bot from 185.51.61.82 port 41094 ssh2 Dec 28 02:08:56 host sshd[4466]: Failed password for invalid user root from 185.51.61.82 port 41062 ssh2 Dec 28 02:08:56 host sshd[4464]: Failed password for invalid user pi from 185.51.61.82 port 40884 ssh2 Dec 28 02:08:56 host sshd[4470]: Failed password for invalid user ubuntu from 185.51.61.82 port 40888 ssh2 Dec 28 02:08:56 host sshd[4457]: Failed password for invalid user root from 185.51.61.82 port 40136 ssh2 Dec 28 02:08:56 host sshd[4483]: Failed password for invalid user zjw from 185.51.61.82 port 41100 ssh2 Dec 28 02:08:56 host sshd[4475]: Failed password for invalid user user from 185.51.61.82 port 41036 ssh2 Dec 28 02:08:56 host sshd[4459]: Failed password for invalid user testuser from 185.51.61.82 port 40880 ssh2 Dec 28 02:08:56 host sshd[4459]: Connection closed by 185.51.61.82 port 40880 [preauth] Dec 28 02:08:57 host sshd[4471]: Failed password for invalid user root from 185.51.61.82 port 40894 ssh2 Dec 28 02:08:57 host sshd[4493]: Failed password for invalid user admin from 185.51.61.82 port 40892 ssh2 Dec 28 02:08:57 host sshd[4460]: Failed password for invalid user ubuntu from 185.51.61.82 port 40886 ssh2 Dec 28 02:08:57 host sshd[4468]: Failed password for invalid user ubuntu from 185.51.61.82 port 41104 ssh2 Dec 28 02:08:57 host sshd[4469]: Failed password for invalid user test from 185.51.61.82 port 41108 ssh2 Dec 28 02:08:57 host sshd[4473]: Failed password for invalid user guest from 185.51.61.82 port 41114 ssh2 Dec 28 02:08:57 host sshd[4467]: Failed password for invalid user oracle from 185.51.61.82 port 41024 ssh2 Dec 28 02:08:57 host sshd[4465]: Failed password for invalid user root from 185.51.61.82 port 40900 ssh2 Dec 28 02:08:57 host sshd[4481]: Failed password for invalid user mysql from 185.51.61.82 port 41030 ssh2 Dec 28 02:08:57 host sshd[4480]: Failed password for invalid user ansadmin from 185.51.61.82 port 41098 ssh2 Dec 28 02:08:57 host sshd[4458]: Failed password for invalid user web from 185.51.61.82 port 40878 ssh2 Dec 28 02:08:57 host sshd[4458]: Connection closed by 185.51.61.82 port 40878 [preauth] Dec 28 02:08:57 host sshd[4478]: Failed password for invalid user root from 185.51.61.82 port 41054 ssh2 Dec 28 02:10:46 host sshd[4791]: Bad protocol version identification 'ABCDEFGHIJKLMNOPQRSTUVWXYZ9999' from 172.104.131.24 port 53972 Dec 28 02:15:23 host sshd[5401]: Invalid user zhangyongqing from 106.10.122.53 port 50052 Dec 28 02:15:23 host sshd[5401]: input_userauth_request: invalid user zhangyongqing [preauth] Dec 28 02:15:23 host sshd[5401]: pam_unix(sshd:auth): check pass; user unknown Dec 28 02:15:23 host sshd[5401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 28 02:15:26 host sshd[5401]: Failed password for invalid user zhangyongqing from 106.10.122.53 port 50052 ssh2 Dec 28 02:15:26 host sshd[5401]: Connection closed by 106.10.122.53 port 50052 [preauth] Dec 28 02:19:41 host sshd[6004]: Invalid user n from 157.230.1.224 port 58574 Dec 28 02:19:41 host sshd[6004]: input_userauth_request: invalid user n [preauth] Dec 28 02:19:41 host sshd[6004]: pam_unix(sshd:auth): check pass; user unknown Dec 28 02:19:41 host sshd[6004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.1.224 Dec 28 02:19:43 host sshd[6004]: Failed password for invalid user n from 157.230.1.224 port 58574 ssh2 Dec 28 02:19:43 host sshd[6004]: Received disconnect from 157.230.1.224 port 58574:11: Bye Bye [preauth] Dec 28 02:19:43 host sshd[6004]: Disconnected from 157.230.1.224 port 58574 [preauth] Dec 28 02:19:47 host sshd[6060]: User root from 132.145.247.140 not allowed because not listed in AllowUsers Dec 28 02:19:47 host sshd[6060]: input_userauth_request: invalid user root [preauth] Dec 28 02:19:47 host unix_chkpwd[6064]: password check failed for user (root) Dec 28 02:19:47 host sshd[6060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.247.140 user=root Dec 28 02:19:47 host sshd[6060]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 02:19:49 host sshd[6060]: Failed password for invalid user root from 132.145.247.140 port 32796 ssh2 Dec 28 02:19:49 host sshd[6060]: Received disconnect from 132.145.247.140 port 32796:11: Bye Bye [preauth] Dec 28 02:19:49 host sshd[6060]: Disconnected from 132.145.247.140 port 32796 [preauth] Dec 28 02:20:15 host sshd[6147]: User root from 67.207.84.46 not allowed because not listed in AllowUsers Dec 28 02:20:15 host sshd[6147]: input_userauth_request: invalid user root [preauth] Dec 28 02:20:15 host unix_chkpwd[6150]: password check failed for user (root) Dec 28 02:20:15 host sshd[6147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.207.84.46 user=root Dec 28 02:20:15 host sshd[6147]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 02:20:17 host sshd[6147]: Failed password for invalid user root from 67.207.84.46 port 54950 ssh2 Dec 28 02:20:17 host sshd[6147]: Received disconnect from 67.207.84.46 port 54950:11: Bye Bye [preauth] Dec 28 02:20:17 host sshd[6147]: Disconnected from 67.207.84.46 port 54950 [preauth] Dec 28 02:20:32 host sshd[6187]: Invalid user mcht from 162.218.126.136 port 40982 Dec 28 02:20:32 host sshd[6187]: input_userauth_request: invalid user mcht [preauth] Dec 28 02:20:32 host sshd[6187]: pam_unix(sshd:auth): check pass; user unknown Dec 28 02:20:32 host sshd[6187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 28 02:20:34 host sshd[6187]: Failed password for invalid user mcht from 162.218.126.136 port 40982 ssh2 Dec 28 02:20:34 host sshd[6187]: Connection closed by 162.218.126.136 port 40982 [preauth] Dec 28 02:20:45 host sshd[6202]: Invalid user user1 from 103.13.40.2 port 51252 Dec 28 02:20:45 host sshd[6202]: input_userauth_request: invalid user user1 [preauth] Dec 28 02:20:45 host sshd[6202]: pam_unix(sshd:auth): check pass; user unknown Dec 28 02:20:45 host sshd[6202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 28 02:20:48 host sshd[6202]: Failed password for invalid user user1 from 103.13.40.2 port 51252 ssh2 Dec 28 02:20:48 host sshd[6202]: Connection closed by 103.13.40.2 port 51252 [preauth] Dec 28 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 28 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 28 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 28 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 28 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 28 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 28 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 28 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 28 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 28 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=laundryboniface user-4=a2zgroup user-5=dartsimp user-6=wwwpmcresource user-7=wwwresourcehunte user-8=keralaholi user-9=wwwrmswll user-10=ugotscom user-11=travelboniface user-12=wwwkapin user-13=woodpeck user-14=remysagr user-15=disposeat user-16=wwwkmaorg user-17=pmcresources user-18=vfmassets user-19=shalinijames user-20=wwwtestugo user-21=straightcurve user-22=wwwletsstalkfood user-23=bonifacegroup user-24=wwwevmhonda user-25=wwwnexidigital user-26=mrsclean user-27=palco123 user-28=gifterman user-29=phmetals user-30=kottayamcalldriv feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 28 02:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 28 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-HPBO0YfJA6aB05PT.~ Dec 28 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-HPBO0YfJA6aB05PT.~' Dec 28 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-HPBO0YfJA6aB05PT.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 28 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 28 02:21:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:21:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 28 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 02:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 28 02:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 28 02:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 28 02:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 28 02:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 02:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 02:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 28 02:21:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 02:21:56 host sshd[6444]: Invalid user shao from 157.230.1.224 port 38632 Dec 28 02:21:56 host sshd[6444]: input_userauth_request: invalid user shao [preauth] Dec 28 02:21:56 host sshd[6444]: pam_unix(sshd:auth): check pass; user unknown Dec 28 02:21:56 host sshd[6444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.1.224 Dec 28 02:21:58 host sshd[6444]: Failed password for invalid user shao from 157.230.1.224 port 38632 ssh2 Dec 28 02:21:58 host sshd[6444]: Received disconnect from 157.230.1.224 port 38632:11: Bye Bye [preauth] Dec 28 02:21:58 host sshd[6444]: Disconnected from 157.230.1.224 port 38632 [preauth] Dec 28 02:22:00 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 28 02:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:22:01 host sshd[6452]: Invalid user pangzidong from 67.207.84.46 port 54728 Dec 28 02:22:01 host sshd[6452]: input_userauth_request: invalid user pangzidong [preauth] Dec 28 02:22:01 host sshd[6452]: pam_unix(sshd:auth): check pass; user unknown Dec 28 02:22:01 host sshd[6452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.207.84.46 Dec 28 02:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 02:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:22:02 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 02:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:22:02 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 02:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:22:02 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 28 02:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 28 02:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:22:02 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 28 02:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:22:02 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 28 02:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:22:02 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 28 02:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:22:02 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 28 02:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:22:03 host sshd[6452]: Failed password for invalid user pangzidong from 67.207.84.46 port 54728 ssh2 Dec 28 02:22:03 host sshd[6452]: Received disconnect from 67.207.84.46 port 54728:11: Bye Bye [preauth] Dec 28 02:22:03 host sshd[6452]: Disconnected from 67.207.84.46 port 54728 [preauth] Dec 28 02:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 28 02:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 28 02:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 28 02:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 02:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 02:22:41 host sshd[6646]: User root from 132.145.247.140 not allowed because not listed in AllowUsers Dec 28 02:22:41 host sshd[6646]: input_userauth_request: invalid user root [preauth] Dec 28 02:22:41 host unix_chkpwd[6649]: password check failed for user (root) Dec 28 02:22:41 host sshd[6646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.247.140 user=root Dec 28 02:22:41 host sshd[6646]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 02:22:43 host sshd[6646]: Failed password for invalid user root from 132.145.247.140 port 41664 ssh2 Dec 28 02:23:07 host sshd[6724]: Invalid user staffb from 157.230.1.224 port 39568 Dec 28 02:23:07 host sshd[6724]: input_userauth_request: invalid user staffb [preauth] Dec 28 02:23:07 host sshd[6724]: pam_unix(sshd:auth): check pass; user unknown Dec 28 02:23:07 host sshd[6724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.1.224 Dec 28 02:23:08 host sshd[6724]: Failed password for invalid user staffb from 157.230.1.224 port 39568 ssh2 Dec 28 02:23:09 host sshd[6724]: Received disconnect from 157.230.1.224 port 39568:11: Bye Bye [preauth] Dec 28 02:23:09 host sshd[6724]: Disconnected from 157.230.1.224 port 39568 [preauth] Dec 28 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 02:29:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:29:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 02:29:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:29:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 02:29:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:29:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 28 02:29:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:29:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 02:29:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:29:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=dartsimp user-2=a2zgroup user-3=laundryboniface user-4=cochintaxi user-5=wwwkaretakers user-6=travelboniface user-7=wwwrmswll user-8=keralaholi user-9=wwwresourcehunte user-10=ugotscom user-11=wwwpmcresource user-12=vfmassets user-13=wwwtestugo user-14=shalinijames user-15=pmcresources user-16=disposeat user-17=remysagr user-18=wwwkmaorg user-19=wwwkapin user-20=woodpeck user-21=gifterman user-22=palco123 user-23=phmetals user-24=kottayamcalldriv user-25=wwwnexidigital user-26=mrsclean user-27=bonifacegroup user-28=wwwevmhonda user-29=wwwletsstalkfood user-30=straightcurve feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 28 02:29:46 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 28 02:29:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:29:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwevmhonda --output=json Dec 28 02:29:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:29:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color instance info --format=json --check-updates=true Dec 28 02:29:46 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 28 02:29:51 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 28 02:29:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 28 02:29:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 28 02:29:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 28 02:29:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 28 02:29:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 28 02:29:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 28 02:29:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 28 02:29:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 28 02:29:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 28 02:29:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwevmhonda LangPHP php_get_vhost_versions --output=json Dec 28 02:29:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:29:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:29:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 package_manager_get_package_info package-0=ea-php72 --output=json Dec 28 02:29:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:29:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:29:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color instance login-url --skip-plugins=false --format=json Dec 28 02:29:55 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 28 02:29:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 28 02:29:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwletsstalkfood --output=json Dec 28 02:29:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:29:56 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:29:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color instance info --format=json --check-updates=true Dec 28 02:29:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 02:30:02 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 02:30:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 28 02:30:02 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 02:30:04 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 02:30:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 28 02:30:04 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 02:30:09 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 02:30:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 28 02:30:09 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 02:30:09 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 02:30:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood LangPHP php_get_vhost_versions --output=json Dec 28 02:30:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:30:10 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:30:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color instance login-url --skip-plugins=false --format=json Dec 28 02:30:10 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 02:30:10 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 02:30:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DomainInfo single_domain_data domain=letsstalkfood.com return_https_redirect_status=1 --output=json Dec 28 02:30:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:30:10 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:30:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_vhost_ssl_components --output=json Dec 28 02:30:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:30:11 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:30:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_ssl_vhosts --output=json Dec 28 02:30:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:30:11 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:30:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood Mime list_redirects --output=json Dec 28 02:30:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:30:11 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:30:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 28 02:30:11 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 02:30:12 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 02:30:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 28 02:30:12 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 02:30:14 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 02:30:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 28 02:30:14 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 02:30:19 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 02:30:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 28 02:30:19 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 02:30:24 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 02:30:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/wp-config.php Dec 28 02:30:24 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 02:30:24 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 02:30:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:30:24 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 02:30:25 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 02:30:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/.maintenance Dec 28 02:30:25 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 02:30:25 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 02:30:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color db-prefix get Dec 28 02:30:25 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 02:30:25 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 02:30:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DirectoryPrivacy is_directory_protected dir=/home/wwwletsstalkfood/public_html --output=json Dec 28 02:30:25 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:30:26 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:30:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:30:26 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 02:30:26 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 02:30:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 28 02:30:26 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 02:30:27 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 02:30:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 28 02:30:27 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 02:30:27 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 02:30:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 28 02:30:27 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 02:30:28 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 02:30:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 28 02:30:28 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 02:30:28 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 02:30:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color admin-username is-secure Dec 28 02:30:28 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 02:30:29 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 02:30:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:30:29 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 02:30:29 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 02:30:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/wp-config.php Dec 28 02:30:29 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 02:30:29 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 02:30:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/stat -c %a /home/wwwletsstalkfood/public_html/wp-config.php Dec 28 02:30:29 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 02:30:29 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 02:30:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color pingbacks is_disabled Dec 28 02:30:29 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 02:30:30 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 02:30:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:30:30 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 02:30:30 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 02:30:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color security-keys are_keys_correct Dec 28 02:30:30 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 02:30:31 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=mrsclean --output=json Dec 28 02:30:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:30:31 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/backup --no-color instance info --format=json --check-updates=true Dec 28 02:30:31 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 28 02:30:31 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 28 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean DomainInfo single_domain_data domain=mrsclean.co.in return_https_redirect_status=1 --output=json Dec 28 02:30:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:30:31 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean Mime list_redirects --output=json Dec 28 02:30:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:30:31 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/public_html/backup/wp-includes/version.php Dec 28 02:30:31 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 28 02:30:31 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 28 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/public_html/backup/wp-includes/version.php Dec 28 02:30:31 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 28 02:30:31 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 28 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 28 02:30:31 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 28 02:30:31 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 28 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean LangPHP php_get_vhost_versions --output=json Dec 28 02:30:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:30:32 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 28 02:30:32 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:30:32 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/blog --no-color instance info --format=json --check-updates=true Dec 28 02:30:32 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 28 02:30:32 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 28 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/public_html/blog/wp-includes/version.php Dec 28 02:30:32 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 28 02:30:32 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 28 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/public_html/blog/wp-includes/version.php Dec 28 02:30:32 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 28 02:30:32 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 28 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 28 02:30:32 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 28 02:30:32 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 28 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=shalinijames --output=json Dec 28 02:30:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:30:32 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color instance info --format=json --check-updates=true Dec 28 02:30:32 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 02:30:40 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 02:30:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_plugins --format=json Dec 28 02:30:40 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 02:30:40 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 02:30:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_themes --format=json Dec 28 02:30:40 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 02:30:41 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 02:30:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 28 02:30:41 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 02:30:41 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 02:30:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames LangPHP php_get_vhost_versions --output=json Dec 28 02:30:41 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:30:41 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:30:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color instance login-url --skip-plugins=false --format=json Dec 28 02:30:41 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 02:30:41 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 02:30:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DomainInfo single_domain_data domain=shalinijames.com return_https_redirect_status=1 --output=json Dec 28 02:30:41 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:30:42 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:30:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames Mime list_redirects --output=json Dec 28 02:30:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:30:42 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:30:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 28 02:30:42 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 02:30:44 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 02:30:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_plugins --format=json Dec 28 02:30:44 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 02:30:44 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 02:30:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 28 02:30:44 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 02:30:48 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 02:30:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_themes --format=json Dec 28 02:30:48 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 02:30:49 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 02:30:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/wp-config.php Dec 28 02:30:49 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 02:30:49 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 02:30:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:30:49 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 02:30:49 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 02:30:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/.maintenance Dec 28 02:30:49 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 02:30:49 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 02:30:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color db-prefix get Dec 28 02:30:49 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 02:30:50 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 02:30:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DirectoryPrivacy is_directory_protected dir=/home/shalinijames/public_html --output=json Dec 28 02:30:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:30:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:30:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:30:50 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 02:30:50 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 02:30:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 28 02:30:50 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 02:30:51 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 02:30:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 28 02:30:51 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 02:30:51 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 02:30:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 28 02:30:51 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 02:30:52 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 02:30:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 28 02:30:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 02:30:52 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 02:30:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color admin-username is-secure Dec 28 02:30:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 02:30:52 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 02:30:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:30:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 02:30:53 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 02:30:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/wp-config.php Dec 28 02:30:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 02:30:53 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 02:30:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/stat -c %a /home/shalinijames/public_html/wp-config.php Dec 28 02:30:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 02:30:53 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 02:30:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color pingbacks is_disabled Dec 28 02:30:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 02:30:53 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 02:30:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:30:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 02:30:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 02:30:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color security-keys are_keys_correct Dec 28 02:30:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 02:30:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 02:30:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwtestugo --output=json Dec 28 02:30:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:30:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:30:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color instance info --format=json --check-updates=true Dec 28 02:30:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_plugins --format=json Dec 28 02:31:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_themes --format=json Dec 28 02:31:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 28 02:31:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo LangPHP php_get_vhost_versions --output=json Dec 28 02:31:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:31:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:31:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color instance login-url --skip-plugins=false --format=json Dec 28 02:31:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DomainInfo single_domain_data domain=testugo.in return_https_redirect_status=1 --output=json Dec 28 02:31:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:31:02 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:31:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo Mime list_redirects --output=json Dec 28 02:31:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:31:02 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:31:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 28 02:31:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_plugins --format=json Dec 28 02:31:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 28 02:31:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_themes --format=json Dec 28 02:31:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/wp-config.php Dec 28 02:31:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:31:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/.maintenance Dec 28 02:31:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color db-prefix get Dec 28 02:31:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt1 --output=json Dec 28 02:31:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:31:08 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:31:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:31:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 28 02:31:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 28 02:31:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 28 02:31:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 28 02:31:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color admin-username is-secure Dec 28 02:31:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:31:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/wp-config.php Dec 28 02:31:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/tt1/wp-config.php Dec 28 02:31:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color pingbacks is_disabled Dec 28 02:31:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:31:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color security-keys are_keys_correct Dec 28 02:31:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color instance info --format=json --check-updates=true Dec 28 02:31:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_plugins --format=json Dec 28 02:31:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_themes --format=json Dec 28 02:31:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:18 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 28 02:31:18 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:18 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color instance login-url --skip-plugins=false --format=json Dec 28 02:31:18 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:18 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 28 02:31:18 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:19 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_plugins --format=json Dec 28 02:31:19 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:19 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 28 02:31:19 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:23 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_themes --format=json Dec 28 02:31:23 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:23 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/wp-config.php Dec 28 02:31:23 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:23 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:31:24 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:24 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/.maintenance Dec 28 02:31:24 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:24 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color db-prefix get Dec 28 02:31:24 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:24 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt --output=json Dec 28 02:31:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:31:24 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:31:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:31:24 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:25 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 28 02:31:25 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:25 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 28 02:31:25 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:26 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 28 02:31:26 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:26 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 28 02:31:26 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color admin-username is-secure Dec 28 02:31:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:31:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/wp-config.php Dec 28 02:31:28 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:28 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/tt/wp-config.php Dec 28 02:31:28 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:28 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color pingbacks is_disabled Dec 28 02:31:28 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:28 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:31:28 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:28 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color security-keys are_keys_correct Dec 28 02:31:28 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:29 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color instance info --format=json --check-updates=true Dec 28 02:31:29 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:33 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_plugins --format=json Dec 28 02:31:33 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:33 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_themes --format=json Dec 28 02:31:33 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:34 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 28 02:31:34 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:34 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color instance login-url --skip-plugins=false --format=json Dec 28 02:31:34 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:35 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 28 02:31:35 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:35 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_plugins --format=json Dec 28 02:31:35 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:36 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 28 02:31:36 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:40 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_themes --format=json Dec 28 02:31:40 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:40 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/wp-config.php Dec 28 02:31:40 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:40 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:31:40 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:40 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/.maintenance Dec 28 02:31:41 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:41 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color db-prefix get Dec 28 02:31:41 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:41 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/HYPE --output=json Dec 28 02:31:41 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:31:41 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:31:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:31:41 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:42 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 28 02:31:42 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:42 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 28 02:31:42 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:42 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 28 02:31:42 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:43 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 28 02:31:43 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:43 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color admin-username is-secure Dec 28 02:31:43 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:44 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:31:44 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:44 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/wp-config.php Dec 28 02:31:44 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:44 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/HYPE/wp-config.php Dec 28 02:31:44 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:44 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color pingbacks is_disabled Dec 28 02:31:44 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:45 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:31:45 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:45 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color security-keys are_keys_correct Dec 28 02:31:45 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:31:45 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:31:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=ugotscom --output=json Dec 28 02:31:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:31:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/boniface/blog --no-color instance info --format=json --check-updates=true Dec 28 02:31:46 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:31:46 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DomainInfo single_domain_data domain=ugotechnologies.com return_https_redirect_status=1 --output=json Dec 28 02:31:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:31:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom Mime list_redirects --output=json Dec 28 02:31:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:31:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/boniface/blog/wp-includes/version.php Dec 28 02:31:46 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:31:46 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/public_html/boniface/blog/wp-includes/version.php Dec 28 02:31:46 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:31:46 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 28 02:31:46 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:31:46 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom LangPHP php_get_vhost_versions --output=json Dec 28 02:31:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:31:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:31:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color instance info --format=json --check-updates=true Dec 28 02:31:47 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:31:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:31:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_plugins --format=json Dec 28 02:31:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:31:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:31:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_themes --format=json Dec 28 02:31:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:31:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:31:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 28 02:31:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:31:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:31:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color instance login-url --skip-plugins=false --format=json Dec 28 02:31:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:31:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:31:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 28 02:31:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:31:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:31:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_plugins --format=json Dec 28 02:31:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:31:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:31:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 28 02:31:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_themes --format=json Dec 28 02:32:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php Dec 28 02:32:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:32:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/.maintenance Dec 28 02:32:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color db-prefix get Dec 28 02:32:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --output=json Dec 28 02:32:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:32:02 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:32:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:32:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 28 02:32:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 28 02:32:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 28 02:32:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 28 02:32:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color admin-username is-secure Dec 28 02:32:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:32:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php Dec 28 02:32:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/stat -c %a /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php Dec 28 02:32:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color pingbacks is_disabled Dec 28 02:32:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:32:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color security-keys are_keys_correct Dec 28 02:32:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color instance info --format=json --check-updates=true Dec 28 02:32:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_plugins --format=json Dec 28 02:32:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_themes --format=json Dec 28 02:32:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 28 02:32:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color instance login-url --skip-plugins=false --format=json Dec 28 02:32:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 28 02:32:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_plugins --format=json Dec 28 02:32:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 28 02:32:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_themes --format=json Dec 28 02:32:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/wp-config.php Dec 28 02:32:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:32:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/.maintenance Dec 28 02:32:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color db-prefix get Dec 28 02:32:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/site --output=json Dec 28 02:32:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:32:16 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:32:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:32:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 28 02:32:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 28 02:32:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 28 02:32:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 28 02:32:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color admin-username is-secure Dec 28 02:32:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:19 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:32:19 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:19 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/wp-config.php Dec 28 02:32:19 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:19 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/stat -c %a /home/ugotscom/public_html/old/site/wp-config.php Dec 28 02:32:19 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:19 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color pingbacks is_disabled Dec 28 02:32:19 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:32:20 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color security-keys are_keys_correct Dec 28 02:32:20 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:32:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:32:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=woodpeck --output=json Dec 28 02:32:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:32:20 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:32:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/woodpeck/public_html/wp --no-color instance info --format=json --check-updates=true Dec 28 02:32:20 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 28 02:32:20 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 28 02:32:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck DomainInfo single_domain_data domain=woodpeckerindia.com return_https_redirect_status=1 --output=json Dec 28 02:32:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:32:21 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck Mime list_redirects --output=json Dec 28 02:32:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:32:21 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/public_html/wp/wp-includes/version.php Dec 28 02:32:21 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 28 02:32:21 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 28 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 28 02:32:21 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 28 02:32:21 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 28 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck LangPHP php_get_vhost_versions --output=json Dec 28 02:32:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:32:21 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=palco123 --output=json Dec 28 02:32:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:32:21 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color instance info --format=json --check-updates=true Dec 28 02:32:21 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 28 02:32:29 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 28 02:32:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 28 02:32:29 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 28 02:32:30 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 28 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 28 02:32:30 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 28 02:32:35 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 28 02:32:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 28 02:32:35 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 28 02:32:35 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 28 02:32:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 LangPHP php_get_vhost_versions --output=json Dec 28 02:32:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:32:35 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:32:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color instance login-url --skip-plugins=false --format=json Dec 28 02:32:35 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 28 02:32:36 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 28 02:32:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DomainInfo single_domain_data domain=panlys.com return_https_redirect_status=1 --output=json Dec 28 02:32:36 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:32:36 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:32:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 Mime list_redirects --output=json Dec 28 02:32:36 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:32:36 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:32:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 28 02:32:36 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 28 02:32:37 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 28 02:32:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 28 02:32:37 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 28 02:32:38 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 28 02:32:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 28 02:32:38 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 28 02:32:43 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 28 02:32:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 28 02:32:43 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 28 02:32:48 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 28 02:32:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/wp-config.php Dec 28 02:32:49 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 28 02:32:49 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 28 02:32:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:32:49 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 28 02:32:50 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 28 02:32:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/.maintenance Dec 28 02:32:50 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 28 02:32:50 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 28 02:32:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color db-prefix get Dec 28 02:32:50 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 28 02:32:50 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 28 02:32:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DirectoryPrivacy is_directory_protected dir=/home/palco123/public_html --output=json Dec 28 02:32:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:32:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:32:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:32:50 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 28 02:32:51 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 28 02:32:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color option get auto_update_core_major Dec 28 02:32:51 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 28 02:32:51 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 28 02:32:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 28 02:32:52 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 28 02:32:52 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 28 02:32:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 28 02:32:52 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 28 02:32:53 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 28 02:32:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color admin-username is-secure Dec 28 02:32:53 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 28 02:32:53 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 28 02:32:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:32:53 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 28 02:32:54 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 28 02:32:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/wp-config.php Dec 28 02:32:54 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 28 02:32:54 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 28 02:32:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/stat -c %a /home/palco123/public_html/wp-config.php Dec 28 02:32:54 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 28 02:32:54 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 28 02:32:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color pingbacks is_disabled Dec 28 02:32:54 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 28 02:32:54 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 28 02:32:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:32:54 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 28 02:32:55 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 28 02:32:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color security-keys are_keys_correct Dec 28 02:32:55 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 28 02:32:55 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 28 02:32:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwresourcehunte --output=json Dec 28 02:32:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:32:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:32:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color instance info --format=json --check-updates=true Dec 28 02:32:55 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 02:33:02 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 02:33:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_plugins --format=json Dec 28 02:33:02 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 02:33:02 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 02:33:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_themes --format=json Dec 28 02:33:02 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 02:33:02 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 02:33:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 28 02:33:02 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 02:33:02 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 02:33:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte LangPHP php_get_vhost_versions --output=json Dec 28 02:33:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:03 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color instance login-url --skip-plugins=false --format=json Dec 28 02:33:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 02:33:03 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 02:33:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DomainInfo single_domain_data domain=resourcehunters.com return_https_redirect_status=1 --output=json Dec 28 02:33:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:03 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte Mime list_redirects --output=json Dec 28 02:33:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:03 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 28 02:33:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 02:33:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 02:33:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_plugins --format=json Dec 28 02:33:04 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 02:33:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 02:33:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 28 02:33:04 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 02:33:09 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 02:33:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_themes --format=json Dec 28 02:33:09 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 02:33:09 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 02:33:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/wp-config.php Dec 28 02:33:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 02:33:10 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 02:33:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:33:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 02:33:10 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 02:33:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/.maintenance Dec 28 02:33:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 02:33:10 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 02:33:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color db-prefix get Dec 28 02:33:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 02:33:10 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 02:33:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DirectoryPrivacy is_directory_protected dir=/home/wwwresourcehunte/public_html --output=json Dec 28 02:33:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:10 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:33:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 02:33:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 02:33:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 28 02:33:12 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 02:33:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 02:33:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 28 02:33:12 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 02:33:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 02:33:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 28 02:33:12 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 02:33:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 02:33:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 28 02:33:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 02:33:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 02:33:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color admin-username is-secure Dec 28 02:33:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 02:33:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 02:33:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:33:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 02:33:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 02:33:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/wp-config.php Dec 28 02:33:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 02:33:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 02:33:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/stat -c %a /home/wwwresourcehunte/public_html/wp-config.php Dec 28 02:33:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 02:33:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 02:33:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color pingbacks is_disabled Dec 28 02:33:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 02:33:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 02:33:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 28 02:33:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 02:33:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 02:33:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color security-keys are_keys_correct Dec 28 02:33:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 02:33:15 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=dartsimp WpToolkitNotification send_admin_auto_updates_notification available_updates_text= available_updates_list= installed_updates_text= installed_updates_list= 'failure_updates_text=Updates were not installed for the following items:<br/><br/>' 'failure_updates_list=1. Website "EVM Honda Cochin" (http://www.evmhonda.com): Failed to reset cache for the instance #1: Fatal error: Uncaught Error: Call to undefined function cardealer_is_wpml_active() in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php:1041#012Stack trace:#012#0 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-init.php(22): require_once()#012#1 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/cardealer-helper-library.php(183): Dec 28 02:33:15 host sudo: wp-toolkit : (command continued) require_once('"'"'/home/wwwevmhon...'"'"')#012#2 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(287): cdhl_include_admin_files('"'"''"'"')#012#3 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(311): WP_Hook->apply_filters(NULL, Array)#012#4 /home/wwwevmhonda/public_html/wp-includes/plugin.php(478): WP_Hook->do_action(Array)#012#5 /home/wwwevmhonda/public_html/wp-settings.php(546): do_action('"'"'init'"'"')#012#6 /usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/vendor/wp-cli/wp-cli/php/WP_CLI/Runner.php(1356): require('"'"'/home/wwwevmhon...'"'"')#012#7 /usr/local/cpanel/3rdparty/wp-toolkit/plib/ve in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php on line 1041#012Error: There has been a critical error on your website.Learn more about debugging in WordPress. There has been a critical error on your website.#012<br/><br/>2. Website Dec 28 02:33:15 host sudo: wp-toolkit : (command continued) "/home/mrsclean/public_html/backup" (http://mrsclean.co.in/backup): Failed to reset cache for the instance #5: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012<br/><br/>3. Website "/home/mrsclean/public_html/blog" (http://mrsclean.co.in/blog): Failed to reset cache for the instance #6: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012<br/><br/>4. Website "/home/ugotscom/public_html/boniface/blog" (http://ugotechnologies.com/boniface/blog): Failed to reset cache for the instance #13: Dec 28 02:33:15 host sudo: wp-toolkit : (command continued) Error: Error establishing a database connection.#012<br/><br/>5. Website "/home/woodpeck/public_html/wp" (http://woodpeckerindia.com/wp): Failed to reset cache for the instance #16: /bin/sh: line 0: cd: /home/woodpeck/public_html/wp: No such file or directory#012<br/><br/>' --output=json Dec 28 02:33:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:15 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color cli cache clear Dec 28 02:33:15 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 28 02:33:15 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 28 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color cli cache clear Dec 28 02:33:15 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 02:33:15 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/backup --no-color cli cache clear Dec 28 02:33:15 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 28 02:33:15 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 28 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/blog --no-color cli cache clear Dec 28 02:33:16 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 28 02:33:16 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 28 02:33:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color cli cache clear Dec 28 02:33:16 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 02:33:16 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 02:33:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color cli cache clear Dec 28 02:33:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:33:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:33:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color cli cache clear Dec 28 02:33:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:33:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:33:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color cli cache clear Dec 28 02:33:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:33:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:33:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/boniface/blog --no-color cli cache clear Dec 28 02:33:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:33:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color cli cache clear Dec 28 02:33:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:33:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color cli cache clear Dec 28 02:33:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:33:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/woodpeck/public_html/wp --no-color cli cache clear Dec 28 02:33:17 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 28 02:33:17 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 28 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color cli cache clear Dec 28 02:33:17 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 28 02:33:17 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 28 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color cli cache clear Dec 28 02:33:17 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 02:33:18 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 02:33:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 28 02:33:18 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 28 02:33:18 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 28 02:33:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 28 02:33:18 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 02:33:18 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 02:33:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 28 02:33:19 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 02:33:19 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 02:33:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 28 02:33:19 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:33:20 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:33:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 28 02:33:20 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:33:20 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:33:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 28 02:33:20 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 02:33:21 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 02:33:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 28 02:33:21 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:33:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:33:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 28 02:33:21 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 02:33:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 28 02:33:22 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 28 02:33:22 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 28 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 28 02:33:22 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c httpd -v Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/palco123/panlys.com/wp-toolkit.conf Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/palco123/panlys.com/wp-toolkit.conf Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 02:37:39 host sshd[10989]: Invalid user du from 45.93.201.90 port 43244 Dec 28 02:37:39 host sshd[10989]: input_userauth_request: invalid user du [preauth] Dec 28 02:37:39 host sshd[10989]: pam_unix(sshd:auth): check pass; user unknown Dec 28 02:37:39 host sshd[10989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 28 02:37:41 host sshd[10989]: Failed password for invalid user du from 45.93.201.90 port 43244 ssh2 Dec 28 02:37:44 host sshd[10989]: pam_unix(sshd:auth): check pass; user unknown Dec 28 02:37:45 host sshd[10989]: Failed password for invalid user du from 45.93.201.90 port 43244 ssh2 Dec 28 02:37:49 host sshd[10989]: pam_unix(sshd:auth): check pass; user unknown Dec 28 02:37:51 host sshd[10989]: Failed password for invalid user du from 45.93.201.90 port 43244 ssh2 Dec 28 02:37:54 host sshd[10989]: Connection closed by 45.93.201.90 port 43244 [preauth] Dec 28 02:37:54 host sshd[10989]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 28 02:40:41 host sshd[11497]: Invalid user admin from 194.169.175.102 port 58398 Dec 28 02:40:41 host sshd[11497]: input_userauth_request: invalid user admin [preauth] Dec 28 02:40:42 host sshd[11497]: pam_unix(sshd:auth): check pass; user unknown Dec 28 02:40:42 host sshd[11497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 Dec 28 02:40:44 host sshd[11497]: Failed password for invalid user admin from 194.169.175.102 port 58398 ssh2 Dec 28 02:40:44 host sshd[11497]: Received disconnect from 194.169.175.102 port 58398:11: Client disconnecting normally [preauth] Dec 28 02:40:44 host sshd[11497]: Disconnected from 194.169.175.102 port 58398 [preauth] Dec 28 02:50:17 host sshd[13132]: Connection closed by 162.243.150.10 port 56070 [preauth] Dec 28 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 28 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 28 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 28 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 28 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 28 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 28 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 28 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 28 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 03:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 03:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 03:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 03:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 28 03:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 03:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 03:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=dartsimp user-3=a2zgroup user-4=wwwkaretakers user-5=cochintaxi user-6=ugotscom user-7=wwwrmswll user-8=wwwresourcehunte user-9=keralaholi user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=wwwtestugo user-14=shalinijames user-15=vfmassets user-16=wwwkapin user-17=woodpeck user-18=disposeat user-19=wwwkmaorg user-20=remysagr user-21=wwwnexidigital user-22=mrsclean user-23=kottayamcalldriv user-24=phmetals user-25=gifterman user-26=palco123 user-27=straightcurve user-28=wwwletsstalkfood user-29=wwwevmhonda user-30=bonifacegroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 28 03:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 28 03:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 03:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 03:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 03:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 03:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 03:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-iLcMxavSe0MGZ4D1.~ Dec 28 03:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 03:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 03:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-iLcMxavSe0MGZ4D1.~' Dec 28 03:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 03:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 03:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-iLcMxavSe0MGZ4D1.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 03:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 03:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 03:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 28 03:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 03:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 28 03:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 03:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 28 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 03:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 03:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 03:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 03:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 28 03:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 28 03:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 28 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 28 03:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 03:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 03:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 28 03:21:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 03:21:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 28 03:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 03:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 03:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 28 03:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 03:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 03:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 28 03:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 03:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 03:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 28 03:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 03:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 03:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 28 03:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 03:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 03:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 28 03:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 03:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 03:22:34 host sshd[18248]: Connection closed by 112.161.214.48 port 33594 [preauth] Dec 28 03:29:13 host sshd[19211]: Invalid user liuzulong from 92.46.108.20 port 35606 Dec 28 03:29:13 host sshd[19211]: input_userauth_request: invalid user liuzulong [preauth] Dec 28 03:29:13 host sshd[19211]: pam_unix(sshd:auth): check pass; user unknown Dec 28 03:29:13 host sshd[19211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 28 03:29:16 host sshd[19211]: Failed password for invalid user liuzulong from 92.46.108.20 port 35606 ssh2 Dec 28 03:29:16 host sshd[19211]: Connection closed by 92.46.108.20 port 35606 [preauth] Dec 28 03:30:44 host sshd[19412]: Invalid user tiago from 162.218.126.136 port 52998 Dec 28 03:30:44 host sshd[19412]: input_userauth_request: invalid user tiago [preauth] Dec 28 03:30:44 host sshd[19412]: pam_unix(sshd:auth): check pass; user unknown Dec 28 03:30:44 host sshd[19412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 28 03:30:46 host sshd[19412]: Failed password for invalid user tiago from 162.218.126.136 port 52998 ssh2 Dec 28 03:30:46 host sshd[19412]: Connection closed by 162.218.126.136 port 52998 [preauth] Dec 28 03:44:25 host sshd[21765]: Invalid user user from 106.10.122.53 port 57480 Dec 28 03:44:25 host sshd[21765]: input_userauth_request: invalid user user [preauth] Dec 28 03:44:26 host sshd[21765]: pam_unix(sshd:auth): check pass; user unknown Dec 28 03:44:26 host sshd[21765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 28 03:44:28 host sshd[21765]: Failed password for invalid user user from 106.10.122.53 port 57480 ssh2 Dec 28 03:44:28 host sshd[21765]: Connection closed by 106.10.122.53 port 57480 [preauth] Dec 28 03:47:52 host sshd[22189]: Invalid user zy from 103.13.40.2 port 39840 Dec 28 03:47:52 host sshd[22189]: input_userauth_request: invalid user zy [preauth] Dec 28 03:47:52 host sshd[22189]: pam_unix(sshd:auth): check pass; user unknown Dec 28 03:47:52 host sshd[22189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 28 03:47:54 host sshd[22189]: Failed password for invalid user zy from 103.13.40.2 port 39840 ssh2 Dec 28 03:47:54 host sshd[22189]: Connection closed by 103.13.40.2 port 39840 [preauth] Dec 28 03:59:44 host sshd[24385]: Invalid user user1 from 41.197.31.178 port 45604 Dec 28 03:59:44 host sshd[24385]: input_userauth_request: invalid user user1 [preauth] Dec 28 03:59:44 host sshd[24385]: pam_unix(sshd:auth): check pass; user unknown Dec 28 03:59:44 host sshd[24385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 28 03:59:46 host sshd[24385]: Failed password for invalid user user1 from 41.197.31.178 port 45604 ssh2 Dec 28 03:59:46 host sshd[24385]: Connection closed by 41.197.31.178 port 45604 [preauth] Dec 28 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 28 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 28 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 28 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 28 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 28 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 28 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 28 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 28 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 04:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 04:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 04:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 04:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 28 04:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 04:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 04:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=vfmassets user-2=shalinijames user-3=wwwtestugo user-4=pmcresources user-5=wwwkmaorg user-6=disposeat user-7=remysagr user-8=wwwkapin user-9=woodpeck user-10=palco123 user-11=gifterman user-12=phmetals user-13=kottayamcalldriv user-14=wwwnexidigital user-15=mrsclean user-16=bonifacegroup user-17=wwwevmhonda user-18=straightcurve user-19=wwwletsstalkfood user-20=a2zgroup user-21=dartsimp user-22=laundryboniface user-23=wwwkaretakers user-24=cochintaxi user-25=travelboniface user-26=wwwresourcehunte user-27=keralaholi user-28=wwwrmswll user-29=ugotscom user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 28 04:21:53 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 28 04:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 04:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 04:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 04:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 04:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 04:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-smmWb6HuYgh7jBbp.~ Dec 28 04:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 04:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 04:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-smmWb6HuYgh7jBbp.~' Dec 28 04:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 04:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 04:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-smmWb6HuYgh7jBbp.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 04:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 04:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 04:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 28 04:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 04:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 28 04:21:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 04:21:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 28 04:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 04:21:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 04:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 04:21:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 04:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 28 04:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 28 04:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 28 04:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 28 04:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 04:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 28 04:21:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 04:22:00 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 28 04:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 04:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 04:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 28 04:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 04:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 04:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 28 04:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 04:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 04:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 28 04:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 04:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 04:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 28 04:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 04:22:06 host sshd[28688]: Invalid user dv from 45.93.201.90 port 53698 Dec 28 04:22:06 host sshd[28688]: input_userauth_request: invalid user dv [preauth] Dec 28 04:22:06 host sshd[28688]: pam_unix(sshd:auth): check pass; user unknown Dec 28 04:22:06 host sshd[28688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 28 04:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 04:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 28 04:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 04:22:08 host sshd[28688]: Failed password for invalid user dv from 45.93.201.90 port 53698 ssh2 Dec 28 04:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 04:22:12 host sshd[28688]: pam_unix(sshd:auth): check pass; user unknown Dec 28 04:22:14 host sshd[28688]: Failed password for invalid user dv from 45.93.201.90 port 53698 ssh2 Dec 28 04:22:17 host sshd[28688]: pam_unix(sshd:auth): check pass; user unknown Dec 28 04:22:19 host sshd[28688]: Failed password for invalid user dv from 45.93.201.90 port 53698 ssh2 Dec 28 04:22:22 host sshd[28688]: Connection closed by 45.93.201.90 port 53698 [preauth] Dec 28 04:22:22 host sshd[28688]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 28 04:41:23 host sshd[32008]: Invalid user user from 162.218.126.136 port 46722 Dec 28 04:41:23 host sshd[32008]: input_userauth_request: invalid user user [preauth] Dec 28 04:41:23 host sshd[32008]: pam_unix(sshd:auth): check pass; user unknown Dec 28 04:41:23 host sshd[32008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 28 04:41:25 host sshd[32008]: Failed password for invalid user user from 162.218.126.136 port 46722 ssh2 Dec 28 04:41:26 host sshd[32008]: Connection closed by 162.218.126.136 port 46722 [preauth] Dec 28 04:55:30 host sshd[2129]: Did not receive identification string from 139.144.168.36 port 61000 Dec 28 05:13:19 host sshd[5260]: User root from 106.10.122.53 not allowed because not listed in AllowUsers Dec 28 05:13:19 host sshd[5260]: input_userauth_request: invalid user root [preauth] Dec 28 05:13:19 host unix_chkpwd[5263]: password check failed for user (root) Dec 28 05:13:19 host sshd[5260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 user=root Dec 28 05:13:19 host sshd[5260]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 05:13:21 host sshd[5260]: Failed password for invalid user root from 106.10.122.53 port 48014 ssh2 Dec 28 05:13:21 host sshd[5260]: Connection closed by 106.10.122.53 port 48014 [preauth] Dec 28 05:15:01 host sshd[5511]: Invalid user ubuntu from 103.13.40.2 port 55002 Dec 28 05:15:01 host sshd[5511]: input_userauth_request: invalid user ubuntu [preauth] Dec 28 05:15:01 host sshd[5511]: pam_unix(sshd:auth): check pass; user unknown Dec 28 05:15:01 host sshd[5511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 28 05:15:03 host sshd[5511]: Failed password for invalid user ubuntu from 103.13.40.2 port 55002 ssh2 Dec 28 05:15:03 host sshd[5511]: Connection closed by 103.13.40.2 port 55002 [preauth] Dec 28 05:16:35 host sshd[5867]: Invalid user ubnt from 193.47.61.121 port 48822 Dec 28 05:16:35 host sshd[5867]: input_userauth_request: invalid user ubnt [preauth] Dec 28 05:16:35 host sshd[5867]: pam_unix(sshd:auth): check pass; user unknown Dec 28 05:16:35 host sshd[5867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.47.61.121 Dec 28 05:16:37 host sshd[5867]: Failed password for invalid user ubnt from 193.47.61.121 port 48822 ssh2 Dec 28 05:16:37 host sshd[5867]: Received disconnect from 193.47.61.121 port 48822:11: Bye Bye [preauth] Dec 28 05:16:37 host sshd[5867]: Disconnected from 193.47.61.121 port 48822 [preauth] Dec 28 05:16:38 host sshd[5878]: Invalid user admin from 193.47.61.121 port 52142 Dec 28 05:16:38 host sshd[5878]: input_userauth_request: invalid user admin [preauth] Dec 28 05:16:38 host sshd[5878]: pam_unix(sshd:auth): check pass; user unknown Dec 28 05:16:38 host sshd[5878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.47.61.121 Dec 28 05:16:40 host sshd[5878]: Failed password for invalid user admin from 193.47.61.121 port 52142 ssh2 Dec 28 05:16:40 host sshd[5878]: Received disconnect from 193.47.61.121 port 52142:11: Bye Bye [preauth] Dec 28 05:16:40 host sshd[5878]: Disconnected from 193.47.61.121 port 52142 [preauth] Dec 28 05:16:41 host sshd[5885]: User root from 193.47.61.121 not allowed because not listed in AllowUsers Dec 28 05:16:41 host sshd[5885]: input_userauth_request: invalid user root [preauth] Dec 28 05:16:41 host unix_chkpwd[5889]: password check failed for user (root) Dec 28 05:16:41 host sshd[5885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.47.61.121 user=root Dec 28 05:16:41 host sshd[5885]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 05:16:43 host sshd[5885]: Failed password for invalid user root from 193.47.61.121 port 55530 ssh2 Dec 28 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 28 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 28 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 28 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 28 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 28 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 28 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 28 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 28 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 28 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=woodpeck user-2=wwwkapin user-3=wwwkmaorg user-4=disposeat user-5=remysagr user-6=pmcresources user-7=wwwtestugo user-8=shalinijames user-9=vfmassets user-10=straightcurve user-11=wwwletsstalkfood user-12=wwwevmhonda user-13=bonifacegroup user-14=mrsclean user-15=wwwnexidigital user-16=phmetals user-17=kottayamcalldriv user-18=gifterman user-19=palco123 user-20=wwwkaretakers user-21=cochintaxi user-22=laundryboniface user-23=dartsimp user-24=a2zgroup user-25=wwwpmcresource user-26=ugotscom user-27=wwwrmswll user-28=wwwresourcehunte user-29=keralaholi user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 28 05:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 28 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 28 05:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 05:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=evmhonda.com --output=json Dec 28 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/test -e /home/wwwevmhonda/wordpress-backups Dec 28 05:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 28 05:21:49 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 28 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && find -H /home/wwwevmhonda/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 28 05:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 28 05:21:49 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 28 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=letsstalkfood.com --output=json Dec 28 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/wordpress-backups Dec 28 05:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 05:21:49 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && find -H /home/wwwletsstalkfood/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 28 05:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 05:21:49 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=mrsclean.co.in --output=json Dec 28 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Dec 28 05:21:50 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 28 05:21:50 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 28 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 28 05:21:50 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 28 05:21:50 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 28 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Dec 28 05:21:50 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 28 05:21:50 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 28 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 28 05:21:50 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 28 05:21:50 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 28 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=shalinijames.com --output=json Dec 28 05:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/wordpress-backups Dec 28 05:21:50 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 05:21:50 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && find -H /home/shalinijames/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 28 05:21:50 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 05:21:50 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=testugo.in --output=json Dec 28 05:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Dec 28 05:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 05:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 28 05:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 05:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Dec 28 05:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 05:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 28 05:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 05:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Dec 28 05:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 05:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 28 05:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 05:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=ugotechnologies.com --output=json Dec 28 05:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Dec 28 05:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 05:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=woodpeckerindia.com --output=json Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/wordpress-backups Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 28 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && find -H /home/woodpeck/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 28 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=panlys.com --output=json Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/wordpress-backups Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 28 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && find -H /home/palco123/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 28 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=resourcehunters.com --output=json Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/wordpress-backups Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && find -H /home/wwwresourcehunte/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /var/cpanel/licenseid_credentials.json Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/cat /home/woodpeck/.wp-toolkit-identifier Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 28 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkapin ; COMMAND=/bin/cat /home/wwwkapin/.wp-toolkit-identifier Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwkapin by (uid=0) Dec 28 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwkapin Dec 28 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkmaorg ; COMMAND=/bin/cat /home/wwwkmaorg/.wp-toolkit-identifier Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwkmaorg by (uid=0) Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwkmaorg Dec 28 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=disposeat ; COMMAND=/bin/cat /home/disposeat/.wp-toolkit-identifier Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session opened for user disposeat by (uid=0) Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session closed for user disposeat Dec 28 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=remysagr ; COMMAND=/bin/cat /home/remysagr/.wp-toolkit-identifier Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session opened for user remysagr by (uid=0) Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session closed for user remysagr Dec 28 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=pmcresources ; COMMAND=/bin/cat /home/pmcresources/.wp-toolkit-identifier Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session opened for user pmcresources by (uid=0) Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session closed for user pmcresources Dec 28 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/cat /home/wwwtestugo/.wp-toolkit-identifier Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/cat /home/shalinijames/.wp-toolkit-identifier Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=vfmassets ; COMMAND=/bin/cat /home/vfmassets/.wp-toolkit-identifier Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session opened for user vfmassets by (uid=0) Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session closed for user vfmassets Dec 28 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=straightcurve ; COMMAND=/bin/cat /home/straightcurve/.wp-toolkit-identifier Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session opened for user straightcurve by (uid=0) Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session closed for user straightcurve Dec 28 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/cat /home/wwwletsstalkfood/.wp-toolkit-identifier Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/cat /home/wwwevmhonda/.wp-toolkit-identifier Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 28 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=bonifacegroup ; COMMAND=/bin/cat /home/bonifacegroup/.wp-toolkit-identifier Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session opened for user bonifacegroup by (uid=0) Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session closed for user bonifacegroup Dec 28 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/.wp-toolkit-identifier Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 28 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwnexidigital ; COMMAND=/bin/cat /home/wwwnexidigital/.wp-toolkit-identifier Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwnexidigital by (uid=0) Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwnexidigital Dec 28 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=phmetals ; COMMAND=/bin/cat /home/phmetals/.wp-toolkit-identifier Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session opened for user phmetals by (uid=0) Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session closed for user phmetals Dec 28 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=kottayamcalldriv ; COMMAND=/bin/cat /home/kottayamcalldriv/.wp-toolkit-identifier Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session opened for user kottayamcalldriv by (uid=0) Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session closed for user kottayamcalldriv Dec 28 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=gifterman ; COMMAND=/bin/cat /home/gifterman/.wp-toolkit-identifier Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session opened for user gifterman by (uid=0) Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session closed for user gifterman Dec 28 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/cat /home/palco123/.wp-toolkit-identifier Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 28 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkaretakers ; COMMAND=/bin/cat /home/wwwkaretakers/.wp-toolkit-identifier Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwkaretakers by (uid=0) Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwkaretakers Dec 28 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=cochintaxi ; COMMAND=/bin/cat /home/cochintaxi/.wp-toolkit-identifier Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session opened for user cochintaxi by (uid=0) Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session closed for user cochintaxi Dec 28 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=laundryboniface ; COMMAND=/bin/cat /home/laundryboniface/.wp-toolkit-identifier Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session opened for user laundryboniface by (uid=0) Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session closed for user laundryboniface Dec 28 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=dartsimp ; COMMAND=/bin/cat /home/dartsimp/.wp-toolkit-identifier Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session opened for user dartsimp by (uid=0) Dec 28 05:21:52 host sudo: pam_unix(sudo:session): session closed for user dartsimp Dec 28 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=a2zgroup ; COMMAND=/bin/cat /home/a2zgroup/.wp-toolkit-identifier Dec 28 05:21:53 host sudo: pam_unix(sudo:session): session opened for user a2zgroup by (uid=0) Dec 28 05:21:53 host sudo: pam_unix(sudo:session): session closed for user a2zgroup Dec 28 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwpmcresource ; COMMAND=/bin/cat /home/wwwpmcresource/.wp-toolkit-identifier Dec 28 05:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwpmcresource by (uid=0) Dec 28 05:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwpmcresource Dec 28 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwrmswll ; COMMAND=/bin/cat /home/wwwrmswll/.wp-toolkit-identifier Dec 28 05:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwrmswll by (uid=0) Dec 28 05:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwrmswll Dec 28 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/cat /home/wwwresourcehunte/.wp-toolkit-identifier Dec 28 05:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 05:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Dec 28 05:21:53 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 28 05:21:53 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 28 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Dec 28 05:21:53 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 28 05:21:53 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 28 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-gbtf6QIhcngXaWEA.wp-toolkit-identifier Dec 28 05:21:53 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 28 05:21:53 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 28 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-gbtf6QIhcngXaWEA.wp-toolkit-identifier Dec 28 05:21:53 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 28 05:21:53 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 28 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=travelboniface ; COMMAND=/bin/cat /home/travelboniface/.wp-toolkit-identifier Dec 28 05:21:53 host sudo: pam_unix(sudo:session): session opened for user travelboniface by (uid=0) Dec 28 05:21:53 host sudo: pam_unix(sudo:session): session closed for user travelboniface Dec 28 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Dec 28 05:21:53 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 28 05:21:53 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 28 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Dec 28 05:21:53 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 28 05:21:53 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 28 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-qzFxcufXT8YXjlk2.wp-toolkit-identifier Dec 28 05:21:53 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 28 05:21:53 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 28 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-qzFxcufXT8YXjlk2.wp-toolkit-identifier Dec 28 05:21:53 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 28 05:21:53 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 28 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_shared_ip --output=json Dec 28 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_public_ip ip=167.71.234.10 --output=json Dec 28 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-xJhuR5LxufDZibbC.~ Dec 28 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-xJhuR5LxufDZibbC.~' Dec 28 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-xJhuR5LxufDZibbC.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 28 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 28 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 28 05:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 28 05:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 28 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 28 05:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 05:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 28 05:22:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 05:22:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 28 05:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 05:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 28 05:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 05:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 28 05:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 05:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 05:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 28 05:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 05:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 05:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 28 05:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 05:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 05:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 28 05:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 05:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 05:43:46 host sshd[11645]: User root from 92.46.108.20 not allowed because not listed in AllowUsers Dec 28 05:43:46 host sshd[11645]: input_userauth_request: invalid user root [preauth] Dec 28 05:43:47 host unix_chkpwd[11649]: password check failed for user (root) Dec 28 05:43:47 host sshd[11645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 user=root Dec 28 05:43:47 host sshd[11645]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 05:43:49 host sshd[11645]: Failed password for invalid user root from 92.46.108.20 port 57100 ssh2 Dec 28 05:43:49 host sshd[11645]: Connection closed by 92.46.108.20 port 57100 [preauth] Dec 28 05:48:14 host sshd[12404]: User root from 41.197.31.178 not allowed because not listed in AllowUsers Dec 28 05:48:14 host sshd[12404]: input_userauth_request: invalid user root [preauth] Dec 28 05:48:14 host unix_chkpwd[12411]: password check failed for user (root) Dec 28 05:48:14 host sshd[12404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 user=root Dec 28 05:48:14 host sshd[12404]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 05:48:16 host sshd[12404]: Failed password for invalid user root from 41.197.31.178 port 60746 ssh2 Dec 28 05:48:16 host sshd[12404]: Connection closed by 41.197.31.178 port 60746 [preauth] Dec 28 05:52:11 host sshd[13069]: Invalid user user from 162.218.126.136 port 55026 Dec 28 05:52:11 host sshd[13069]: input_userauth_request: invalid user user [preauth] Dec 28 05:52:12 host sshd[13069]: pam_unix(sshd:auth): check pass; user unknown Dec 28 05:52:12 host sshd[13069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 28 05:52:14 host sshd[13069]: Failed password for invalid user user from 162.218.126.136 port 55026 ssh2 Dec 28 05:52:14 host sshd[13069]: Connection closed by 162.218.126.136 port 55026 [preauth] Dec 28 06:06:47 host sshd[15733]: Invalid user dw from 45.93.201.90 port 44198 Dec 28 06:06:47 host sshd[15733]: input_userauth_request: invalid user dw [preauth] Dec 28 06:06:47 host sshd[15733]: pam_unix(sshd:auth): check pass; user unknown Dec 28 06:06:47 host sshd[15733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 28 06:06:49 host sshd[15733]: Failed password for invalid user dw from 45.93.201.90 port 44198 ssh2 Dec 28 06:06:52 host sshd[15733]: pam_unix(sshd:auth): check pass; user unknown Dec 28 06:06:54 host sshd[15733]: Failed password for invalid user dw from 45.93.201.90 port 44198 ssh2 Dec 28 06:06:57 host sshd[15733]: pam_unix(sshd:auth): check pass; user unknown Dec 28 06:06:59 host sshd[15733]: Failed password for invalid user dw from 45.93.201.90 port 44198 ssh2 Dec 28 06:07:02 host sshd[15733]: Connection closed by 45.93.201.90 port 44198 [preauth] Dec 28 06:07:02 host sshd[15733]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 28 06:08:07 host sshd[15976]: Did not receive identification string from 185.173.145.103 port 48700 Dec 28 06:08:19 host sshd[15991]: User root from 185.173.145.103 not allowed because not listed in AllowUsers Dec 28 06:08:19 host sshd[15991]: input_userauth_request: invalid user root [preauth] Dec 28 06:08:19 host unix_chkpwd[15994]: password check failed for user (root) Dec 28 06:08:19 host sshd[15991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.173.145.103 user=root Dec 28 06:08:19 host sshd[15991]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 06:08:21 host sshd[15991]: Failed password for invalid user root from 185.173.145.103 port 33734 ssh2 Dec 28 06:08:21 host sshd[15991]: Received disconnect from 185.173.145.103 port 33734:11: Normal Shutdown, Thank you for playing [preauth] Dec 28 06:08:21 host sshd[15991]: Disconnected from 185.173.145.103 port 33734 [preauth] Dec 28 06:08:30 host sshd[16036]: User root from 185.173.145.103 not allowed because not listed in AllowUsers Dec 28 06:08:30 host sshd[16036]: input_userauth_request: invalid user root [preauth] Dec 28 06:08:30 host unix_chkpwd[16040]: password check failed for user (root) Dec 28 06:08:30 host sshd[16036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.173.145.103 user=root Dec 28 06:08:30 host sshd[16036]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 06:08:32 host sshd[16036]: Failed password for invalid user root from 185.173.145.103 port 54940 ssh2 Dec 28 06:14:46 host sshd[17121]: Connection closed by 172.104.11.4 port 32940 [preauth] Dec 28 06:14:47 host sshd[17128]: Connection closed by 172.104.11.4 port 32950 [preauth] Dec 28 06:14:49 host sshd[17132]: Connection closed by 172.104.11.4 port 32960 [preauth] Dec 28 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 28 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 28 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 28 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 28 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 28 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 28 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 28 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 28 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 28 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=dartsimp user-2=a2zgroup user-3=laundryboniface user-4=cochintaxi user-5=wwwkaretakers user-6=travelboniface user-7=ugotscom user-8=wwwrmswll user-9=keralaholi user-10=wwwresourcehunte user-11=wwwpmcresource user-12=wwwtestugo user-13=shalinijames user-14=vfmassets user-15=pmcresources user-16=disposeat user-17=wwwkmaorg user-18=remysagr user-19=woodpeck user-20=wwwkapin user-21=phmetals user-22=kottayamcalldriv user-23=gifterman user-24=palco123 user-25=wwwnexidigital user-26=mrsclean user-27=wwwevmhonda user-28=bonifacegroup user-29=straightcurve user-30=wwwletsstalkfood feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 28 06:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 28 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-VO92T8AhM8g1XZrC.~ Dec 28 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-VO92T8AhM8g1XZrC.~' Dec 28 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-VO92T8AhM8g1XZrC.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 28 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 28 06:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 06:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 06:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 06:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 28 06:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 06:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 06:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 06:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 28 06:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 28 06:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 28 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 28 06:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 06:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 28 06:21:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 06:21:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 28 06:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 06:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 06:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 28 06:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 06:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 06:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 28 06:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 06:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 06:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 28 06:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 06:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 06:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 28 06:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 06:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 06:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 28 06:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 06:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 06:28:17 host sshd[19589]: Connection reset by 205.210.31.33 port 63836 [preauth] Dec 28 06:41:38 host sshd[22679]: Invalid user user1 from 106.10.122.53 port 41478 Dec 28 06:41:38 host sshd[22679]: input_userauth_request: invalid user user1 [preauth] Dec 28 06:41:39 host sshd[22679]: pam_unix(sshd:auth): check pass; user unknown Dec 28 06:41:39 host sshd[22679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 28 06:41:41 host sshd[22679]: Failed password for invalid user user1 from 106.10.122.53 port 41478 ssh2 Dec 28 06:41:41 host sshd[22679]: Connection closed by 106.10.122.53 port 41478 [preauth] Dec 28 06:42:16 host sshd[22772]: Invalid user lfy from 103.13.40.2 port 59216 Dec 28 06:42:16 host sshd[22772]: input_userauth_request: invalid user lfy [preauth] Dec 28 06:42:16 host sshd[22772]: pam_unix(sshd:auth): check pass; user unknown Dec 28 06:42:16 host sshd[22772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 28 06:42:18 host sshd[22772]: Failed password for invalid user lfy from 103.13.40.2 port 59216 ssh2 Dec 28 06:42:18 host sshd[22772]: Connection closed by 103.13.40.2 port 59216 [preauth] Dec 28 06:46:53 host sshd[23590]: Connection closed by 94.102.61.20 port 58544 [preauth] Dec 28 06:56:00 host sshd[25232]: Invalid user mark from 107.189.30.59 port 60240 Dec 28 06:56:00 host sshd[25232]: input_userauth_request: invalid user mark [preauth] Dec 28 06:56:00 host sshd[25232]: pam_unix(sshd:auth): check pass; user unknown Dec 28 06:56:00 host sshd[25232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Dec 28 06:56:03 host sshd[25232]: Failed password for invalid user mark from 107.189.30.59 port 60240 ssh2 Dec 28 06:56:04 host sshd[25232]: Connection closed by 107.189.30.59 port 60240 [preauth] Dec 28 07:02:35 host sshd[26604]: Invalid user user1 from 162.218.126.136 port 58948 Dec 28 07:02:35 host sshd[26604]: input_userauth_request: invalid user user1 [preauth] Dec 28 07:02:35 host sshd[26604]: pam_unix(sshd:auth): check pass; user unknown Dec 28 07:02:35 host sshd[26604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 28 07:02:38 host sshd[26604]: Failed password for invalid user user1 from 162.218.126.136 port 58948 ssh2 Dec 28 07:02:38 host sshd[26604]: Connection closed by 162.218.126.136 port 58948 [preauth] Dec 28 07:21:14 host sshd[30201]: User root from 183.62.183.14 not allowed because not listed in AllowUsers Dec 28 07:21:14 host sshd[30201]: input_userauth_request: invalid user root [preauth] Dec 28 07:21:15 host unix_chkpwd[30206]: password check failed for user (root) Dec 28 07:21:15 host sshd[30201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.62.183.14 user=root Dec 28 07:21:15 host sshd[30201]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 07:21:17 host sshd[30201]: Failed password for invalid user root from 183.62.183.14 port 61128 ssh2 Dec 28 07:21:17 host unix_chkpwd[30212]: password check failed for user (root) Dec 28 07:21:17 host sshd[30201]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 07:21:19 host sshd[30201]: Failed password for invalid user root from 183.62.183.14 port 61128 ssh2 Dec 28 07:21:20 host unix_chkpwd[30221]: password check failed for user (root) Dec 28 07:21:20 host sshd[30201]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 07:21:22 host sshd[30201]: Failed password for invalid user root from 183.62.183.14 port 61128 ssh2 Dec 28 07:21:22 host unix_chkpwd[30231]: password check failed for user (root) Dec 28 07:21:22 host sshd[30201]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 07:21:24 host sshd[30201]: Failed password for invalid user root from 183.62.183.14 port 61128 ssh2 Dec 28 07:21:25 host unix_chkpwd[30237]: password check failed for user (root) Dec 28 07:21:25 host sshd[30201]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 07:21:27 host sshd[30201]: Failed password for invalid user root from 183.62.183.14 port 61128 ssh2 Dec 28 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 28 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 28 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 28 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 28 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 28 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 28 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 28 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 28 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 07:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 07:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 07:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 07:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 28 07:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 07:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 07:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=vfmassets user-3=wwwtestugo user-4=shalinijames user-5=wwwkapin user-6=woodpeck user-7=wwwkmaorg user-8=disposeat user-9=remysagr user-10=wwwnexidigital user-11=mrsclean user-12=gifterman user-13=palco123 user-14=phmetals user-15=kottayamcalldriv user-16=wwwletsstalkfood user-17=straightcurve user-18=bonifacegroup user-19=wwwevmhonda user-20=laundryboniface user-21=dartsimp user-22=a2zgroup user-23=wwwkaretakers user-24=cochintaxi user-25=wwwrmswll user-26=wwwresourcehunte user-27=keralaholi user-28=ugotscom user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 28 07:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 28 07:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 07:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 07:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 07:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 07:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 07:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bgqHQeorwB0SFUUS.~ Dec 28 07:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 07:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 07:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bgqHQeorwB0SFUUS.~' Dec 28 07:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 07:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 07:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bgqHQeorwB0SFUUS.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 07:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 07:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 07:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 28 07:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 07:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 28 07:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 07:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 28 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 07:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 07:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 28 07:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 28 07:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 28 07:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 28 07:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 07:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 07:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 28 07:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 07:21:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 07:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 28 07:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 07:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 28 07:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 07:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 07:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 28 07:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 07:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 07:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 28 07:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 07:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 07:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 28 07:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 07:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 07:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 28 07:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 07:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 07:34:14 host sshd[32721]: Did not receive identification string from 213.226.119.201 port 56440 Dec 28 07:34:22 host sshd[32731]: User root from 213.226.119.201 not allowed because not listed in AllowUsers Dec 28 07:34:22 host sshd[32731]: input_userauth_request: invalid user root [preauth] Dec 28 07:34:22 host unix_chkpwd[32735]: password check failed for user (root) Dec 28 07:34:22 host sshd[32731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.226.119.201 user=root Dec 28 07:34:22 host sshd[32731]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 07:34:24 host sshd[32731]: Failed password for invalid user root from 213.226.119.201 port 35580 ssh2 Dec 28 07:34:25 host sshd[32731]: Received disconnect from 213.226.119.201 port 35580:11: Normal Shutdown, Thank you for playing [preauth] Dec 28 07:34:25 host sshd[32731]: Disconnected from 213.226.119.201 port 35580 [preauth] Dec 28 07:35:01 host sshd[394]: User root from 213.226.119.201 not allowed because not listed in AllowUsers Dec 28 07:35:01 host sshd[394]: input_userauth_request: invalid user root [preauth] Dec 28 07:35:01 host unix_chkpwd[398]: password check failed for user (root) Dec 28 07:35:01 host sshd[394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.226.119.201 user=root Dec 28 07:35:01 host sshd[394]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 07:35:03 host sshd[394]: Failed password for invalid user root from 213.226.119.201 port 41240 ssh2 Dec 28 07:36:20 host sshd[680]: Invalid user rsync from 41.197.31.178 port 55056 Dec 28 07:36:20 host sshd[680]: input_userauth_request: invalid user rsync [preauth] Dec 28 07:36:20 host sshd[680]: pam_unix(sshd:auth): check pass; user unknown Dec 28 07:36:20 host sshd[680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 28 07:36:23 host sshd[680]: Failed password for invalid user rsync from 41.197.31.178 port 55056 ssh2 Dec 28 07:36:24 host sshd[680]: Connection closed by 41.197.31.178 port 55056 [preauth] Dec 28 07:46:20 host sshd[2897]: Connection closed by 159.89.193.101 port 48230 [preauth] Dec 28 07:50:54 host sshd[3722]: Invalid user dx from 45.93.201.90 port 47288 Dec 28 07:50:54 host sshd[3722]: input_userauth_request: invalid user dx [preauth] Dec 28 07:50:54 host sshd[3722]: pam_unix(sshd:auth): check pass; user unknown Dec 28 07:50:54 host sshd[3722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 28 07:50:55 host sshd[3722]: Failed password for invalid user dx from 45.93.201.90 port 47288 ssh2 Dec 28 07:50:59 host sshd[3722]: pam_unix(sshd:auth): check pass; user unknown Dec 28 07:51:00 host sshd[3722]: Failed password for invalid user dx from 45.93.201.90 port 47288 ssh2 Dec 28 07:51:03 host sshd[3722]: pam_unix(sshd:auth): check pass; user unknown Dec 28 07:51:05 host sshd[3722]: Failed password for invalid user dx from 45.93.201.90 port 47288 ssh2 Dec 28 07:51:08 host sshd[3722]: Connection closed by 45.93.201.90 port 47288 [preauth] Dec 28 07:51:08 host sshd[3722]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 28 08:00:46 host sshd[5527]: User root from 92.46.108.20 not allowed because not listed in AllowUsers Dec 28 08:00:46 host sshd[5527]: input_userauth_request: invalid user root [preauth] Dec 28 08:00:46 host unix_chkpwd[5532]: password check failed for user (root) Dec 28 08:00:46 host sshd[5527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 user=root Dec 28 08:00:46 host sshd[5527]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 08:00:48 host sshd[5527]: Failed password for invalid user root from 92.46.108.20 port 35944 ssh2 Dec 28 08:00:49 host sshd[5527]: Connection closed by 92.46.108.20 port 35944 [preauth] Dec 28 08:09:59 host sshd[7133]: User root from 106.10.122.53 not allowed because not listed in AllowUsers Dec 28 08:09:59 host sshd[7133]: input_userauth_request: invalid user root [preauth] Dec 28 08:09:59 host unix_chkpwd[7136]: password check failed for user (root) Dec 28 08:09:59 host sshd[7133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 user=root Dec 28 08:09:59 host sshd[7133]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 08:10:01 host sshd[7133]: Failed password for invalid user root from 106.10.122.53 port 36176 ssh2 Dec 28 08:10:01 host sshd[7133]: Connection closed by 106.10.122.53 port 36176 [preauth] Dec 28 08:11:15 host sshd[7423]: Invalid user ora_root from 103.13.40.2 port 40212 Dec 28 08:11:15 host sshd[7423]: input_userauth_request: invalid user ora_root [preauth] Dec 28 08:11:15 host sshd[7423]: pam_unix(sshd:auth): check pass; user unknown Dec 28 08:11:15 host sshd[7423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 28 08:11:16 host sshd[7423]: Failed password for invalid user ora_root from 103.13.40.2 port 40212 ssh2 Dec 28 08:11:16 host sshd[7423]: Connection closed by 103.13.40.2 port 40212 [preauth] Dec 28 08:13:24 host sshd[7767]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Dec 28 08:13:24 host sshd[7767]: input_userauth_request: invalid user root [preauth] Dec 28 08:13:24 host unix_chkpwd[7770]: password check failed for user (root) Dec 28 08:13:24 host sshd[7767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Dec 28 08:13:24 host sshd[7767]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 08:13:26 host sshd[7767]: Failed password for invalid user root from 162.218.126.136 port 56102 ssh2 Dec 28 08:13:26 host sshd[7767]: Connection closed by 162.218.126.136 port 56102 [preauth] Dec 28 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 28 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 28 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 28 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 28 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 28 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 28 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 08:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 08:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 28 08:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 08:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 08:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 28 08:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 08:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 28 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=wwwresourcehunte user-4=keralaholi user-5=wwwrmswll user-6=ugotscom user-7=cochintaxi user-8=wwwkaretakers user-9=a2zgroup user-10=dartsimp user-11=laundryboniface user-12=bonifacegroup user-13=wwwevmhonda user-14=wwwletsstalkfood user-15=straightcurve user-16=palco123 user-17=gifterman user-18=kottayamcalldriv user-19=phmetals user-20=wwwnexidigital user-21=mrsclean user-22=remysagr user-23=disposeat user-24=wwwkmaorg user-25=woodpeck user-26=wwwkapin user-27=vfmassets user-28=shalinijames user-29=wwwtestugo user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 28 08:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 28 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cI2ykme1iXpG5JP1.~ Dec 28 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cI2ykme1iXpG5JP1.~' Dec 28 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cI2ykme1iXpG5JP1.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 28 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 28 08:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 08:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 08:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 08:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 08:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 08:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 08:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 08:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 08:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 08:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 08:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 08:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 28 08:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 08:21:56 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 08:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 28 08:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 28 08:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 28 08:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 28 08:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 08:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 08:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 28 08:22:04 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 08:22:06 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 08:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 28 08:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 08:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 08:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 28 08:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 08:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 08:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 28 08:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 08:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 08:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 28 08:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 08:22:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 08:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 28 08:22:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 08:22:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 08:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 28 08:22:17 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 08:22:18 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 08:51:42 host sshd[14726]: User root from 185.151.32.7 not allowed because not listed in AllowUsers Dec 28 08:51:42 host sshd[14726]: input_userauth_request: invalid user root [preauth] Dec 28 08:51:42 host unix_chkpwd[14729]: password check failed for user (root) Dec 28 08:51:42 host sshd[14726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.151.32.7 user=root Dec 28 08:51:42 host sshd[14726]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 08:51:44 host sshd[14726]: Failed password for invalid user root from 185.151.32.7 port 50269 ssh2 Dec 28 08:51:44 host sshd[14726]: Received disconnect from 185.151.32.7 port 50269:11: Bye Bye [preauth] Dec 28 08:51:44 host sshd[14726]: Disconnected from 185.151.32.7 port 50269 [preauth] Dec 28 08:54:14 host sshd[15137]: Invalid user wh from 185.151.32.7 port 37996 Dec 28 08:54:14 host sshd[15137]: input_userauth_request: invalid user wh [preauth] Dec 28 08:54:14 host sshd[15137]: pam_unix(sshd:auth): check pass; user unknown Dec 28 08:54:14 host sshd[15137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.151.32.7 Dec 28 08:54:16 host sshd[15137]: Failed password for invalid user wh from 185.151.32.7 port 37996 ssh2 Dec 28 08:54:16 host sshd[15137]: Received disconnect from 185.151.32.7 port 37996:11: Bye Bye [preauth] Dec 28 08:54:16 host sshd[15137]: Disconnected from 185.151.32.7 port 37996 [preauth] Dec 28 08:56:48 host sshd[15658]: Did not receive identification string from 154.89.5.107 port 44924 Dec 28 08:57:02 host sshd[15659]: Connection closed by 154.89.5.107 port 45170 [preauth] Dec 28 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 28 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 28 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 28 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 28 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 28 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 28 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 28 09:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 09:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 09:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 28 09:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 09:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 09:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 09:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 09:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 09:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 28 09:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 09:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 09:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=laundryboniface user-4=dartsimp user-5=a2zgroup user-6=wwwpmcresource user-7=wwwrmswll user-8=wwwresourcehunte user-9=keralaholi user-10=ugotscom user-11=travelboniface user-12=woodpeck user-13=wwwkapin user-14=disposeat user-15=remysagr user-16=wwwkmaorg user-17=pmcresources user-18=vfmassets user-19=wwwtestugo user-20=shalinijames user-21=straightcurve user-22=wwwletsstalkfood user-23=bonifacegroup user-24=wwwevmhonda user-25=wwwnexidigital user-26=mrsclean user-27=gifterman user-28=palco123 user-29=kottayamcalldriv user-30=phmetals feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 28 09:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 28 09:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 09:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 09:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 09:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 09:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 09:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-aAFoVIhKcT7AN9KK.~ Dec 28 09:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 09:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 09:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-aAFoVIhKcT7AN9KK.~' Dec 28 09:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 09:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 09:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-aAFoVIhKcT7AN9KK.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 09:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 09:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 09:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 28 09:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 09:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 28 09:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 09:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 09:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 09:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 09:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 09:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 09:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 09:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 09:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 09:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 09:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 09:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 28 09:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 09:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 09:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 09:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 09:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 09:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 28 09:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 28 09:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 28 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 28 09:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 09:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 28 09:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 09:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 09:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 28 09:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 09:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 09:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 28 09:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 09:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 28 09:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 09:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 09:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 28 09:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 09:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 09:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 28 09:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 09:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 09:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 28 09:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 09:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 09:23:59 host sshd[20608]: User root from 41.197.31.178 not allowed because not listed in AllowUsers Dec 28 09:23:59 host sshd[20608]: input_userauth_request: invalid user root [preauth] Dec 28 09:23:59 host unix_chkpwd[20613]: password check failed for user (root) Dec 28 09:23:59 host sshd[20608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 user=root Dec 28 09:23:59 host sshd[20608]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 09:24:01 host sshd[20608]: Failed password for invalid user root from 41.197.31.178 port 34264 ssh2 Dec 28 09:24:02 host sshd[20608]: Connection closed by 41.197.31.178 port 34264 [preauth] Dec 28 09:24:05 host sshd[20635]: Invalid user liu from 162.218.126.136 port 41338 Dec 28 09:24:05 host sshd[20635]: input_userauth_request: invalid user liu [preauth] Dec 28 09:24:06 host sshd[20635]: pam_unix(sshd:auth): check pass; user unknown Dec 28 09:24:06 host sshd[20635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 28 09:24:07 host sshd[20635]: Failed password for invalid user liu from 162.218.126.136 port 41338 ssh2 Dec 28 09:24:08 host sshd[20635]: Connection closed by 162.218.126.136 port 41338 [preauth] Dec 28 09:34:54 host sshd[22476]: Invalid user dy from 45.93.201.90 port 34250 Dec 28 09:34:54 host sshd[22476]: input_userauth_request: invalid user dy [preauth] Dec 28 09:34:54 host sshd[22476]: pam_unix(sshd:auth): check pass; user unknown Dec 28 09:34:54 host sshd[22476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 28 09:34:56 host sshd[22476]: Failed password for invalid user dy from 45.93.201.90 port 34250 ssh2 Dec 28 09:34:59 host sshd[22476]: pam_unix(sshd:auth): check pass; user unknown Dec 28 09:35:01 host sshd[22476]: Failed password for invalid user dy from 45.93.201.90 port 34250 ssh2 Dec 28 09:35:04 host sshd[22476]: pam_unix(sshd:auth): check pass; user unknown Dec 28 09:35:06 host sshd[22476]: Failed password for invalid user dy from 45.93.201.90 port 34250 ssh2 Dec 28 09:35:09 host sshd[22476]: Connection closed by 45.93.201.90 port 34250 [preauth] Dec 28 09:35:09 host sshd[22476]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 28 09:38:33 host sshd[23193]: Invalid user lzh from 106.10.122.53 port 59388 Dec 28 09:38:33 host sshd[23193]: input_userauth_request: invalid user lzh [preauth] Dec 28 09:38:33 host sshd[23193]: pam_unix(sshd:auth): check pass; user unknown Dec 28 09:38:33 host sshd[23193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 28 09:38:35 host sshd[23193]: Failed password for invalid user lzh from 106.10.122.53 port 59388 ssh2 Dec 28 09:38:35 host sshd[23193]: Connection closed by 106.10.122.53 port 59388 [preauth] Dec 28 09:40:06 host sshd[23420]: User root from 103.13.40.2 not allowed because not listed in AllowUsers Dec 28 09:40:06 host sshd[23420]: input_userauth_request: invalid user root [preauth] Dec 28 09:40:06 host unix_chkpwd[23422]: password check failed for user (root) Dec 28 09:40:06 host sshd[23420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 user=root Dec 28 09:40:06 host sshd[23420]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 09:40:08 host sshd[23420]: Failed password for invalid user root from 103.13.40.2 port 59840 ssh2 Dec 28 09:40:08 host sshd[23420]: Connection closed by 103.13.40.2 port 59840 [preauth] Dec 28 09:50:01 host sshd[25031]: Did not receive identification string from 45.119.132.191 port 57715 Dec 28 09:52:31 host sshd[25384]: User tomcat from 157.245.199.134 not allowed because not listed in AllowUsers Dec 28 09:52:31 host sshd[25384]: input_userauth_request: invalid user tomcat [preauth] Dec 28 09:52:31 host unix_chkpwd[25386]: password check failed for user (tomcat) Dec 28 09:52:31 host sshd[25384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.199.134 user=tomcat Dec 28 09:52:31 host sshd[25384]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "tomcat" Dec 28 09:52:33 host sshd[25384]: Failed password for invalid user tomcat from 157.245.199.134 port 45932 ssh2 Dec 28 09:52:34 host sshd[25384]: Received disconnect from 157.245.199.134 port 45932:11: Bye Bye [preauth] Dec 28 09:52:34 host sshd[25384]: Disconnected from 157.245.199.134 port 45932 [preauth] Dec 28 09:57:38 host sshd[26224]: Invalid user ddos from 68.183.86.86 port 46334 Dec 28 09:57:38 host sshd[26224]: input_userauth_request: invalid user ddos [preauth] Dec 28 09:57:38 host sshd[26224]: pam_unix(sshd:auth): check pass; user unknown Dec 28 09:57:38 host sshd[26224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.86.86 Dec 28 09:57:39 host sshd[26224]: Failed password for invalid user ddos from 68.183.86.86 port 46334 ssh2 Dec 28 09:57:39 host sshd[26224]: Received disconnect from 68.183.86.86 port 46334:11: Bye Bye [preauth] Dec 28 09:57:39 host sshd[26224]: Disconnected from 68.183.86.86 port 46334 [preauth] Dec 28 09:58:14 host sshd[26313]: User root from 157.245.199.134 not allowed because not listed in AllowUsers Dec 28 09:58:14 host sshd[26313]: input_userauth_request: invalid user root [preauth] Dec 28 09:58:14 host unix_chkpwd[26316]: password check failed for user (root) Dec 28 09:58:14 host sshd[26313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.199.134 user=root Dec 28 09:58:14 host sshd[26313]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 09:58:15 host sshd[26313]: Failed password for invalid user root from 157.245.199.134 port 49708 ssh2 Dec 28 09:59:20 host sshd[26503]: Invalid user fe from 68.183.86.86 port 60400 Dec 28 09:59:20 host sshd[26503]: input_userauth_request: invalid user fe [preauth] Dec 28 09:59:20 host sshd[26503]: pam_unix(sshd:auth): check pass; user unknown Dec 28 09:59:20 host sshd[26503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.86.86 Dec 28 09:59:22 host sshd[26503]: Failed password for invalid user fe from 68.183.86.86 port 60400 ssh2 Dec 28 09:59:22 host sshd[26503]: Received disconnect from 68.183.86.86 port 60400:11: Bye Bye [preauth] Dec 28 09:59:22 host sshd[26503]: Disconnected from 68.183.86.86 port 60400 [preauth] Dec 28 10:00:46 host sshd[26756]: Invalid user administrator from 68.183.86.86 port 37478 Dec 28 10:00:46 host sshd[26756]: input_userauth_request: invalid user administrator [preauth] Dec 28 10:00:46 host sshd[26756]: pam_unix(sshd:auth): check pass; user unknown Dec 28 10:00:46 host sshd[26756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.86.86 Dec 28 10:00:48 host sshd[26756]: Failed password for invalid user administrator from 68.183.86.86 port 37478 ssh2 Dec 28 10:00:48 host sshd[26756]: Received disconnect from 68.183.86.86 port 37478:11: Bye Bye [preauth] Dec 28 10:00:48 host sshd[26756]: Disconnected from 68.183.86.86 port 37478 [preauth] Dec 28 10:14:20 host sshd[29139]: Invalid user from 80.94.92.41 port 41190 Dec 28 10:14:20 host sshd[29139]: input_userauth_request: invalid user [preauth] Dec 28 10:14:30 host sshd[29139]: Connection closed by 80.94.92.41 port 41190 [preauth] Dec 28 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 10:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 10:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 10:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 28 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 10:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 28 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 10:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 28 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 10:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 28 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 10:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 28 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 10:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 10:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 28 10:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 10:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 10:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 28 10:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 10:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 10:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 28 10:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 10:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 28 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=a2zgroup user-2=dartsimp user-3=laundryboniface user-4=wwwkaretakers user-5=cochintaxi user-6=travelboniface user-7=ugotscom user-8=keralaholi user-9=wwwresourcehunte user-10=wwwrmswll user-11=wwwpmcresource user-12=shalinijames user-13=wwwtestugo user-14=vfmassets user-15=pmcresources user-16=disposeat user-17=wwwkmaorg user-18=remysagr user-19=woodpeck user-20=wwwkapin user-21=phmetals user-22=kottayamcalldriv user-23=palco123 user-24=gifterman user-25=wwwnexidigital user-26=mrsclean user-27=wwwevmhonda user-28=bonifacegroup user-29=straightcurve user-30=wwwletsstalkfood feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 28 10:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 28 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-mLZCIoJP82pDwlmM.~ Dec 28 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-mLZCIoJP82pDwlmM.~' Dec 28 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-mLZCIoJP82pDwlmM.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 28 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 28 10:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 10:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 28 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 10:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 10:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 28 10:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 28 10:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 28 10:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 28 10:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 10:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 10:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 28 10:22:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 10:22:07 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 10:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 28 10:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 10:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 10:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 28 10:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 10:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 10:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 28 10:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 10:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 10:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 28 10:22:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 10:22:19 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 10:22:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 28 10:22:19 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 10:22:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 10:22:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 28 10:22:21 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 10:22:22 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 10:25:36 host sshd[31293]: Invalid user svn from 92.46.108.20 port 47388 Dec 28 10:25:36 host sshd[31293]: input_userauth_request: invalid user svn [preauth] Dec 28 10:25:37 host sshd[31293]: pam_unix(sshd:auth): check pass; user unknown Dec 28 10:25:37 host sshd[31293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 28 10:25:39 host sshd[31293]: Failed password for invalid user svn from 92.46.108.20 port 47388 ssh2 Dec 28 10:25:40 host sshd[31293]: Connection closed by 92.46.108.20 port 47388 [preauth] Dec 28 10:29:32 host sshd[31964]: Bad protocol version identification 'GET / HTTP/1.1' from 167.71.235.141 port 33286 Dec 28 10:30:07 host sshd[32001]: Connection closed by 167.71.235.141 port 34558 [preauth] Dec 28 10:34:30 host sshd[360]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Dec 28 10:34:30 host sshd[360]: input_userauth_request: invalid user root [preauth] Dec 28 10:34:31 host unix_chkpwd[365]: password check failed for user (root) Dec 28 10:34:31 host sshd[360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Dec 28 10:34:31 host sshd[360]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 10:34:33 host sshd[360]: Failed password for invalid user root from 162.218.126.136 port 42150 ssh2 Dec 28 10:34:33 host sshd[360]: Connection closed by 162.218.126.136 port 42150 [preauth] Dec 28 10:51:40 host sshd[3154]: Bad protocol version identification 'GET / HTTP/1.1' from 170.64.146.197 port 50292 Dec 28 10:52:12 host sshd[3188]: Connection closed by 170.64.146.197 port 51324 [preauth] Dec 28 10:57:58 host sshd[4203]: Did not receive identification string from 58.72.18.130 port 14677 Dec 28 11:06:57 host sshd[5885]: Invalid user zero from 106.10.122.53 port 58442 Dec 28 11:06:57 host sshd[5885]: input_userauth_request: invalid user zero [preauth] Dec 28 11:06:57 host sshd[5885]: pam_unix(sshd:auth): check pass; user unknown Dec 28 11:06:57 host sshd[5885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 28 11:07:00 host sshd[5885]: Failed password for invalid user zero from 106.10.122.53 port 58442 ssh2 Dec 28 11:07:00 host sshd[5885]: Connection closed by 106.10.122.53 port 58442 [preauth] Dec 28 11:08:01 host sshd[6046]: Invalid user nexus from 103.13.40.2 port 46774 Dec 28 11:08:01 host sshd[6046]: input_userauth_request: invalid user nexus [preauth] Dec 28 11:08:01 host sshd[6046]: pam_unix(sshd:auth): check pass; user unknown Dec 28 11:08:01 host sshd[6046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 28 11:08:03 host sshd[6046]: Failed password for invalid user nexus from 103.13.40.2 port 46774 ssh2 Dec 28 11:08:03 host sshd[6046]: Connection closed by 103.13.40.2 port 46774 [preauth] Dec 28 11:11:11 host sshd[6617]: Invalid user applprod from 41.197.31.178 port 49920 Dec 28 11:11:11 host sshd[6617]: input_userauth_request: invalid user applprod [preauth] Dec 28 11:11:11 host sshd[6617]: pam_unix(sshd:auth): check pass; user unknown Dec 28 11:11:11 host sshd[6617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 28 11:11:13 host sshd[6617]: Failed password for invalid user applprod from 41.197.31.178 port 49920 ssh2 Dec 28 11:11:13 host sshd[6617]: Connection closed by 41.197.31.178 port 49920 [preauth] Dec 28 11:20:41 host sshd[8462]: Invalid user dz from 45.93.201.90 port 50514 Dec 28 11:20:41 host sshd[8462]: input_userauth_request: invalid user dz [preauth] Dec 28 11:20:41 host sshd[8462]: pam_unix(sshd:auth): check pass; user unknown Dec 28 11:20:41 host sshd[8462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 28 11:20:42 host sshd[8462]: Failed password for invalid user dz from 45.93.201.90 port 50514 ssh2 Dec 28 11:20:45 host sshd[8462]: pam_unix(sshd:auth): check pass; user unknown Dec 28 11:20:47 host sshd[8462]: Failed password for invalid user dz from 45.93.201.90 port 50514 ssh2 Dec 28 11:20:51 host sshd[8462]: pam_unix(sshd:auth): check pass; user unknown Dec 28 11:20:52 host sshd[8462]: Failed password for invalid user dz from 45.93.201.90 port 50514 ssh2 Dec 28 11:20:56 host sshd[8462]: Connection closed by 45.93.201.90 port 50514 [preauth] Dec 28 11:20:56 host sshd[8462]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 28 11:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 11:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 11:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 11:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 11:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 11:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 11:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 11:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 11:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 11:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 28 11:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 11:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 11:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 28 11:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 11:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 11:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 28 11:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 11:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 11:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 28 11:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 11:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 11:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 28 11:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 11:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 11:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 28 11:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 11:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 11:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 28 11:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 11:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 11:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 28 11:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 11:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 28 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=ugotscom user-2=keralaholi user-3=wwwresourcehunte user-4=wwwrmswll user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=a2zgroup user-9=dartsimp user-10=wwwkaretakers user-11=cochintaxi user-12=mrsclean user-13=wwwnexidigital user-14=phmetals user-15=kottayamcalldriv user-16=palco123 user-17=gifterman user-18=wwwletsstalkfood user-19=straightcurve user-20=wwwevmhonda user-21=bonifacegroup user-22=pmcresources user-23=shalinijames user-24=wwwtestugo user-25=vfmassets user-26=wwwkapin user-27=woodpeck user-28=disposeat user-29=wwwkmaorg user-30=remysagr feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 28 11:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 28 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PgJ2JTTljJGmipom.~ Dec 28 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PgJ2JTTljJGmipom.~' Dec 28 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PgJ2JTTljJGmipom.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 28 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 28 11:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 11:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 11:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 11:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 11:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 11:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 11:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 11:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 11:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 28 11:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 11:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 11:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 11:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 11:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 11:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 28 11:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 28 11:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 28 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 28 11:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 11:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 28 11:21:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 11:21:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 11:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 28 11:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 11:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 11:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 28 11:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 11:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 11:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 28 11:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 11:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 11:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 28 11:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 11:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 11:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 28 11:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 11:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 11:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 28 11:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 11:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 11:45:04 host sshd[13112]: Invalid user user1 from 162.218.126.136 port 58114 Dec 28 11:45:04 host sshd[13112]: input_userauth_request: invalid user user1 [preauth] Dec 28 11:45:05 host sshd[13112]: pam_unix(sshd:auth): check pass; user unknown Dec 28 11:45:05 host sshd[13112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 28 11:45:06 host sshd[13112]: Failed password for invalid user user1 from 162.218.126.136 port 58114 ssh2 Dec 28 11:45:06 host sshd[13112]: Connection closed by 162.218.126.136 port 58114 [preauth] Dec 28 11:49:38 host sshd[13863]: Invalid user donald from 107.189.30.59 port 46700 Dec 28 11:49:38 host sshd[13863]: input_userauth_request: invalid user donald [preauth] Dec 28 11:49:38 host sshd[13863]: pam_unix(sshd:auth): check pass; user unknown Dec 28 11:49:38 host sshd[13863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Dec 28 11:49:39 host sshd[13863]: Failed password for invalid user donald from 107.189.30.59 port 46700 ssh2 Dec 28 11:49:40 host sshd[13863]: Connection closed by 107.189.30.59 port 46700 [preauth] Dec 28 12:05:59 host sshd[17541]: Connection closed by 177.152.35.27 port 51850 [preauth] Dec 28 12:15:40 host sshd[19480]: Connection closed by 172.104.11.46 port 5570 [preauth] Dec 28 12:15:42 host sshd[19484]: Connection closed by 172.104.11.46 port 5580 [preauth] Dec 28 12:15:44 host sshd[19488]: Connection closed by 172.104.11.46 port 5590 [preauth] Dec 28 12:20:14 host sshd[20264]: User root from 51.250.75.17 not allowed because not listed in AllowUsers Dec 28 12:20:14 host sshd[20264]: input_userauth_request: invalid user root [preauth] Dec 28 12:20:14 host unix_chkpwd[20267]: password check failed for user (root) Dec 28 12:20:14 host sshd[20264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.75.17 user=root Dec 28 12:20:14 host sshd[20264]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 12:20:16 host sshd[20264]: Failed password for invalid user root from 51.250.75.17 port 58242 ssh2 Dec 28 12:20:16 host sshd[20264]: Received disconnect from 51.250.75.17 port 58242:11: Bye Bye [preauth] Dec 28 12:20:16 host sshd[20264]: Disconnected from 51.250.75.17 port 58242 [preauth] Dec 28 12:20:55 host sshd[20342]: User root from 159.223.196.187 not allowed because not listed in AllowUsers Dec 28 12:20:55 host sshd[20342]: input_userauth_request: invalid user root [preauth] Dec 28 12:20:55 host unix_chkpwd[20345]: password check failed for user (root) Dec 28 12:20:55 host sshd[20342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.196.187 user=root Dec 28 12:20:55 host sshd[20342]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 12:20:57 host sshd[20342]: Failed password for invalid user root from 159.223.196.187 port 36480 ssh2 Dec 28 12:20:58 host sshd[20342]: Received disconnect from 159.223.196.187 port 36480:11: Bye Bye [preauth] Dec 28 12:20:58 host sshd[20342]: Disconnected from 159.223.196.187 port 36480 [preauth] Dec 28 12:21:41 host sshd[20466]: User root from 15.204.209.194 not allowed because not listed in AllowUsers Dec 28 12:21:41 host sshd[20466]: input_userauth_request: invalid user root [preauth] Dec 28 12:21:41 host unix_chkpwd[20472]: password check failed for user (root) Dec 28 12:21:41 host sshd[20466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=15.204.209.194 user=root Dec 28 12:21:41 host sshd[20466]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 12:21:43 host sshd[20466]: Failed password for invalid user root from 15.204.209.194 port 50308 ssh2 Dec 28 12:21:44 host sshd[20466]: Received disconnect from 15.204.209.194 port 50308:11: Bye Bye [preauth] Dec 28 12:21:44 host sshd[20466]: Disconnected from 15.204.209.194 port 50308 [preauth] Dec 28 12:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 12:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 12:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 12:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 12:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 12:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 12:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 12:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 12:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 12:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 28 12:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 12:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 12:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 28 12:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 12:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 12:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 28 12:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 12:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 12:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 28 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 28 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 28 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 28 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 28 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 12:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 12:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 12:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 12:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 28 12:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwevmhonda user-2=bonifacegroup user-3=wwwletsstalkfood user-4=straightcurve user-5=kottayamcalldriv user-6=phmetals user-7=gifterman user-8=palco123 user-9=mrsclean user-10=wwwnexidigital user-11=wwwkmaorg user-12=disposeat user-13=remysagr user-14=wwwkapin user-15=woodpeck user-16=wwwtestugo user-17=shalinijames user-18=vfmassets user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=ugotscom user-23=wwwrmswll user-24=wwwresourcehunte user-25=keralaholi user-26=wwwkaretakers user-27=cochintaxi user-28=dartsimp user-29=a2zgroup user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 28 12:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 28 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-J29FcDGruhhccnyp.~ Dec 28 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-J29FcDGruhhccnyp.~' Dec 28 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-J29FcDGruhhccnyp.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 28 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 28 12:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 12:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 12:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 12:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 12:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 12:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 12:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 12:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 12:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 12:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 12:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 12:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 28 12:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 12:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 12:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 12:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 28 12:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 28 12:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 28 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 28 12:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 12:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 28 12:21:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 12:22:00 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 12:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 28 12:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 12:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 12:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 28 12:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 12:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 12:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 28 12:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 12:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 12:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 28 12:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 12:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 12:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 28 12:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 12:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 12:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 28 12:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 12:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 12:23:21 host sshd[20907]: User root from 212.109.207.62 not allowed because not listed in AllowUsers Dec 28 12:23:21 host sshd[20907]: input_userauth_request: invalid user root [preauth] Dec 28 12:23:21 host unix_chkpwd[20914]: password check failed for user (root) Dec 28 12:23:21 host sshd[20907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.109.207.62 user=root Dec 28 12:23:21 host sshd[20907]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 12:23:23 host sshd[20907]: Failed password for invalid user root from 212.109.207.62 port 41712 ssh2 Dec 28 12:23:24 host sshd[20907]: Received disconnect from 212.109.207.62 port 41712:11: Bye Bye [preauth] Dec 28 12:23:24 host sshd[20907]: Disconnected from 212.109.207.62 port 41712 [preauth] Dec 28 12:23:37 host sshd[21040]: User root from 211.125.67.35 not allowed because not listed in AllowUsers Dec 28 12:23:37 host sshd[21040]: input_userauth_request: invalid user root [preauth] Dec 28 12:23:37 host unix_chkpwd[21043]: password check failed for user (root) Dec 28 12:23:37 host sshd[21040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.125.67.35 user=root Dec 28 12:23:37 host sshd[21040]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 12:23:38 host sshd[21051]: User root from 8.213.197.220 not allowed because not listed in AllowUsers Dec 28 12:23:38 host sshd[21051]: input_userauth_request: invalid user root [preauth] Dec 28 12:23:38 host unix_chkpwd[21073]: password check failed for user (root) Dec 28 12:23:38 host sshd[21051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.213.197.220 user=root Dec 28 12:23:38 host sshd[21051]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 12:23:39 host sshd[21040]: Failed password for invalid user root from 211.125.67.35 port 37508 ssh2 Dec 28 12:23:39 host sshd[21040]: Received disconnect from 211.125.67.35 port 37508:11: Bye Bye [preauth] Dec 28 12:23:39 host sshd[21040]: Disconnected from 211.125.67.35 port 37508 [preauth] Dec 28 12:23:39 host sshd[21051]: Failed password for invalid user root from 8.213.197.220 port 36358 ssh2 Dec 28 12:23:40 host sshd[21051]: Received disconnect from 8.213.197.220 port 36358:11: Bye Bye [preauth] Dec 28 12:23:40 host sshd[21051]: Disconnected from 8.213.197.220 port 36358 [preauth] Dec 28 12:24:01 host sshd[21142]: User root from 197.188.144.58 not allowed because not listed in AllowUsers Dec 28 12:24:01 host sshd[21142]: input_userauth_request: invalid user root [preauth] Dec 28 12:24:01 host unix_chkpwd[21148]: password check failed for user (root) Dec 28 12:24:01 host sshd[21142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.188.144.58 user=root Dec 28 12:24:01 host sshd[21142]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 12:24:03 host sshd[21142]: Failed password for invalid user root from 197.188.144.58 port 42610 ssh2 Dec 28 12:24:03 host sshd[21142]: Received disconnect from 197.188.144.58 port 42610:11: Bye Bye [preauth] Dec 28 12:24:03 host sshd[21142]: Disconnected from 197.188.144.58 port 42610 [preauth] Dec 28 12:24:33 host sshd[21234]: User root from 51.250.75.17 not allowed because not listed in AllowUsers Dec 28 12:24:33 host sshd[21234]: input_userauth_request: invalid user root [preauth] Dec 28 12:24:33 host unix_chkpwd[21242]: password check failed for user (root) Dec 28 12:24:33 host sshd[21234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.75.17 user=root Dec 28 12:24:33 host sshd[21234]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 12:24:35 host sshd[21234]: Failed password for invalid user root from 51.250.75.17 port 51534 ssh2 Dec 28 12:24:35 host sshd[21234]: Received disconnect from 51.250.75.17 port 51534:11: Bye Bye [preauth] Dec 28 12:24:35 host sshd[21234]: Disconnected from 51.250.75.17 port 51534 [preauth] Dec 28 12:24:39 host sshd[21288]: User root from 15.204.209.194 not allowed because not listed in AllowUsers Dec 28 12:24:39 host sshd[21288]: input_userauth_request: invalid user root [preauth] Dec 28 12:24:39 host unix_chkpwd[21293]: password check failed for user (root) Dec 28 12:24:39 host sshd[21288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=15.204.209.194 user=root Dec 28 12:24:39 host sshd[21288]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 12:24:40 host sshd[21291]: User root from 159.223.196.187 not allowed because not listed in AllowUsers Dec 28 12:24:40 host sshd[21291]: input_userauth_request: invalid user root [preauth] Dec 28 12:24:40 host unix_chkpwd[21295]: password check failed for user (root) Dec 28 12:24:40 host sshd[21291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.196.187 user=root Dec 28 12:24:40 host sshd[21291]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 12:24:41 host sshd[21291]: Failed password for invalid user root from 159.223.196.187 port 54618 ssh2 Dec 28 12:24:41 host sshd[21288]: Failed password for invalid user root from 15.204.209.194 port 45152 ssh2 Dec 28 12:24:41 host sshd[21291]: Received disconnect from 159.223.196.187 port 54618:11: Bye Bye [preauth] Dec 28 12:24:41 host sshd[21291]: Disconnected from 159.223.196.187 port 54618 [preauth] Dec 28 12:24:41 host sshd[21288]: Received disconnect from 15.204.209.194 port 45152:11: Bye Bye [preauth] Dec 28 12:24:41 host sshd[21288]: Disconnected from 15.204.209.194 port 45152 [preauth] Dec 28 12:25:43 host sshd[21560]: User root from 193.122.125.5 not allowed because not listed in AllowUsers Dec 28 12:25:43 host sshd[21560]: input_userauth_request: invalid user root [preauth] Dec 28 12:25:43 host unix_chkpwd[21564]: password check failed for user (root) Dec 28 12:25:43 host sshd[21560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.125.5 user=root Dec 28 12:25:43 host sshd[21560]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 12:25:45 host sshd[21560]: Failed password for invalid user root from 193.122.125.5 port 40442 ssh2 Dec 28 12:25:45 host sshd[21560]: Received disconnect from 193.122.125.5 port 40442:11: Bye Bye [preauth] Dec 28 12:25:45 host sshd[21560]: Disconnected from 193.122.125.5 port 40442 [preauth] Dec 28 12:25:50 host sshd[21575]: User root from 212.109.207.62 not allowed because not listed in AllowUsers Dec 28 12:25:50 host sshd[21575]: input_userauth_request: invalid user root [preauth] Dec 28 12:25:50 host unix_chkpwd[21578]: password check failed for user (root) Dec 28 12:25:50 host sshd[21575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.109.207.62 user=root Dec 28 12:25:50 host sshd[21575]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 12:25:52 host sshd[21575]: Failed password for invalid user root from 212.109.207.62 port 45546 ssh2 Dec 28 12:25:52 host sshd[21575]: Received disconnect from 212.109.207.62 port 45546:11: Bye Bye [preauth] Dec 28 12:25:52 host sshd[21575]: Disconnected from 212.109.207.62 port 45546 [preauth] Dec 28 12:25:53 host sshd[21590]: User root from 211.125.67.35 not allowed because not listed in AllowUsers Dec 28 12:25:53 host sshd[21590]: input_userauth_request: invalid user root [preauth] Dec 28 12:25:53 host unix_chkpwd[21618]: password check failed for user (root) Dec 28 12:25:53 host sshd[21590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.125.67.35 user=root Dec 28 12:25:53 host sshd[21590]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 12:25:55 host sshd[21590]: Failed password for invalid user root from 211.125.67.35 port 39177 ssh2 Dec 28 12:25:55 host sshd[21590]: Received disconnect from 211.125.67.35 port 39177:11: Bye Bye [preauth] Dec 28 12:25:55 host sshd[21590]: Disconnected from 211.125.67.35 port 39177 [preauth] Dec 28 12:26:11 host sshd[21706]: User root from 8.213.197.220 not allowed because not listed in AllowUsers Dec 28 12:26:11 host sshd[21706]: input_userauth_request: invalid user root [preauth] Dec 28 12:26:12 host unix_chkpwd[21712]: password check failed for user (root) Dec 28 12:26:12 host sshd[21706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.213.197.220 user=root Dec 28 12:26:12 host sshd[21706]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 12:26:13 host sshd[21706]: Failed password for invalid user root from 8.213.197.220 port 41912 ssh2 Dec 28 12:26:14 host sshd[21706]: Received disconnect from 8.213.197.220 port 41912:11: Bye Bye [preauth] Dec 28 12:26:14 host sshd[21706]: Disconnected from 8.213.197.220 port 41912 [preauth] Dec 28 12:28:04 host sshd[22069]: User root from 103.147.4.187 not allowed because not listed in AllowUsers Dec 28 12:28:04 host sshd[22069]: input_userauth_request: invalid user root [preauth] Dec 28 12:28:04 host unix_chkpwd[22098]: password check failed for user (root) Dec 28 12:28:04 host sshd[22069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.4.187 user=root Dec 28 12:28:04 host sshd[22069]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 12:28:06 host sshd[22069]: Failed password for invalid user root from 103.147.4.187 port 42474 ssh2 Dec 28 12:28:07 host sshd[22069]: Received disconnect from 103.147.4.187 port 42474:11: Bye Bye [preauth] Dec 28 12:28:07 host sshd[22069]: Disconnected from 103.147.4.187 port 42474 [preauth] Dec 28 12:33:50 host sshd[23135]: User root from 103.147.4.187 not allowed because not listed in AllowUsers Dec 28 12:33:50 host sshd[23135]: input_userauth_request: invalid user root [preauth] Dec 28 12:33:50 host unix_chkpwd[23145]: password check failed for user (root) Dec 28 12:33:50 host sshd[23135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.4.187 user=root Dec 28 12:33:50 host sshd[23135]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 12:33:52 host sshd[23135]: Failed password for invalid user root from 103.147.4.187 port 55180 ssh2 Dec 28 12:33:55 host sshd[23170]: User root from 197.188.144.58 not allowed because not listed in AllowUsers Dec 28 12:33:55 host sshd[23170]: input_userauth_request: invalid user root [preauth] Dec 28 12:33:55 host unix_chkpwd[23202]: password check failed for user (root) Dec 28 12:33:55 host sshd[23170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.188.144.58 user=root Dec 28 12:33:55 host sshd[23170]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 12:33:57 host sshd[23170]: Failed password for invalid user root from 197.188.144.58 port 55464 ssh2 Dec 28 12:35:36 host sshd[23498]: Invalid user lenovo from 106.10.122.53 port 57232 Dec 28 12:35:36 host sshd[23498]: input_userauth_request: invalid user lenovo [preauth] Dec 28 12:35:36 host sshd[23498]: pam_unix(sshd:auth): check pass; user unknown Dec 28 12:35:36 host sshd[23498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 28 12:35:38 host sshd[23498]: Failed password for invalid user lenovo from 106.10.122.53 port 57232 ssh2 Dec 28 12:35:38 host sshd[23498]: Connection closed by 106.10.122.53 port 57232 [preauth] Dec 28 12:36:34 host sshd[23641]: User root from 103.13.40.2 not allowed because not listed in AllowUsers Dec 28 12:36:34 host sshd[23641]: input_userauth_request: invalid user root [preauth] Dec 28 12:36:34 host unix_chkpwd[23643]: password check failed for user (root) Dec 28 12:36:34 host sshd[23641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 user=root Dec 28 12:36:34 host sshd[23641]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 12:36:37 host sshd[23641]: Failed password for invalid user root from 103.13.40.2 port 36254 ssh2 Dec 28 12:36:37 host sshd[23641]: Connection closed by 103.13.40.2 port 36254 [preauth] Dec 28 12:38:23 host sshd[23970]: User root from 193.122.125.5 not allowed because not listed in AllowUsers Dec 28 12:38:23 host sshd[23970]: input_userauth_request: invalid user root [preauth] Dec 28 12:38:23 host unix_chkpwd[23973]: password check failed for user (root) Dec 28 12:38:23 host sshd[23970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.125.5 user=root Dec 28 12:38:23 host sshd[23970]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 12:38:25 host sshd[23970]: Failed password for invalid user root from 193.122.125.5 port 36972 ssh2 Dec 28 12:38:25 host sshd[23970]: Received disconnect from 193.122.125.5 port 36972:11: Bye Bye [preauth] Dec 28 12:38:25 host sshd[23970]: Disconnected from 193.122.125.5 port 36972 [preauth] Dec 28 12:43:10 host sshd[24681]: Did not receive identification string from 103.134.17.5 port 53871 Dec 28 12:43:33 host sshd[24844]: User root from 191.81.141.237 not allowed because not listed in AllowUsers Dec 28 12:43:33 host sshd[24844]: input_userauth_request: invalid user root [preauth] Dec 28 12:43:33 host unix_chkpwd[24851]: password check failed for user (root) Dec 28 12:43:33 host sshd[24844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.81.141.237 user=root Dec 28 12:43:33 host sshd[24844]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 12:43:35 host sshd[24844]: Failed password for invalid user root from 191.81.141.237 port 38342 ssh2 Dec 28 12:43:35 host sshd[24844]: Received disconnect from 191.81.141.237 port 38342:11: Bye Bye [preauth] Dec 28 12:43:35 host sshd[24844]: Disconnected from 191.81.141.237 port 38342 [preauth] Dec 28 12:48:38 host sshd[25588]: User root from 191.81.141.237 not allowed because not listed in AllowUsers Dec 28 12:48:38 host sshd[25588]: input_userauth_request: invalid user root [preauth] Dec 28 12:48:38 host unix_chkpwd[25593]: password check failed for user (root) Dec 28 12:48:38 host sshd[25588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.81.141.237 user=root Dec 28 12:48:38 host sshd[25588]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 12:48:40 host sshd[25588]: Failed password for invalid user root from 191.81.141.237 port 52944 ssh2 Dec 28 12:48:40 host sshd[25588]: Received disconnect from 191.81.141.237 port 52944:11: Bye Bye [preauth] Dec 28 12:48:40 host sshd[25588]: Disconnected from 191.81.141.237 port 52944 [preauth] Dec 28 12:52:41 host sshd[26332]: Invalid user fuying from 92.46.108.20 port 56326 Dec 28 12:52:41 host sshd[26332]: input_userauth_request: invalid user fuying [preauth] Dec 28 12:52:41 host sshd[26332]: pam_unix(sshd:auth): check pass; user unknown Dec 28 12:52:41 host sshd[26332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 28 12:52:44 host sshd[26332]: Failed password for invalid user fuying from 92.46.108.20 port 56326 ssh2 Dec 28 12:52:44 host sshd[26332]: Connection closed by 92.46.108.20 port 56326 [preauth] Dec 28 12:55:48 host sshd[26827]: Invalid user pengfan from 162.218.126.136 port 58180 Dec 28 12:55:48 host sshd[26827]: input_userauth_request: invalid user pengfan [preauth] Dec 28 12:55:49 host sshd[26827]: pam_unix(sshd:auth): check pass; user unknown Dec 28 12:55:49 host sshd[26827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 28 12:55:50 host sshd[26827]: Failed password for invalid user pengfan from 162.218.126.136 port 58180 ssh2 Dec 28 12:55:50 host sshd[26827]: Connection closed by 162.218.126.136 port 58180 [preauth] Dec 28 13:01:07 host sshd[27921]: User root from 41.197.31.178 not allowed because not listed in AllowUsers Dec 28 13:01:07 host sshd[27921]: input_userauth_request: invalid user root [preauth] Dec 28 13:01:07 host unix_chkpwd[27924]: password check failed for user (root) Dec 28 13:01:07 host sshd[27921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 user=root Dec 28 13:01:07 host sshd[27921]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 13:01:09 host sshd[27921]: Failed password for invalid user root from 41.197.31.178 port 40038 ssh2 Dec 28 13:01:09 host sshd[27921]: Connection closed by 41.197.31.178 port 40038 [preauth] Dec 28 13:04:24 host sshd[28468]: User root from 51.178.90.17 not allowed because not listed in AllowUsers Dec 28 13:04:24 host sshd[28468]: input_userauth_request: invalid user root [preauth] Dec 28 13:04:24 host unix_chkpwd[28471]: password check failed for user (root) Dec 28 13:04:24 host sshd[28468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.90.17 user=root Dec 28 13:04:24 host sshd[28468]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 13:04:26 host sshd[28468]: Failed password for invalid user root from 51.178.90.17 port 46114 ssh2 Dec 28 13:04:26 host sshd[28468]: Received disconnect from 51.178.90.17 port 46114:11: Bye Bye [preauth] Dec 28 13:04:26 host sshd[28468]: Disconnected from 51.178.90.17 port 46114 [preauth] Dec 28 13:04:50 host sshd[28527]: Invalid user e from 45.93.201.90 port 57026 Dec 28 13:04:50 host sshd[28527]: input_userauth_request: invalid user e [preauth] Dec 28 13:04:50 host sshd[28527]: pam_unix(sshd:auth): check pass; user unknown Dec 28 13:04:50 host sshd[28527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 28 13:04:52 host sshd[28527]: Failed password for invalid user e from 45.93.201.90 port 57026 ssh2 Dec 28 13:04:55 host sshd[28527]: pam_unix(sshd:auth): check pass; user unknown Dec 28 13:04:58 host sshd[28527]: Failed password for invalid user e from 45.93.201.90 port 57026 ssh2 Dec 28 13:05:01 host sshd[28527]: pam_unix(sshd:auth): check pass; user unknown Dec 28 13:05:03 host sshd[28527]: Failed password for invalid user e from 45.93.201.90 port 57026 ssh2 Dec 28 13:05:07 host sshd[28527]: Connection closed by 45.93.201.90 port 57026 [preauth] Dec 28 13:05:07 host sshd[28527]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 28 13:08:53 host sshd[29227]: User root from 182.74.86.27 not allowed because not listed in AllowUsers Dec 28 13:08:53 host sshd[29227]: input_userauth_request: invalid user root [preauth] Dec 28 13:08:53 host unix_chkpwd[29229]: password check failed for user (root) Dec 28 13:08:53 host sshd[29227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.74.86.27 user=root Dec 28 13:08:53 host sshd[29227]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 13:08:55 host sshd[29227]: Failed password for invalid user root from 182.74.86.27 port 58432 ssh2 Dec 28 13:08:55 host sshd[29227]: Received disconnect from 182.74.86.27 port 58432:11: Bye Bye [preauth] Dec 28 13:08:55 host sshd[29227]: Disconnected from 182.74.86.27 port 58432 [preauth] Dec 28 13:09:34 host sshd[29357]: User root from 51.178.90.17 not allowed because not listed in AllowUsers Dec 28 13:09:34 host sshd[29357]: input_userauth_request: invalid user root [preauth] Dec 28 13:09:34 host unix_chkpwd[29360]: password check failed for user (root) Dec 28 13:09:34 host sshd[29357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.90.17 user=root Dec 28 13:09:34 host sshd[29357]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 13:09:36 host sshd[29357]: Failed password for invalid user root from 51.178.90.17 port 53030 ssh2 Dec 28 13:11:16 host sshd[29657]: User root from 182.74.86.27 not allowed because not listed in AllowUsers Dec 28 13:11:16 host sshd[29657]: input_userauth_request: invalid user root [preauth] Dec 28 13:11:16 host unix_chkpwd[29659]: password check failed for user (root) Dec 28 13:11:16 host sshd[29657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.74.86.27 user=root Dec 28 13:11:16 host sshd[29657]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 13:11:18 host sshd[29657]: Failed password for invalid user root from 182.74.86.27 port 59922 ssh2 Dec 28 13:11:18 host sshd[29657]: Received disconnect from 182.74.86.27 port 59922:11: Bye Bye [preauth] Dec 28 13:11:18 host sshd[29657]: Disconnected from 182.74.86.27 port 59922 [preauth] Dec 28 13:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 13:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 13:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 13:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 13:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 13:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 13:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 13:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 13:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 13:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 28 13:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 13:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 13:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 28 13:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 13:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 13:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 28 13:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 13:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 13:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 28 13:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 13:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 13:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 28 13:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 13:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 13:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 28 13:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 13:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 13:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 28 13:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 13:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 13:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 28 13:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 13:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 13:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 13:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 13:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 13:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 28 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkmaorg user-2=disposeat user-3=remysagr user-4=wwwkapin user-5=woodpeck user-6=vfmassets user-7=shalinijames user-8=wwwtestugo user-9=pmcresources user-10=bonifacegroup user-11=wwwevmhonda user-12=wwwletsstalkfood user-13=straightcurve user-14=palco123 user-15=gifterman user-16=kottayamcalldriv user-17=phmetals user-18=wwwnexidigital user-19=mrsclean user-20=wwwkaretakers user-21=cochintaxi user-22=a2zgroup user-23=dartsimp user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=keralaholi user-28=wwwresourcehunte user-29=wwwrmswll user-30=ugotscom feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 28 13:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 28 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-X7ETAeRNHL6uirl4.~ Dec 28 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-X7ETAeRNHL6uirl4.~' Dec 28 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-X7ETAeRNHL6uirl4.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 28 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 28 13:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 13:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 28 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 13:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 13:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 13:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 13:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 28 13:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 28 13:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 28 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 28 13:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 13:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 28 13:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 13:21:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 13:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 28 13:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 13:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 13:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 28 13:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 13:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 13:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 28 13:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 13:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 13:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 28 13:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 13:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 13:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 28 13:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 13:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 13:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 28 13:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 13:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 13:40:05 host sshd[2487]: Invalid user from 64.62.197.201 port 28301 Dec 28 13:40:05 host sshd[2487]: input_userauth_request: invalid user [preauth] Dec 28 13:40:08 host sshd[2487]: Connection closed by 64.62.197.201 port 28301 [preauth] Dec 28 14:04:20 host sshd[6806]: Invalid user wanghao from 106.10.122.53 port 51276 Dec 28 14:04:20 host sshd[6806]: input_userauth_request: invalid user wanghao [preauth] Dec 28 14:04:20 host sshd[6806]: pam_unix(sshd:auth): check pass; user unknown Dec 28 14:04:20 host sshd[6806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 28 14:04:22 host sshd[6806]: Failed password for invalid user wanghao from 106.10.122.53 port 51276 ssh2 Dec 28 14:04:22 host sshd[6806]: Connection closed by 106.10.122.53 port 51276 [preauth] Dec 28 14:05:29 host sshd[6982]: Invalid user user1 from 103.13.40.2 port 55616 Dec 28 14:05:29 host sshd[6982]: input_userauth_request: invalid user user1 [preauth] Dec 28 14:05:29 host sshd[6982]: pam_unix(sshd:auth): check pass; user unknown Dec 28 14:05:29 host sshd[6982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 28 14:05:31 host sshd[6982]: Failed password for invalid user user1 from 103.13.40.2 port 55616 ssh2 Dec 28 14:05:31 host sshd[6982]: Connection closed by 103.13.40.2 port 55616 [preauth] Dec 28 14:07:35 host sshd[7388]: Invalid user lsy from 162.218.126.136 port 52116 Dec 28 14:07:35 host sshd[7388]: input_userauth_request: invalid user lsy [preauth] Dec 28 14:07:35 host sshd[7388]: pam_unix(sshd:auth): check pass; user unknown Dec 28 14:07:35 host sshd[7388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 28 14:07:37 host sshd[7388]: Failed password for invalid user lsy from 162.218.126.136 port 52116 ssh2 Dec 28 14:07:37 host sshd[7388]: Connection closed by 162.218.126.136 port 52116 [preauth] Dec 28 14:08:11 host sshd[7461]: User root from 181.23.114.44 not allowed because not listed in AllowUsers Dec 28 14:08:11 host sshd[7461]: input_userauth_request: invalid user root [preauth] Dec 28 14:08:11 host unix_chkpwd[7469]: password check failed for user (root) Dec 28 14:08:11 host sshd[7461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.23.114.44 user=root Dec 28 14:08:11 host sshd[7461]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 14:08:13 host sshd[7461]: Failed password for invalid user root from 181.23.114.44 port 39897 ssh2 Dec 28 14:08:13 host sshd[7461]: Received disconnect from 181.23.114.44 port 39897:11: Bye Bye [preauth] Dec 28 14:08:13 host sshd[7461]: Disconnected from 181.23.114.44 port 39897 [preauth] Dec 28 14:11:54 host sshd[8162]: User root from 181.23.114.44 not allowed because not listed in AllowUsers Dec 28 14:11:54 host sshd[8162]: input_userauth_request: invalid user root [preauth] Dec 28 14:11:54 host unix_chkpwd[8168]: password check failed for user (root) Dec 28 14:11:54 host sshd[8162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.23.114.44 user=root Dec 28 14:11:54 host sshd[8162]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 14:11:56 host sshd[8162]: Failed password for invalid user root from 181.23.114.44 port 40873 ssh2 Dec 28 14:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 14:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 14:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 14:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 14:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 14:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 14:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 14:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 14:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 14:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 28 14:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 14:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 14:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 28 14:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 14:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 14:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 28 14:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 14:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 14:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 28 14:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 14:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 14:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 28 14:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 14:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 14:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 28 14:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 14:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 14:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 28 14:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 14:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 14:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 28 14:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 14:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 14:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 14:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 14:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 14:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 28 14:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 14:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 14:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=shalinijames user-3=wwwtestugo user-4=vfmassets user-5=wwwkapin user-6=woodpeck user-7=disposeat user-8=wwwkmaorg user-9=remysagr user-10=wwwnexidigital user-11=mrsclean user-12=kottayamcalldriv user-13=phmetals user-14=palco123 user-15=gifterman user-16=wwwletsstalkfood user-17=straightcurve user-18=wwwevmhonda user-19=bonifacegroup user-20=laundryboniface user-21=a2zgroup user-22=dartsimp user-23=cochintaxi user-24=wwwkaretakers user-25=ugotscom user-26=wwwresourcehunte user-27=keralaholi user-28=wwwrmswll user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 28 14:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 28 14:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 14:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 14:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 14:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 14:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 14:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PphHSNdwRtiYcu44.~ Dec 28 14:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 14:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 14:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PphHSNdwRtiYcu44.~' Dec 28 14:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 14:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PphHSNdwRtiYcu44.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 28 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 28 14:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 14:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 28 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 14:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 14:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 28 14:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 28 14:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 28 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 28 14:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 14:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 14:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 28 14:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 14:21:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 14:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 28 14:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 14:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 28 14:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 14:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 14:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 28 14:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 14:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 14:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 28 14:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 14:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 14:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 28 14:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 14:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 14:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 28 14:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 14:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 14:32:14 host sshd[12063]: Invalid user admin from 112.167.228.121 port 47756 Dec 28 14:32:14 host sshd[12063]: input_userauth_request: invalid user admin [preauth] Dec 28 14:32:14 host sshd[12063]: pam_unix(sshd:auth): check pass; user unknown Dec 28 14:32:14 host sshd[12063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.167.228.121 Dec 28 14:32:16 host sshd[12063]: Failed password for invalid user admin from 112.167.228.121 port 47756 ssh2 Dec 28 14:32:17 host sshd[12063]: Connection closed by 112.167.228.121 port 47756 [preauth] Dec 28 14:40:16 host sshd[13358]: Invalid user sales from 189.50.42.132 port 56932 Dec 28 14:40:16 host sshd[13358]: input_userauth_request: invalid user sales [preauth] Dec 28 14:40:16 host sshd[13358]: pam_unix(sshd:auth): check pass; user unknown Dec 28 14:40:16 host sshd[13358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.50.42.132 Dec 28 14:40:18 host sshd[13358]: Failed password for invalid user sales from 189.50.42.132 port 56932 ssh2 Dec 28 14:40:19 host sshd[13358]: Received disconnect from 189.50.42.132 port 56932:11: Bye Bye [preauth] Dec 28 14:40:19 host sshd[13358]: Disconnected from 189.50.42.132 port 56932 [preauth] Dec 28 14:41:46 host sshd[13662]: User root from 189.50.42.132 not allowed because not listed in AllowUsers Dec 28 14:41:46 host sshd[13662]: input_userauth_request: invalid user root [preauth] Dec 28 14:41:46 host unix_chkpwd[13671]: password check failed for user (root) Dec 28 14:41:46 host sshd[13662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.50.42.132 user=root Dec 28 14:41:46 host sshd[13662]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 14:41:48 host sshd[13662]: Failed password for invalid user root from 189.50.42.132 port 34523 ssh2 Dec 28 14:41:49 host sshd[13662]: Received disconnect from 189.50.42.132 port 34523:11: Bye Bye [preauth] Dec 28 14:41:49 host sshd[13662]: Disconnected from 189.50.42.132 port 34523 [preauth] Dec 28 14:41:51 host sshd[13677]: User root from 68.183.156.109 not allowed because not listed in AllowUsers Dec 28 14:41:51 host sshd[13677]: input_userauth_request: invalid user root [preauth] Dec 28 14:41:51 host unix_chkpwd[13680]: password check failed for user (root) Dec 28 14:41:51 host sshd[13677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.156.109 user=root Dec 28 14:41:51 host sshd[13677]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 14:41:53 host sshd[13677]: Failed password for invalid user root from 68.183.156.109 port 59426 ssh2 Dec 28 14:41:53 host sshd[13677]: Received disconnect from 68.183.156.109 port 59426:11: Bye Bye [preauth] Dec 28 14:41:53 host sshd[13677]: Disconnected from 68.183.156.109 port 59426 [preauth] Dec 28 14:47:08 host sshd[14578]: Invalid user zhang from 68.183.156.109 port 53932 Dec 28 14:47:08 host sshd[14578]: input_userauth_request: invalid user zhang [preauth] Dec 28 14:47:08 host sshd[14578]: pam_unix(sshd:auth): check pass; user unknown Dec 28 14:47:08 host sshd[14578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.156.109 Dec 28 14:47:10 host sshd[14578]: Failed password for invalid user zhang from 68.183.156.109 port 53932 ssh2 Dec 28 14:47:10 host sshd[14578]: Received disconnect from 68.183.156.109 port 53932:11: Bye Bye [preauth] Dec 28 14:47:10 host sshd[14578]: Disconnected from 68.183.156.109 port 53932 [preauth] Dec 28 14:48:49 host sshd[14844]: Invalid user admin from 194.169.175.102 port 63320 Dec 28 14:48:49 host sshd[14844]: input_userauth_request: invalid user admin [preauth] Dec 28 14:48:49 host sshd[14844]: pam_unix(sshd:auth): check pass; user unknown Dec 28 14:48:49 host sshd[14844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 Dec 28 14:48:51 host sshd[14844]: Failed password for invalid user admin from 194.169.175.102 port 63320 ssh2 Dec 28 14:48:51 host sshd[14844]: Received disconnect from 194.169.175.102 port 63320:11: Client disconnecting normally [preauth] Dec 28 14:48:51 host sshd[14844]: Disconnected from 194.169.175.102 port 63320 [preauth] Dec 28 14:50:51 host sshd[15140]: Invalid user ea from 45.93.201.90 port 60072 Dec 28 14:50:51 host sshd[15140]: input_userauth_request: invalid user ea [preauth] Dec 28 14:50:51 host sshd[15140]: pam_unix(sshd:auth): check pass; user unknown Dec 28 14:50:51 host sshd[15140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 28 14:50:53 host sshd[15140]: Failed password for invalid user ea from 45.93.201.90 port 60072 ssh2 Dec 28 14:50:56 host sshd[15140]: pam_unix(sshd:auth): check pass; user unknown Dec 28 14:50:57 host sshd[15140]: Failed password for invalid user ea from 45.93.201.90 port 60072 ssh2 Dec 28 14:51:01 host sshd[15140]: pam_unix(sshd:auth): check pass; user unknown Dec 28 14:51:02 host sshd[15140]: Failed password for invalid user ea from 45.93.201.90 port 60072 ssh2 Dec 28 14:51:06 host sshd[15140]: Connection closed by 45.93.201.90 port 60072 [preauth] Dec 28 14:51:06 host sshd[15140]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 28 14:52:01 host sshd[15384]: User root from 41.197.31.178 not allowed because not listed in AllowUsers Dec 28 14:52:01 host sshd[15384]: input_userauth_request: invalid user root [preauth] Dec 28 14:52:01 host unix_chkpwd[15387]: password check failed for user (root) Dec 28 14:52:01 host sshd[15384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 user=root Dec 28 14:52:01 host sshd[15384]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 14:52:03 host sshd[15384]: Failed password for invalid user root from 41.197.31.178 port 38574 ssh2 Dec 28 14:52:03 host sshd[15384]: Connection closed by 41.197.31.178 port 38574 [preauth] Dec 28 15:01:41 host sshd[16878]: Connection closed by 169.228.66.212 port 56226 [preauth] Dec 28 15:06:33 host sshd[17751]: User root from 162.247.72.199 not allowed because not listed in AllowUsers Dec 28 15:06:33 host sshd[17751]: input_userauth_request: invalid user root [preauth] Dec 28 15:06:34 host sshd[17751]: Connection closed by 162.247.72.199 port 48864 [preauth] Dec 28 15:06:39 host sshd[17766]: User root from 185.129.61.3 not allowed because not listed in AllowUsers Dec 28 15:06:39 host sshd[17766]: input_userauth_request: invalid user root [preauth] Dec 28 15:06:40 host unix_chkpwd[17776]: password check failed for user (root) Dec 28 15:06:40 host sshd[17766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.129.61.3 user=root Dec 28 15:06:40 host sshd[17766]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:06:42 host sshd[17766]: Failed password for invalid user root from 185.129.61.3 port 6739 ssh2 Dec 28 15:06:42 host unix_chkpwd[17779]: password check failed for user (root) Dec 28 15:06:42 host sshd[17766]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:06:44 host sshd[17766]: Failed password for invalid user root from 185.129.61.3 port 6739 ssh2 Dec 28 15:06:45 host unix_chkpwd[17784]: password check failed for user (root) Dec 28 15:06:45 host sshd[17766]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:06:47 host sshd[17766]: Failed password for invalid user root from 185.129.61.3 port 6739 ssh2 Dec 28 15:06:47 host unix_chkpwd[17787]: password check failed for user (root) Dec 28 15:06:47 host sshd[17766]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:06:49 host sshd[17766]: Failed password for invalid user root from 185.129.61.3 port 6739 ssh2 Dec 28 15:06:49 host unix_chkpwd[17799]: password check failed for user (root) Dec 28 15:06:49 host sshd[17766]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:06:52 host sshd[17766]: Failed password for invalid user root from 185.129.61.3 port 6739 ssh2 Dec 28 15:07:23 host sshd[17893]: User root from 185.129.61.9 not allowed because not listed in AllowUsers Dec 28 15:07:23 host sshd[17893]: input_userauth_request: invalid user root [preauth] Dec 28 15:07:23 host unix_chkpwd[17897]: password check failed for user (root) Dec 28 15:07:23 host sshd[17893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.129.61.9 user=root Dec 28 15:07:23 host sshd[17893]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:07:26 host sshd[17893]: Failed password for invalid user root from 185.129.61.9 port 18023 ssh2 Dec 28 15:07:27 host unix_chkpwd[17925]: password check failed for user (root) Dec 28 15:07:27 host sshd[17893]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:07:29 host sshd[17893]: Failed password for invalid user root from 185.129.61.9 port 18023 ssh2 Dec 28 15:07:29 host unix_chkpwd[17931]: password check failed for user (root) Dec 28 15:07:29 host sshd[17893]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:07:32 host sshd[17893]: Failed password for invalid user root from 185.129.61.9 port 18023 ssh2 Dec 28 15:07:33 host unix_chkpwd[17937]: password check failed for user (root) Dec 28 15:07:33 host sshd[17893]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:07:35 host sshd[17893]: Failed password for invalid user root from 185.129.61.9 port 18023 ssh2 Dec 28 15:08:45 host sshd[18194]: User root from 144.217.86.109 not allowed because not listed in AllowUsers Dec 28 15:08:45 host sshd[18194]: input_userauth_request: invalid user root [preauth] Dec 28 15:08:45 host unix_chkpwd[18216]: password check failed for user (root) Dec 28 15:08:45 host sshd[18194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.86.109 user=root Dec 28 15:08:45 host sshd[18194]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:08:47 host sshd[18194]: Failed password for invalid user root from 144.217.86.109 port 33742 ssh2 Dec 28 15:08:49 host unix_chkpwd[18220]: password check failed for user (root) Dec 28 15:08:49 host sshd[18194]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:08:51 host sshd[18194]: Failed password for invalid user root from 144.217.86.109 port 33742 ssh2 Dec 28 15:08:53 host unix_chkpwd[18227]: password check failed for user (root) Dec 28 15:08:53 host sshd[18194]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:08:55 host sshd[18194]: Failed password for invalid user root from 144.217.86.109 port 33742 ssh2 Dec 28 15:08:56 host unix_chkpwd[18233]: password check failed for user (root) Dec 28 15:08:56 host sshd[18194]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:08:58 host sshd[18194]: Failed password for invalid user root from 144.217.86.109 port 33742 ssh2 Dec 28 15:08:59 host unix_chkpwd[18236]: password check failed for user (root) Dec 28 15:08:59 host sshd[18194]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:09:01 host sshd[18194]: Failed password for invalid user root from 144.217.86.109 port 33742 ssh2 Dec 28 15:09:39 host sshd[18366]: User root from 45.139.122.241 not allowed because not listed in AllowUsers Dec 28 15:09:39 host sshd[18366]: input_userauth_request: invalid user root [preauth] Dec 28 15:09:39 host unix_chkpwd[18380]: password check failed for user (root) Dec 28 15:09:39 host sshd[18366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.139.122.241 user=root Dec 28 15:09:39 host sshd[18366]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:09:41 host sshd[18366]: Failed password for invalid user root from 45.139.122.241 port 53230 ssh2 Dec 28 15:09:42 host unix_chkpwd[18387]: password check failed for user (root) Dec 28 15:09:42 host sshd[18366]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:09:44 host sshd[18366]: Failed password for invalid user root from 45.139.122.241 port 53230 ssh2 Dec 28 15:09:46 host unix_chkpwd[18393]: password check failed for user (root) Dec 28 15:09:46 host sshd[18366]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:09:47 host sshd[18366]: Failed password for invalid user root from 45.139.122.241 port 53230 ssh2 Dec 28 15:09:49 host unix_chkpwd[18398]: password check failed for user (root) Dec 28 15:09:49 host sshd[18366]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:09:51 host sshd[18366]: Failed password for invalid user root from 45.139.122.241 port 53230 ssh2 Dec 28 15:10:21 host sshd[18524]: User root from 185.220.102.249 not allowed because not listed in AllowUsers Dec 28 15:10:21 host sshd[18524]: input_userauth_request: invalid user root [preauth] Dec 28 15:10:21 host unix_chkpwd[18531]: password check failed for user (root) Dec 28 15:10:21 host sshd[18524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.249 user=root Dec 28 15:10:21 host sshd[18524]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:10:23 host sshd[18524]: Failed password for invalid user root from 185.220.102.249 port 7268 ssh2 Dec 28 15:10:23 host unix_chkpwd[18533]: password check failed for user (root) Dec 28 15:10:23 host sshd[18524]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:10:25 host sshd[18524]: Failed password for invalid user root from 185.220.102.249 port 7268 ssh2 Dec 28 15:10:26 host unix_chkpwd[18559]: password check failed for user (root) Dec 28 15:10:26 host sshd[18524]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:10:27 host sshd[18524]: Failed password for invalid user root from 185.220.102.249 port 7268 ssh2 Dec 28 15:10:28 host unix_chkpwd[18562]: password check failed for user (root) Dec 28 15:10:28 host sshd[18524]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:10:30 host sshd[18524]: Failed password for invalid user root from 185.220.102.249 port 7268 ssh2 Dec 28 15:11:04 host sshd[18652]: User root from 185.220.102.248 not allowed because not listed in AllowUsers Dec 28 15:11:04 host sshd[18652]: input_userauth_request: invalid user root [preauth] Dec 28 15:11:04 host unix_chkpwd[18669]: password check failed for user (root) Dec 28 15:11:04 host sshd[18652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.248 user=root Dec 28 15:11:04 host sshd[18652]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:11:06 host sshd[18652]: Failed password for invalid user root from 185.220.102.248 port 25848 ssh2 Dec 28 15:11:07 host unix_chkpwd[18675]: password check failed for user (root) Dec 28 15:11:07 host sshd[18652]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:11:08 host sshd[18652]: Failed password for invalid user root from 185.220.102.248 port 25848 ssh2 Dec 28 15:11:09 host unix_chkpwd[18682]: password check failed for user (root) Dec 28 15:11:09 host sshd[18652]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:11:11 host sshd[18652]: Failed password for invalid user root from 185.220.102.248 port 25848 ssh2 Dec 28 15:11:12 host unix_chkpwd[18698]: password check failed for user (root) Dec 28 15:11:12 host sshd[18652]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:11:14 host sshd[18652]: Failed password for invalid user root from 185.220.102.248 port 25848 ssh2 Dec 28 15:11:14 host unix_chkpwd[18701]: password check failed for user (root) Dec 28 15:11:14 host sshd[18652]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:11:16 host sshd[18652]: Failed password for invalid user root from 185.220.102.248 port 25848 ssh2 Dec 28 15:11:51 host sshd[18810]: User root from 162.247.74.204 not allowed because not listed in AllowUsers Dec 28 15:11:51 host sshd[18810]: input_userauth_request: invalid user root [preauth] Dec 28 15:11:51 host unix_chkpwd[18819]: password check failed for user (root) Dec 28 15:11:51 host sshd[18810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.204 user=root Dec 28 15:11:51 host sshd[18810]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:11:53 host sshd[18810]: Failed password for invalid user root from 162.247.74.204 port 38784 ssh2 Dec 28 15:11:54 host unix_chkpwd[18823]: password check failed for user (root) Dec 28 15:11:54 host sshd[18810]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:11:56 host sshd[18810]: Failed password for invalid user root from 162.247.74.204 port 38784 ssh2 Dec 28 15:11:56 host unix_chkpwd[18829]: password check failed for user (root) Dec 28 15:11:56 host sshd[18810]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:11:59 host sshd[18810]: Failed password for invalid user root from 162.247.74.204 port 38784 ssh2 Dec 28 15:11:59 host unix_chkpwd[18834]: password check failed for user (root) Dec 28 15:11:59 host sshd[18810]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:12:01 host sshd[18810]: Failed password for invalid user root from 162.247.74.204 port 38784 ssh2 Dec 28 15:12:22 host sshd[18901]: Connection closed by 188.166.87.67 port 49198 [preauth] Dec 28 15:12:33 host sshd[18970]: User root from 185.129.61.10 not allowed because not listed in AllowUsers Dec 28 15:12:33 host sshd[18970]: input_userauth_request: invalid user root [preauth] Dec 28 15:12:33 host unix_chkpwd[18978]: password check failed for user (root) Dec 28 15:12:33 host sshd[18970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.129.61.10 user=root Dec 28 15:12:33 host sshd[18970]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:12:36 host sshd[18970]: Failed password for invalid user root from 185.129.61.10 port 2375 ssh2 Dec 28 15:12:36 host unix_chkpwd[18984]: password check failed for user (root) Dec 28 15:12:36 host sshd[18970]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:12:38 host sshd[18970]: Failed password for invalid user root from 185.129.61.10 port 2375 ssh2 Dec 28 15:12:39 host unix_chkpwd[18988]: password check failed for user (root) Dec 28 15:12:39 host sshd[18970]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:12:41 host sshd[18970]: Failed password for invalid user root from 185.129.61.10 port 2375 ssh2 Dec 28 15:12:42 host unix_chkpwd[19002]: password check failed for user (root) Dec 28 15:12:42 host sshd[18970]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:12:44 host sshd[18970]: Failed password for invalid user root from 185.129.61.10 port 2375 ssh2 Dec 28 15:12:44 host unix_chkpwd[19007]: password check failed for user (root) Dec 28 15:12:44 host sshd[18970]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:12:47 host sshd[18970]: Failed password for invalid user root from 185.129.61.10 port 2375 ssh2 Dec 28 15:13:19 host sshd[19212]: User root from 185.220.103.5 not allowed because not listed in AllowUsers Dec 28 15:13:19 host sshd[19212]: input_userauth_request: invalid user root [preauth] Dec 28 15:13:19 host unix_chkpwd[19218]: password check failed for user (root) Dec 28 15:13:19 host sshd[19212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.103.5 user=root Dec 28 15:13:19 host sshd[19212]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:13:21 host sshd[19212]: Failed password for invalid user root from 185.220.103.5 port 36964 ssh2 Dec 28 15:13:22 host unix_chkpwd[19224]: password check failed for user (root) Dec 28 15:13:22 host sshd[19212]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:13:25 host sshd[19212]: Failed password for invalid user root from 185.220.103.5 port 36964 ssh2 Dec 28 15:13:25 host unix_chkpwd[19233]: password check failed for user (root) Dec 28 15:13:25 host sshd[19212]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:13:27 host sshd[19212]: Failed password for invalid user root from 185.220.103.5 port 36964 ssh2 Dec 28 15:13:27 host unix_chkpwd[19261]: password check failed for user (root) Dec 28 15:13:27 host sshd[19212]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:13:30 host sshd[19212]: Failed password for invalid user root from 185.220.103.5 port 36964 ssh2 Dec 28 15:13:31 host unix_chkpwd[19272]: password check failed for user (root) Dec 28 15:13:31 host sshd[19212]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:13:33 host sshd[19212]: Failed password for invalid user root from 185.220.103.5 port 36964 ssh2 Dec 28 15:14:04 host sshd[19345]: User root from 185.220.103.8 not allowed because not listed in AllowUsers Dec 28 15:14:04 host sshd[19345]: input_userauth_request: invalid user root [preauth] Dec 28 15:14:04 host unix_chkpwd[19361]: password check failed for user (root) Dec 28 15:14:04 host sshd[19345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.103.8 user=root Dec 28 15:14:04 host sshd[19345]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:14:06 host sshd[19345]: Failed password for invalid user root from 185.220.103.8 port 46922 ssh2 Dec 28 15:14:07 host unix_chkpwd[19375]: password check failed for user (root) Dec 28 15:14:07 host sshd[19345]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:14:08 host sshd[19345]: Failed password for invalid user root from 185.220.103.8 port 46922 ssh2 Dec 28 15:14:09 host unix_chkpwd[19378]: password check failed for user (root) Dec 28 15:14:09 host sshd[19345]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:14:11 host sshd[19345]: Failed password for invalid user root from 185.220.103.8 port 46922 ssh2 Dec 28 15:14:12 host unix_chkpwd[19389]: password check failed for user (root) Dec 28 15:14:12 host sshd[19345]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:14:14 host sshd[19345]: Failed password for invalid user root from 185.220.103.8 port 46922 ssh2 Dec 28 15:14:14 host unix_chkpwd[19393]: password check failed for user (root) Dec 28 15:14:14 host sshd[19345]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:14:17 host sshd[19345]: Failed password for invalid user root from 185.220.103.8 port 46922 ssh2 Dec 28 15:16:37 host sshd[19731]: User root from 66.115.189.148 not allowed because not listed in AllowUsers Dec 28 15:16:37 host sshd[19731]: input_userauth_request: invalid user root [preauth] Dec 28 15:16:37 host unix_chkpwd[19774]: password check failed for user (root) Dec 28 15:16:37 host sshd[19731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.115.189.148 user=root Dec 28 15:16:37 host sshd[19731]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:16:38 host sshd[19731]: Failed password for invalid user root from 66.115.189.148 port 45523 ssh2 Dec 28 15:16:39 host unix_chkpwd[19777]: password check failed for user (root) Dec 28 15:16:39 host sshd[19731]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:16:41 host sshd[19731]: Failed password for invalid user root from 66.115.189.148 port 45523 ssh2 Dec 28 15:16:42 host unix_chkpwd[19784]: password check failed for user (root) Dec 28 15:16:42 host sshd[19731]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:16:44 host sshd[19731]: Failed password for invalid user root from 66.115.189.148 port 45523 ssh2 Dec 28 15:16:45 host unix_chkpwd[19787]: password check failed for user (root) Dec 28 15:16:45 host sshd[19731]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:16:46 host sshd[19731]: Failed password for invalid user root from 66.115.189.148 port 45523 ssh2 Dec 28 15:17:17 host sshd[19886]: User root from 167.86.94.107 not allowed because not listed in AllowUsers Dec 28 15:17:17 host sshd[19886]: input_userauth_request: invalid user root [preauth] Dec 28 15:17:17 host unix_chkpwd[19892]: password check failed for user (root) Dec 28 15:17:17 host sshd[19886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.86.94.107 user=root Dec 28 15:17:17 host sshd[19886]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:17:19 host sshd[19886]: Failed password for invalid user root from 167.86.94.107 port 38082 ssh2 Dec 28 15:17:19 host unix_chkpwd[19895]: password check failed for user (root) Dec 28 15:17:19 host sshd[19886]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:17:21 host sshd[19886]: Failed password for invalid user root from 167.86.94.107 port 38082 ssh2 Dec 28 15:17:22 host unix_chkpwd[19900]: password check failed for user (root) Dec 28 15:17:22 host sshd[19886]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:17:24 host sshd[19886]: Failed password for invalid user root from 167.86.94.107 port 38082 ssh2 Dec 28 15:17:59 host sshd[20005]: User root from 103.251.167.21 not allowed because not listed in AllowUsers Dec 28 15:17:59 host sshd[20005]: input_userauth_request: invalid user root [preauth] Dec 28 15:17:59 host unix_chkpwd[20010]: password check failed for user (root) Dec 28 15:17:59 host sshd[20005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.251.167.21 user=root Dec 28 15:17:59 host sshd[20005]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:18:02 host sshd[20005]: Failed password for invalid user root from 103.251.167.21 port 34404 ssh2 Dec 28 15:18:02 host unix_chkpwd[20028]: password check failed for user (root) Dec 28 15:18:02 host sshd[20005]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:18:05 host sshd[20005]: Failed password for invalid user root from 103.251.167.21 port 34404 ssh2 Dec 28 15:18:05 host unix_chkpwd[20033]: password check failed for user (root) Dec 28 15:18:05 host sshd[20005]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:18:07 host sshd[20005]: Failed password for invalid user root from 103.251.167.21 port 34404 ssh2 Dec 28 15:18:08 host unix_chkpwd[20037]: password check failed for user (root) Dec 28 15:18:08 host sshd[20005]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:18:10 host sshd[20005]: Failed password for invalid user root from 103.251.167.21 port 34404 ssh2 Dec 28 15:18:10 host unix_chkpwd[20054]: password check failed for user (root) Dec 28 15:18:10 host sshd[20005]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:18:12 host sshd[20005]: Failed password for invalid user root from 103.251.167.21 port 34404 ssh2 Dec 28 15:18:44 host sshd[20260]: User root from 104.244.79.40 not allowed because not listed in AllowUsers Dec 28 15:18:44 host sshd[20260]: input_userauth_request: invalid user root [preauth] Dec 28 15:18:44 host unix_chkpwd[20264]: password check failed for user (root) Dec 28 15:18:44 host sshd[20260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.79.40 user=root Dec 28 15:18:44 host sshd[20260]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:18:46 host sshd[20260]: Failed password for invalid user root from 104.244.79.40 port 50318 ssh2 Dec 28 15:18:46 host unix_chkpwd[20274]: password check failed for user (root) Dec 28 15:18:46 host sshd[20260]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:18:49 host sshd[20260]: Failed password for invalid user root from 104.244.79.40 port 50318 ssh2 Dec 28 15:18:50 host unix_chkpwd[20278]: password check failed for user (root) Dec 28 15:18:50 host sshd[20260]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:18:52 host sshd[20260]: Failed password for invalid user root from 104.244.79.40 port 50318 ssh2 Dec 28 15:18:53 host unix_chkpwd[20284]: password check failed for user (root) Dec 28 15:18:53 host sshd[20260]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:18:56 host sshd[20260]: Failed password for invalid user root from 104.244.79.40 port 50318 ssh2 Dec 28 15:19:27 host sshd[20378]: User root from 162.247.72.199 not allowed because not listed in AllowUsers Dec 28 15:19:27 host sshd[20378]: input_userauth_request: invalid user root [preauth] Dec 28 15:19:27 host unix_chkpwd[20408]: password check failed for user (root) Dec 28 15:19:27 host sshd[20378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.72.199 user=root Dec 28 15:19:27 host sshd[20378]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:19:29 host sshd[20378]: Failed password for invalid user root from 162.247.72.199 port 48892 ssh2 Dec 28 15:19:30 host unix_chkpwd[20412]: password check failed for user (root) Dec 28 15:19:30 host sshd[20378]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:19:32 host sshd[20378]: Failed password for invalid user root from 162.247.72.199 port 48892 ssh2 Dec 28 15:19:33 host unix_chkpwd[20419]: password check failed for user (root) Dec 28 15:19:33 host sshd[20378]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:19:35 host sshd[20378]: Failed password for invalid user root from 162.247.72.199 port 48892 ssh2 Dec 28 15:19:36 host unix_chkpwd[20432]: password check failed for user (root) Dec 28 15:19:36 host sshd[20378]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:19:38 host sshd[20378]: Failed password for invalid user root from 162.247.72.199 port 48892 ssh2 Dec 28 15:20:29 host sshd[20577]: User root from 162.247.73.192 not allowed because not listed in AllowUsers Dec 28 15:20:29 host sshd[20577]: input_userauth_request: invalid user root [preauth] Dec 28 15:20:30 host unix_chkpwd[20607]: password check failed for user (root) Dec 28 15:20:30 host sshd[20577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.73.192 user=root Dec 28 15:20:30 host sshd[20577]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:20:32 host sshd[20577]: Failed password for invalid user root from 162.247.73.192 port 33702 ssh2 Dec 28 15:20:33 host unix_chkpwd[20618]: password check failed for user (root) Dec 28 15:20:33 host sshd[20577]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:20:35 host sshd[20577]: Failed password for invalid user root from 162.247.73.192 port 33702 ssh2 Dec 28 15:20:37 host unix_chkpwd[20625]: password check failed for user (root) Dec 28 15:20:37 host sshd[20577]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:20:38 host sshd[20577]: Failed password for invalid user root from 162.247.73.192 port 33702 ssh2 Dec 28 15:20:39 host unix_chkpwd[20627]: password check failed for user (root) Dec 28 15:20:39 host sshd[20577]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:20:41 host sshd[20577]: Failed password for invalid user root from 162.247.73.192 port 33702 ssh2 Dec 28 15:21:15 host sshd[20752]: User root from 162.247.74.213 not allowed because not listed in AllowUsers Dec 28 15:21:15 host sshd[20752]: input_userauth_request: invalid user root [preauth] Dec 28 15:21:15 host unix_chkpwd[20758]: password check failed for user (root) Dec 28 15:21:15 host sshd[20752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.213 user=root Dec 28 15:21:15 host sshd[20752]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:21:18 host sshd[20752]: Failed password for invalid user root from 162.247.74.213 port 60720 ssh2 Dec 28 15:21:19 host unix_chkpwd[20767]: password check failed for user (root) Dec 28 15:21:19 host sshd[20752]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:21:20 host sshd[20752]: Failed password for invalid user root from 162.247.74.213 port 60720 ssh2 Dec 28 15:21:21 host unix_chkpwd[20772]: password check failed for user (root) Dec 28 15:21:21 host sshd[20752]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:21:23 host sshd[20752]: Failed password for invalid user root from 162.247.74.213 port 60720 ssh2 Dec 28 15:21:23 host unix_chkpwd[20779]: password check failed for user (root) Dec 28 15:21:24 host sshd[20752]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:21:25 host sshd[20752]: Failed password for invalid user root from 162.247.74.213 port 60720 ssh2 Dec 28 15:21:27 host unix_chkpwd[20812]: password check failed for user (root) Dec 28 15:21:27 host sshd[20752]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:21:29 host sshd[20752]: Failed password for invalid user root from 162.247.74.213 port 60720 ssh2 Dec 28 15:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 15:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 15:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 15:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 15:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 15:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 15:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 15:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 15:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 28 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 28 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 28 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 28 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 28 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 28 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 28 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 28 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 28 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=straightcurve user-2=wwwletsstalkfood user-3=bonifacegroup user-4=wwwevmhonda user-5=wwwnexidigital user-6=mrsclean user-7=palco123 user-8=gifterman user-9=kottayamcalldriv user-10=phmetals user-11=woodpeck user-12=wwwkapin user-13=disposeat user-14=remysagr user-15=wwwkmaorg user-16=pmcresources user-17=vfmassets user-18=shalinijames user-19=wwwtestugo user-20=wwwpmcresource user-21=wwwresourcehunte user-22=keralaholi user-23=wwwrmswll user-24=ugotscom user-25=travelboniface user-26=cochintaxi user-27=wwwkaretakers user-28=laundryboniface user-29=a2zgroup user-30=dartsimp feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 28 15:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 28 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-kZ5HFqqrjXYuESoD.~ Dec 28 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-kZ5HFqqrjXYuESoD.~' Dec 28 15:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 15:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-kZ5HFqqrjXYuESoD.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 15:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 15:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 28 15:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 15:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 28 15:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 15:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 15:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 15:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 15:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 28 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 15:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 28 15:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 28 15:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 28 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 28 15:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 15:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 15:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 28 15:21:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 15:21:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 15:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 28 15:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 15:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 28 15:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 15:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 15:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 28 15:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 15:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 15:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 28 15:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 15:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 15:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 28 15:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 15:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 15:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 28 15:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 15:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 15:22:07 host sshd[21070]: User root from 162.247.74.7 not allowed because not listed in AllowUsers Dec 28 15:22:07 host sshd[21070]: input_userauth_request: invalid user root [preauth] Dec 28 15:22:07 host unix_chkpwd[21149]: password check failed for user (root) Dec 28 15:22:07 host sshd[21070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.7 user=root Dec 28 15:22:07 host sshd[21070]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:22:09 host sshd[21070]: Failed password for invalid user root from 162.247.74.7 port 48488 ssh2 Dec 28 15:22:10 host unix_chkpwd[21161]: password check failed for user (root) Dec 28 15:22:10 host sshd[21070]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:22:12 host sshd[21070]: Failed password for invalid user root from 162.247.74.7 port 48488 ssh2 Dec 28 15:22:13 host unix_chkpwd[21174]: password check failed for user (root) Dec 28 15:22:13 host sshd[21070]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:22:14 host sshd[21070]: Failed password for invalid user root from 162.247.74.7 port 48488 ssh2 Dec 28 15:22:15 host unix_chkpwd[21179]: password check failed for user (root) Dec 28 15:22:15 host sshd[21070]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:22:17 host sshd[21070]: Failed password for invalid user root from 162.247.74.7 port 48488 ssh2 Dec 28 15:22:49 host sshd[21302]: User root from 185.246.188.67 not allowed because not listed in AllowUsers Dec 28 15:22:49 host sshd[21302]: input_userauth_request: invalid user root [preauth] Dec 28 15:22:49 host unix_chkpwd[21311]: password check failed for user (root) Dec 28 15:22:49 host sshd[21302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.246.188.67 user=root Dec 28 15:22:49 host sshd[21302]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:22:51 host sshd[21302]: Failed password for invalid user root from 185.246.188.67 port 49236 ssh2 Dec 28 15:22:53 host unix_chkpwd[21321]: password check failed for user (root) Dec 28 15:22:53 host sshd[21302]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:22:54 host sshd[21319]: Invalid user admin from 162.218.126.136 port 53120 Dec 28 15:22:54 host sshd[21319]: input_userauth_request: invalid user admin [preauth] Dec 28 15:22:54 host sshd[21319]: pam_unix(sshd:auth): check pass; user unknown Dec 28 15:22:54 host sshd[21319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 28 15:22:55 host sshd[21302]: Failed password for invalid user root from 185.246.188.67 port 49236 ssh2 Dec 28 15:22:56 host sshd[21319]: Failed password for invalid user admin from 162.218.126.136 port 53120 ssh2 Dec 28 15:22:56 host unix_chkpwd[21328]: password check failed for user (root) Dec 28 15:22:56 host sshd[21302]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:22:57 host sshd[21319]: Connection closed by 162.218.126.136 port 53120 [preauth] Dec 28 15:22:58 host sshd[21302]: Failed password for invalid user root from 185.246.188.67 port 49236 ssh2 Dec 28 15:24:00 host sshd[21607]: User root from 205.185.115.33 not allowed because not listed in AllowUsers Dec 28 15:24:00 host sshd[21607]: input_userauth_request: invalid user root [preauth] Dec 28 15:24:00 host unix_chkpwd[21612]: password check failed for user (root) Dec 28 15:24:00 host sshd[21607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.115.33 user=root Dec 28 15:24:00 host sshd[21607]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:24:02 host sshd[21607]: Failed password for invalid user root from 205.185.115.33 port 54536 ssh2 Dec 28 15:24:02 host unix_chkpwd[21630]: password check failed for user (root) Dec 28 15:24:02 host sshd[21607]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:24:05 host sshd[21607]: Failed password for invalid user root from 205.185.115.33 port 54536 ssh2 Dec 28 15:24:05 host unix_chkpwd[21633]: password check failed for user (root) Dec 28 15:24:05 host sshd[21607]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:24:08 host sshd[21607]: Failed password for invalid user root from 205.185.115.33 port 54536 ssh2 Dec 28 15:24:08 host unix_chkpwd[21639]: password check failed for user (root) Dec 28 15:24:08 host sshd[21607]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:24:10 host sshd[21607]: Failed password for invalid user root from 205.185.115.33 port 54536 ssh2 Dec 28 15:24:10 host unix_chkpwd[21642]: password check failed for user (root) Dec 28 15:24:10 host sshd[21607]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:24:12 host sshd[21607]: Failed password for invalid user root from 205.185.115.33 port 54536 ssh2 Dec 28 15:24:48 host sshd[21771]: User root from 139.99.193.7 not allowed because not listed in AllowUsers Dec 28 15:24:48 host sshd[21771]: input_userauth_request: invalid user root [preauth] Dec 28 15:24:48 host unix_chkpwd[21785]: password check failed for user (root) Dec 28 15:24:48 host sshd[21771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.193.7 user=root Dec 28 15:24:48 host sshd[21771]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:24:50 host sshd[21771]: Failed password for invalid user root from 139.99.193.7 port 34512 ssh2 Dec 28 15:24:51 host unix_chkpwd[21795]: password check failed for user (root) Dec 28 15:24:51 host sshd[21771]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:24:53 host sshd[21771]: Failed password for invalid user root from 139.99.193.7 port 34512 ssh2 Dec 28 15:24:54 host unix_chkpwd[21802]: password check failed for user (root) Dec 28 15:24:54 host sshd[21771]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:24:56 host sshd[21771]: Failed password for invalid user root from 139.99.193.7 port 34512 ssh2 Dec 28 15:24:57 host unix_chkpwd[21808]: password check failed for user (root) Dec 28 15:24:57 host sshd[21771]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:24:59 host sshd[21771]: Failed password for invalid user root from 139.99.193.7 port 34512 ssh2 Dec 28 15:25:00 host unix_chkpwd[21812]: password check failed for user (root) Dec 28 15:25:00 host sshd[21771]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:25:02 host sshd[21771]: Failed password for invalid user root from 139.99.193.7 port 34512 ssh2 Dec 28 15:25:49 host sshd[21978]: User root from 82.221.128.191 not allowed because not listed in AllowUsers Dec 28 15:25:49 host sshd[21978]: input_userauth_request: invalid user root [preauth] Dec 28 15:25:49 host unix_chkpwd[21986]: password check failed for user (root) Dec 28 15:25:49 host sshd[21978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.221.128.191 user=root Dec 28 15:25:49 host sshd[21978]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:25:51 host sshd[21978]: Failed password for invalid user root from 82.221.128.191 port 41379 ssh2 Dec 28 15:25:51 host unix_chkpwd[21994]: password check failed for user (root) Dec 28 15:25:51 host sshd[21978]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:25:53 host sshd[21978]: Failed password for invalid user root from 82.221.128.191 port 41379 ssh2 Dec 28 15:25:54 host unix_chkpwd[21997]: password check failed for user (root) Dec 28 15:25:54 host sshd[21978]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:25:56 host sshd[21978]: Failed password for invalid user root from 82.221.128.191 port 41379 ssh2 Dec 28 15:26:44 host sshd[22158]: User root from 185.129.61.1 not allowed because not listed in AllowUsers Dec 28 15:26:44 host sshd[22158]: input_userauth_request: invalid user root [preauth] Dec 28 15:26:44 host unix_chkpwd[22170]: password check failed for user (root) Dec 28 15:26:44 host sshd[22158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.129.61.1 user=root Dec 28 15:26:44 host sshd[22158]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:26:46 host sshd[22158]: Failed password for invalid user root from 185.129.61.1 port 27867 ssh2 Dec 28 15:26:47 host unix_chkpwd[22179]: password check failed for user (root) Dec 28 15:26:47 host sshd[22158]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:26:49 host sshd[22158]: Failed password for invalid user root from 185.129.61.1 port 27867 ssh2 Dec 28 15:26:58 host unix_chkpwd[22198]: password check failed for user (root) Dec 28 15:26:58 host sshd[22158]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:27:01 host sshd[22158]: Failed password for invalid user root from 185.129.61.1 port 27867 ssh2 Dec 28 15:27:48 host sshd[22354]: User root from 162.247.74.206 not allowed because not listed in AllowUsers Dec 28 15:27:48 host sshd[22354]: input_userauth_request: invalid user root [preauth] Dec 28 15:27:48 host unix_chkpwd[22365]: password check failed for user (root) Dec 28 15:27:48 host sshd[22354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.206 user=root Dec 28 15:27:48 host sshd[22354]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:27:50 host sshd[22354]: Failed password for invalid user root from 162.247.74.206 port 39078 ssh2 Dec 28 15:27:51 host unix_chkpwd[22371]: password check failed for user (root) Dec 28 15:27:51 host sshd[22354]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:27:54 host sshd[22354]: Failed password for invalid user root from 162.247.74.206 port 39078 ssh2 Dec 28 15:27:54 host unix_chkpwd[22374]: password check failed for user (root) Dec 28 15:27:54 host sshd[22354]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:27:56 host sshd[22354]: Failed password for invalid user root from 162.247.74.206 port 39078 ssh2 Dec 28 15:27:56 host unix_chkpwd[22385]: password check failed for user (root) Dec 28 15:27:56 host sshd[22354]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:27:58 host sshd[22354]: Failed password for invalid user root from 162.247.74.206 port 39078 ssh2 Dec 28 15:29:23 host sshd[22692]: User root from 185.220.102.250 not allowed because not listed in AllowUsers Dec 28 15:29:23 host sshd[22692]: input_userauth_request: invalid user root [preauth] Dec 28 15:29:23 host unix_chkpwd[22738]: password check failed for user (root) Dec 28 15:29:23 host sshd[22692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.250 user=root Dec 28 15:29:23 host sshd[22692]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:29:25 host sshd[22692]: Failed password for invalid user root from 185.220.102.250 port 27486 ssh2 Dec 28 15:29:26 host unix_chkpwd[22768]: password check failed for user (root) Dec 28 15:29:26 host sshd[22692]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:29:28 host sshd[22692]: Failed password for invalid user root from 185.220.102.250 port 27486 ssh2 Dec 28 15:29:29 host sshd[22413]: Did not receive identification string from 5.2.70.140 port 22656 Dec 28 15:29:38 host sshd[22658]: Did not receive identification string from 5.255.103.135 port 52028 Dec 28 15:29:45 host unix_chkpwd[22798]: password check failed for user (root) Dec 28 15:29:45 host sshd[22692]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:29:47 host sshd[22692]: Failed password for invalid user root from 185.220.102.250 port 27486 ssh2 Dec 28 15:30:37 host sshd[22969]: User root from 5.255.97.170 not allowed because not listed in AllowUsers Dec 28 15:30:37 host sshd[22969]: input_userauth_request: invalid user root [preauth] Dec 28 15:30:37 host unix_chkpwd[22977]: password check failed for user (root) Dec 28 15:30:37 host sshd[22969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.255.97.170 user=root Dec 28 15:30:37 host sshd[22969]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:30:39 host sshd[22969]: Failed password for invalid user root from 5.255.97.170 port 55166 ssh2 Dec 28 15:30:41 host unix_chkpwd[22985]: password check failed for user (root) Dec 28 15:30:41 host sshd[22969]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:30:44 host sshd[22969]: Failed password for invalid user root from 5.255.97.170 port 55166 ssh2 Dec 28 15:30:44 host unix_chkpwd[22988]: password check failed for user (root) Dec 28 15:30:44 host sshd[22969]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:30:46 host sshd[22969]: Failed password for invalid user root from 5.255.97.170 port 55166 ssh2 Dec 28 15:30:47 host unix_chkpwd[22998]: password check failed for user (root) Dec 28 15:30:47 host sshd[22969]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:30:49 host sshd[22969]: Failed password for invalid user root from 5.255.97.170 port 55166 ssh2 Dec 28 15:31:21 host sshd[23103]: User root from 185.100.87.41 not allowed because not listed in AllowUsers Dec 28 15:31:21 host sshd[23103]: input_userauth_request: invalid user root [preauth] Dec 28 15:31:21 host unix_chkpwd[23111]: password check failed for user (root) Dec 28 15:31:21 host sshd[23103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.100.87.41 user=root Dec 28 15:31:21 host sshd[23103]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:31:23 host sshd[23103]: Failed password for invalid user root from 185.100.87.41 port 40791 ssh2 Dec 28 15:31:23 host unix_chkpwd[23116]: password check failed for user (root) Dec 28 15:31:23 host sshd[23103]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:31:26 host sshd[23103]: Failed password for invalid user root from 185.100.87.41 port 40791 ssh2 Dec 28 15:31:26 host unix_chkpwd[23142]: password check failed for user (root) Dec 28 15:31:26 host sshd[23103]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:31:28 host sshd[23103]: Failed password for invalid user root from 185.100.87.41 port 40791 ssh2 Dec 28 15:31:29 host unix_chkpwd[23149]: password check failed for user (root) Dec 28 15:31:29 host sshd[23103]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:31:31 host sshd[23103]: Failed password for invalid user root from 185.100.87.41 port 40791 ssh2 Dec 28 15:31:32 host unix_chkpwd[23160]: password check failed for user (root) Dec 28 15:31:32 host sshd[23103]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:31:34 host sshd[23103]: Failed password for invalid user root from 185.100.87.41 port 40791 ssh2 Dec 28 15:32:04 host sshd[23255]: User root from 185.67.82.114 not allowed because not listed in AllowUsers Dec 28 15:32:04 host sshd[23255]: input_userauth_request: invalid user root [preauth] Dec 28 15:32:04 host unix_chkpwd[23259]: password check failed for user (root) Dec 28 15:32:04 host sshd[23255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.67.82.114 user=root Dec 28 15:32:04 host sshd[23255]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:32:06 host sshd[23255]: Failed password for invalid user root from 185.67.82.114 port 34518 ssh2 Dec 28 15:32:08 host sshd[23255]: Connection closed by 185.67.82.114 port 34518 [preauth] Dec 28 15:33:04 host sshd[23420]: User root from 106.10.122.53 not allowed because not listed in AllowUsers Dec 28 15:33:04 host sshd[23420]: input_userauth_request: invalid user root [preauth] Dec 28 15:33:04 host unix_chkpwd[23423]: password check failed for user (root) Dec 28 15:33:04 host sshd[23420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 user=root Dec 28 15:33:04 host sshd[23420]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:33:06 host sshd[23420]: Failed password for invalid user root from 106.10.122.53 port 44954 ssh2 Dec 28 15:33:06 host sshd[23420]: Connection closed by 106.10.122.53 port 44954 [preauth] Dec 28 15:34:32 host sshd[23618]: Invalid user user1 from 103.13.40.2 port 55540 Dec 28 15:34:32 host sshd[23618]: input_userauth_request: invalid user user1 [preauth] Dec 28 15:34:32 host sshd[23618]: pam_unix(sshd:auth): check pass; user unknown Dec 28 15:34:32 host sshd[23618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 28 15:34:34 host sshd[23618]: Failed password for invalid user user1 from 103.13.40.2 port 55540 ssh2 Dec 28 15:34:34 host sshd[23618]: Connection closed by 103.13.40.2 port 55540 [preauth] Dec 28 15:46:59 host sshd[26029]: Did not receive identification string from 185.173.145.67 port 60258 Dec 28 15:47:05 host sshd[26047]: User root from 185.173.145.67 not allowed because not listed in AllowUsers Dec 28 15:47:05 host sshd[26047]: input_userauth_request: invalid user root [preauth] Dec 28 15:47:05 host unix_chkpwd[26050]: password check failed for user (root) Dec 28 15:47:05 host sshd[26047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.173.145.67 user=root Dec 28 15:47:05 host sshd[26047]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:47:07 host sshd[26047]: Failed password for invalid user root from 185.173.145.67 port 53466 ssh2 Dec 28 15:47:07 host sshd[26047]: Received disconnect from 185.173.145.67 port 53466:11: Normal Shutdown, Thank you for playing [preauth] Dec 28 15:47:07 host sshd[26047]: Disconnected from 185.173.145.67 port 53466 [preauth] Dec 28 15:47:17 host sshd[26070]: User root from 185.173.145.67 not allowed because not listed in AllowUsers Dec 28 15:47:17 host sshd[26070]: input_userauth_request: invalid user root [preauth] Dec 28 15:47:17 host unix_chkpwd[26074]: password check failed for user (root) Dec 28 15:47:17 host sshd[26070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.173.145.67 user=root Dec 28 15:47:17 host sshd[26070]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:47:19 host sshd[26070]: Failed password for invalid user root from 185.173.145.67 port 48884 ssh2 Dec 28 15:52:48 host sshd[27064]: User root from 51.75.18.14 not allowed because not listed in AllowUsers Dec 28 15:52:48 host sshd[27064]: input_userauth_request: invalid user root [preauth] Dec 28 15:52:48 host unix_chkpwd[27070]: password check failed for user (root) Dec 28 15:52:48 host sshd[27064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.18.14 user=root Dec 28 15:52:48 host sshd[27064]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:52:50 host sshd[27064]: Failed password for invalid user root from 51.75.18.14 port 34158 ssh2 Dec 28 15:52:50 host sshd[27064]: Received disconnect from 51.75.18.14 port 34158:11: Bye Bye [preauth] Dec 28 15:52:50 host sshd[27064]: Disconnected from 51.75.18.14 port 34158 [preauth] Dec 28 15:53:29 host sshd[27207]: Invalid user manager from 104.168.68.119 port 48264 Dec 28 15:53:29 host sshd[27207]: input_userauth_request: invalid user manager [preauth] Dec 28 15:53:29 host sshd[27207]: pam_unix(sshd:auth): check pass; user unknown Dec 28 15:53:29 host sshd[27207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.68.119 Dec 28 15:53:30 host sshd[27213]: Invalid user es from 182.75.216.74 port 13885 Dec 28 15:53:30 host sshd[27213]: input_userauth_request: invalid user es [preauth] Dec 28 15:53:30 host sshd[27213]: pam_unix(sshd:auth): check pass; user unknown Dec 28 15:53:30 host sshd[27213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.75.216.74 Dec 28 15:53:31 host sshd[27207]: Failed password for invalid user manager from 104.168.68.119 port 48264 ssh2 Dec 28 15:53:32 host sshd[27216]: Invalid user stephanie from 43.134.209.248 port 41830 Dec 28 15:53:32 host sshd[27216]: input_userauth_request: invalid user stephanie [preauth] Dec 28 15:53:32 host sshd[27216]: pam_unix(sshd:auth): check pass; user unknown Dec 28 15:53:32 host sshd[27216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.209.248 Dec 28 15:53:32 host sshd[27207]: Received disconnect from 104.168.68.119 port 48264:11: Bye Bye [preauth] Dec 28 15:53:32 host sshd[27207]: Disconnected from 104.168.68.119 port 48264 [preauth] Dec 28 15:53:32 host sshd[27213]: Failed password for invalid user es from 182.75.216.74 port 13885 ssh2 Dec 28 15:53:32 host sshd[27213]: Received disconnect from 182.75.216.74 port 13885:11: Bye Bye [preauth] Dec 28 15:53:32 host sshd[27213]: Disconnected from 182.75.216.74 port 13885 [preauth] Dec 28 15:53:33 host sshd[27216]: Failed password for invalid user stephanie from 43.134.209.248 port 41830 ssh2 Dec 28 15:53:33 host sshd[27216]: Received disconnect from 43.134.209.248 port 41830:11: Bye Bye [preauth] Dec 28 15:53:33 host sshd[27216]: Disconnected from 43.134.209.248 port 41830 [preauth] Dec 28 15:54:04 host sshd[27293]: User root from 51.145.215.26 not allowed because not listed in AllowUsers Dec 28 15:54:04 host sshd[27293]: input_userauth_request: invalid user root [preauth] Dec 28 15:54:04 host unix_chkpwd[27299]: password check failed for user (root) Dec 28 15:54:04 host sshd[27293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.145.215.26 user=root Dec 28 15:54:04 host sshd[27293]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:54:06 host sshd[27293]: Failed password for invalid user root from 51.145.215.26 port 44126 ssh2 Dec 28 15:54:06 host sshd[27293]: Received disconnect from 51.145.215.26 port 44126:11: Bye Bye [preauth] Dec 28 15:54:06 host sshd[27293]: Disconnected from 51.145.215.26 port 44126 [preauth] Dec 28 15:54:10 host sshd[27311]: User root from 43.154.164.19 not allowed because not listed in AllowUsers Dec 28 15:54:10 host sshd[27311]: input_userauth_request: invalid user root [preauth] Dec 28 15:54:10 host unix_chkpwd[27314]: password check failed for user (root) Dec 28 15:54:10 host sshd[27311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.154.164.19 user=root Dec 28 15:54:10 host sshd[27311]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:54:12 host sshd[27311]: Failed password for invalid user root from 43.154.164.19 port 55560 ssh2 Dec 28 15:54:12 host sshd[27311]: Received disconnect from 43.154.164.19 port 55560:11: Bye Bye [preauth] Dec 28 15:54:12 host sshd[27311]: Disconnected from 43.154.164.19 port 55560 [preauth] Dec 28 15:54:26 host sshd[27376]: User root from 31.41.92.251 not allowed because not listed in AllowUsers Dec 28 15:54:26 host sshd[27376]: input_userauth_request: invalid user root [preauth] Dec 28 15:54:26 host unix_chkpwd[27383]: password check failed for user (root) Dec 28 15:54:26 host sshd[27376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.92.251 user=root Dec 28 15:54:26 host sshd[27376]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:54:28 host sshd[27376]: Failed password for invalid user root from 31.41.92.251 port 58260 ssh2 Dec 28 15:54:28 host sshd[27376]: Received disconnect from 31.41.92.251 port 58260:11: Bye Bye [preauth] Dec 28 15:54:28 host sshd[27376]: Disconnected from 31.41.92.251 port 58260 [preauth] Dec 28 15:54:46 host sshd[27444]: User root from 209.141.34.9 not allowed because not listed in AllowUsers Dec 28 15:54:46 host sshd[27444]: input_userauth_request: invalid user root [preauth] Dec 28 15:54:46 host unix_chkpwd[27447]: password check failed for user (root) Dec 28 15:54:46 host sshd[27444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.34.9 user=root Dec 28 15:54:46 host sshd[27444]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:54:49 host sshd[27444]: Failed password for invalid user root from 209.141.34.9 port 43576 ssh2 Dec 28 15:54:49 host sshd[27444]: Received disconnect from 209.141.34.9 port 43576:11: Bye Bye [preauth] Dec 28 15:54:49 host sshd[27444]: Disconnected from 209.141.34.9 port 43576 [preauth] Dec 28 15:54:56 host sshd[27463]: User root from 89.251.102.54 not allowed because not listed in AllowUsers Dec 28 15:54:56 host sshd[27463]: input_userauth_request: invalid user root [preauth] Dec 28 15:54:56 host unix_chkpwd[27468]: password check failed for user (root) Dec 28 15:54:56 host sshd[27463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.251.102.54 user=root Dec 28 15:54:56 host sshd[27463]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:54:58 host sshd[27463]: Failed password for invalid user root from 89.251.102.54 port 25294 ssh2 Dec 28 15:54:58 host sshd[27463]: Received disconnect from 89.251.102.54 port 25294:11: Bye Bye [preauth] Dec 28 15:54:58 host sshd[27463]: Disconnected from 89.251.102.54 port 25294 [preauth] Dec 28 15:55:42 host sshd[27625]: User root from 209.141.34.9 not allowed because not listed in AllowUsers Dec 28 15:55:42 host sshd[27625]: input_userauth_request: invalid user root [preauth] Dec 28 15:55:42 host unix_chkpwd[27629]: password check failed for user (root) Dec 28 15:55:42 host sshd[27625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.34.9 user=root Dec 28 15:55:42 host sshd[27625]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:55:43 host sshd[27625]: Failed password for invalid user root from 209.141.34.9 port 54696 ssh2 Dec 28 15:55:44 host sshd[27625]: Received disconnect from 209.141.34.9 port 54696:11: Bye Bye [preauth] Dec 28 15:55:44 host sshd[27625]: Disconnected from 209.141.34.9 port 54696 [preauth] Dec 28 15:57:02 host sshd[27965]: User root from 211.10.44.163 not allowed because not listed in AllowUsers Dec 28 15:57:02 host sshd[27965]: input_userauth_request: invalid user root [preauth] Dec 28 15:57:02 host unix_chkpwd[27968]: password check failed for user (root) Dec 28 15:57:02 host sshd[27965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.10.44.163 user=root Dec 28 15:57:02 host sshd[27965]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:57:04 host sshd[27965]: Failed password for invalid user root from 211.10.44.163 port 60846 ssh2 Dec 28 15:57:04 host sshd[27965]: Received disconnect from 211.10.44.163 port 60846:11: Bye Bye [preauth] Dec 28 15:57:04 host sshd[27965]: Disconnected from 211.10.44.163 port 60846 [preauth] Dec 28 15:57:20 host sshd[28019]: User root from 139.162.54.64 not allowed because not listed in AllowUsers Dec 28 15:57:20 host sshd[28019]: input_userauth_request: invalid user root [preauth] Dec 28 15:57:20 host unix_chkpwd[28021]: password check failed for user (root) Dec 28 15:57:20 host sshd[28019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.162.54.64 user=root Dec 28 15:57:20 host sshd[28019]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:57:23 host sshd[28024]: Invalid user ds from 37.32.9.115 port 52606 Dec 28 15:57:23 host sshd[28024]: input_userauth_request: invalid user ds [preauth] Dec 28 15:57:23 host sshd[28024]: pam_unix(sshd:auth): check pass; user unknown Dec 28 15:57:23 host sshd[28024]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.32.9.115 Dec 28 15:57:23 host sshd[28019]: Failed password for invalid user root from 139.162.54.64 port 45244 ssh2 Dec 28 15:57:23 host sshd[28019]: Received disconnect from 139.162.54.64 port 45244:11: Bye Bye [preauth] Dec 28 15:57:23 host sshd[28019]: Disconnected from 139.162.54.64 port 45244 [preauth] Dec 28 15:57:25 host sshd[28024]: Failed password for invalid user ds from 37.32.9.115 port 52606 ssh2 Dec 28 15:57:25 host sshd[28024]: Received disconnect from 37.32.9.115 port 52606:11: Bye Bye [preauth] Dec 28 15:57:25 host sshd[28024]: Disconnected from 37.32.9.115 port 52606 [preauth] Dec 28 15:57:33 host sshd[28076]: User root from 167.172.58.10 not allowed because not listed in AllowUsers Dec 28 15:57:33 host sshd[28076]: input_userauth_request: invalid user root [preauth] Dec 28 15:57:33 host unix_chkpwd[28081]: password check failed for user (root) Dec 28 15:57:33 host sshd[28076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.58.10 user=root Dec 28 15:57:33 host sshd[28076]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:57:35 host sshd[28076]: Failed password for invalid user root from 167.172.58.10 port 32770 ssh2 Dec 28 15:57:35 host sshd[28076]: Received disconnect from 167.172.58.10 port 32770:11: Bye Bye [preauth] Dec 28 15:57:35 host sshd[28076]: Disconnected from 167.172.58.10 port 32770 [preauth] Dec 28 15:58:05 host sshd[28172]: Invalid user user from 51.75.18.14 port 36700 Dec 28 15:58:05 host sshd[28172]: input_userauth_request: invalid user user [preauth] Dec 28 15:58:05 host sshd[28172]: pam_unix(sshd:auth): check pass; user unknown Dec 28 15:58:05 host sshd[28172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.18.14 Dec 28 15:58:08 host sshd[28172]: Failed password for invalid user user from 51.75.18.14 port 36700 ssh2 Dec 28 15:58:08 host sshd[28172]: Received disconnect from 51.75.18.14 port 36700:11: Bye Bye [preauth] Dec 28 15:58:08 host sshd[28172]: Disconnected from 51.75.18.14 port 36700 [preauth] Dec 28 15:58:16 host sshd[28243]: Invalid user reach from 89.251.102.54 port 10564 Dec 28 15:58:16 host sshd[28243]: input_userauth_request: invalid user reach [preauth] Dec 28 15:58:16 host sshd[28243]: pam_unix(sshd:auth): check pass; user unknown Dec 28 15:58:16 host sshd[28243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.251.102.54 Dec 28 15:58:18 host sshd[28243]: Failed password for invalid user reach from 89.251.102.54 port 10564 ssh2 Dec 28 15:58:18 host sshd[28243]: Received disconnect from 89.251.102.54 port 10564:11: Bye Bye [preauth] Dec 28 15:58:18 host sshd[28243]: Disconnected from 89.251.102.54 port 10564 [preauth] Dec 28 15:58:26 host sshd[28302]: Invalid user elias from 14.35.205.136 port 36754 Dec 28 15:58:26 host sshd[28302]: input_userauth_request: invalid user elias [preauth] Dec 28 15:58:26 host sshd[28302]: pam_unix(sshd:auth): check pass; user unknown Dec 28 15:58:26 host sshd[28302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.35.205.136 Dec 28 15:58:28 host sshd[28302]: Failed password for invalid user elias from 14.35.205.136 port 36754 ssh2 Dec 28 15:58:28 host sshd[28302]: Received disconnect from 14.35.205.136 port 36754:11: Bye Bye [preauth] Dec 28 15:58:28 host sshd[28302]: Disconnected from 14.35.205.136 port 36754 [preauth] Dec 28 15:58:30 host sshd[28332]: Invalid user factorio from 184.96.183.228 port 47968 Dec 28 15:58:30 host sshd[28332]: input_userauth_request: invalid user factorio [preauth] Dec 28 15:58:30 host sshd[28332]: pam_unix(sshd:auth): check pass; user unknown Dec 28 15:58:30 host sshd[28332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.96.183.228 Dec 28 15:58:32 host sshd[28332]: Failed password for invalid user factorio from 184.96.183.228 port 47968 ssh2 Dec 28 15:58:32 host sshd[28332]: Received disconnect from 184.96.183.228 port 47968:11: Bye Bye [preauth] Dec 28 15:58:32 host sshd[28332]: Disconnected from 184.96.183.228 port 47968 [preauth] Dec 28 15:59:02 host sshd[28399]: User root from 104.168.68.119 not allowed because not listed in AllowUsers Dec 28 15:59:02 host sshd[28399]: input_userauth_request: invalid user root [preauth] Dec 28 15:59:02 host unix_chkpwd[28412]: password check failed for user (root) Dec 28 15:59:02 host sshd[28399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.68.119 user=root Dec 28 15:59:02 host sshd[28399]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:59:03 host sshd[28413]: Invalid user tiago from 51.145.215.26 port 51234 Dec 28 15:59:03 host sshd[28413]: input_userauth_request: invalid user tiago [preauth] Dec 28 15:59:03 host sshd[28413]: pam_unix(sshd:auth): check pass; user unknown Dec 28 15:59:03 host sshd[28413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.145.215.26 Dec 28 15:59:03 host sshd[28399]: Failed password for invalid user root from 104.168.68.119 port 51874 ssh2 Dec 28 15:59:04 host sshd[28399]: Received disconnect from 104.168.68.119 port 51874:11: Bye Bye [preauth] Dec 28 15:59:04 host sshd[28399]: Disconnected from 104.168.68.119 port 51874 [preauth] Dec 28 15:59:05 host sshd[28413]: Failed password for invalid user tiago from 51.145.215.26 port 51234 ssh2 Dec 28 15:59:05 host sshd[28413]: Received disconnect from 51.145.215.26 port 51234:11: Bye Bye [preauth] Dec 28 15:59:05 host sshd[28413]: Disconnected from 51.145.215.26 port 51234 [preauth] Dec 28 15:59:19 host sshd[28506]: Invalid user david from 43.134.209.248 port 44006 Dec 28 15:59:19 host sshd[28506]: input_userauth_request: invalid user david [preauth] Dec 28 15:59:19 host sshd[28506]: pam_unix(sshd:auth): check pass; user unknown Dec 28 15:59:19 host sshd[28506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.209.248 Dec 28 15:59:21 host sshd[28506]: Failed password for invalid user david from 43.134.209.248 port 44006 ssh2 Dec 28 15:59:21 host sshd[28506]: Received disconnect from 43.134.209.248 port 44006:11: Bye Bye [preauth] Dec 28 15:59:21 host sshd[28506]: Disconnected from 43.134.209.248 port 44006 [preauth] Dec 28 15:59:24 host sshd[28518]: User root from 182.75.216.74 not allowed because not listed in AllowUsers Dec 28 15:59:24 host sshd[28518]: input_userauth_request: invalid user root [preauth] Dec 28 15:59:24 host unix_chkpwd[28520]: password check failed for user (root) Dec 28 15:59:24 host sshd[28518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.75.216.74 user=root Dec 28 15:59:24 host sshd[28518]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 15:59:26 host sshd[28518]: Failed password for invalid user root from 182.75.216.74 port 39750 ssh2 Dec 28 15:59:26 host sshd[28518]: Received disconnect from 182.75.216.74 port 39750:11: Bye Bye [preauth] Dec 28 15:59:26 host sshd[28518]: Disconnected from 182.75.216.74 port 39750 [preauth] Dec 28 15:59:38 host sshd[28599]: Invalid user openbravo from 31.41.92.251 port 55284 Dec 28 15:59:38 host sshd[28599]: input_userauth_request: invalid user openbravo [preauth] Dec 28 15:59:38 host sshd[28599]: pam_unix(sshd:auth): check pass; user unknown Dec 28 15:59:38 host sshd[28599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.92.251 Dec 28 15:59:40 host sshd[28599]: Failed password for invalid user openbravo from 31.41.92.251 port 55284 ssh2 Dec 28 15:59:41 host sshd[28599]: Received disconnect from 31.41.92.251 port 55284:11: Bye Bye [preauth] Dec 28 15:59:41 host sshd[28599]: Disconnected from 31.41.92.251 port 55284 [preauth] Dec 28 15:59:57 host sshd[28665]: Invalid user gitlab from 43.154.164.19 port 58020 Dec 28 15:59:57 host sshd[28665]: input_userauth_request: invalid user gitlab [preauth] Dec 28 15:59:57 host sshd[28665]: pam_unix(sshd:auth): check pass; user unknown Dec 28 15:59:57 host sshd[28665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.154.164.19 Dec 28 15:59:59 host sshd[28665]: Failed password for invalid user gitlab from 43.154.164.19 port 58020 ssh2 Dec 28 15:59:59 host sshd[28665]: Received disconnect from 43.154.164.19 port 58020:11: Bye Bye [preauth] Dec 28 15:59:59 host sshd[28665]: Disconnected from 43.154.164.19 port 58020 [preauth] Dec 28 16:00:06 host sshd[28741]: Invalid user elastic from 14.35.205.136 port 38792 Dec 28 16:00:06 host sshd[28741]: input_userauth_request: invalid user elastic [preauth] Dec 28 16:00:06 host sshd[28741]: pam_unix(sshd:auth): check pass; user unknown Dec 28 16:00:06 host sshd[28741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.35.205.136 Dec 28 16:00:08 host sshd[28741]: Failed password for invalid user elastic from 14.35.205.136 port 38792 ssh2 Dec 28 16:00:08 host sshd[28741]: Received disconnect from 14.35.205.136 port 38792:11: Bye Bye [preauth] Dec 28 16:00:08 host sshd[28741]: Disconnected from 14.35.205.136 port 38792 [preauth] Dec 28 16:00:20 host sshd[28767]: Invalid user guillermo from 211.10.44.163 port 46296 Dec 28 16:00:20 host sshd[28767]: input_userauth_request: invalid user guillermo [preauth] Dec 28 16:00:20 host sshd[28767]: pam_unix(sshd:auth): check pass; user unknown Dec 28 16:00:20 host sshd[28767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.10.44.163 Dec 28 16:00:21 host sshd[28767]: Failed password for invalid user guillermo from 211.10.44.163 port 46296 ssh2 Dec 28 16:00:21 host sshd[28767]: Received disconnect from 211.10.44.163 port 46296:11: Bye Bye [preauth] Dec 28 16:00:21 host sshd[28767]: Disconnected from 211.10.44.163 port 46296 [preauth] Dec 28 16:00:22 host sshd[28790]: Invalid user admin1 from 139.162.54.64 port 56508 Dec 28 16:00:22 host sshd[28790]: input_userauth_request: invalid user admin1 [preauth] Dec 28 16:00:22 host sshd[28790]: pam_unix(sshd:auth): check pass; user unknown Dec 28 16:00:22 host sshd[28790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.162.54.64 Dec 28 16:00:24 host sshd[28790]: Failed password for invalid user admin1 from 139.162.54.64 port 56508 ssh2 Dec 28 16:00:24 host sshd[28790]: Received disconnect from 139.162.54.64 port 56508:11: Bye Bye [preauth] Dec 28 16:00:24 host sshd[28790]: Disconnected from 139.162.54.64 port 56508 [preauth] Dec 28 16:00:24 host sshd[28793]: Invalid user openbravo from 167.172.58.10 port 47688 Dec 28 16:00:24 host sshd[28793]: input_userauth_request: invalid user openbravo [preauth] Dec 28 16:00:24 host sshd[28793]: pam_unix(sshd:auth): check pass; user unknown Dec 28 16:00:24 host sshd[28793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.58.10 Dec 28 16:00:26 host sshd[28793]: Failed password for invalid user openbravo from 167.172.58.10 port 47688 ssh2 Dec 28 16:00:26 host sshd[28793]: Received disconnect from 167.172.58.10 port 47688:11: Bye Bye [preauth] Dec 28 16:00:26 host sshd[28793]: Disconnected from 167.172.58.10 port 47688 [preauth] Dec 28 16:00:43 host sshd[28946]: Invalid user kusanagi from 43.134.209.248 port 44800 Dec 28 16:00:43 host sshd[28946]: input_userauth_request: invalid user kusanagi [preauth] Dec 28 16:00:43 host sshd[28946]: pam_unix(sshd:auth): check pass; user unknown Dec 28 16:00:43 host sshd[28946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.209.248 Dec 28 16:00:44 host sshd[28946]: Failed password for invalid user kusanagi from 43.134.209.248 port 44800 ssh2 Dec 28 16:00:44 host sshd[28946]: Received disconnect from 43.134.209.248 port 44800:11: Bye Bye [preauth] Dec 28 16:00:44 host sshd[28946]: Disconnected from 43.134.209.248 port 44800 [preauth] Dec 28 16:00:50 host sshd[28995]: User root from 37.32.9.115 not allowed because not listed in AllowUsers Dec 28 16:00:50 host sshd[28995]: input_userauth_request: invalid user root [preauth] Dec 28 16:00:50 host unix_chkpwd[29001]: password check failed for user (root) Dec 28 16:00:50 host sshd[28995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.32.9.115 user=root Dec 28 16:00:50 host sshd[28995]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 16:00:52 host sshd[28995]: Failed password for invalid user root from 37.32.9.115 port 59588 ssh2 Dec 28 16:00:52 host sshd[28995]: Received disconnect from 37.32.9.115 port 59588:11: Bye Bye [preauth] Dec 28 16:00:52 host sshd[28995]: Disconnected from 37.32.9.115 port 59588 [preauth] Dec 28 16:01:25 host sshd[29209]: Invalid user liang from 184.96.183.228 port 48090 Dec 28 16:01:25 host sshd[29209]: input_userauth_request: invalid user liang [preauth] Dec 28 16:01:25 host sshd[29209]: pam_unix(sshd:auth): check pass; user unknown Dec 28 16:01:25 host sshd[29209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.96.183.228 Dec 28 16:01:27 host sshd[29254]: User root from 14.35.205.136 not allowed because not listed in AllowUsers Dec 28 16:01:27 host sshd[29254]: input_userauth_request: invalid user root [preauth] Dec 28 16:01:27 host unix_chkpwd[29278]: password check failed for user (root) Dec 28 16:01:27 host sshd[29254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.35.205.136 user=root Dec 28 16:01:27 host sshd[29254]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 16:01:27 host sshd[29209]: Failed password for invalid user liang from 184.96.183.228 port 48090 ssh2 Dec 28 16:01:29 host sshd[29254]: Failed password for invalid user root from 14.35.205.136 port 39034 ssh2 Dec 28 16:01:29 host sshd[29254]: Received disconnect from 14.35.205.136 port 39034:11: Bye Bye [preauth] Dec 28 16:01:29 host sshd[29254]: Disconnected from 14.35.205.136 port 39034 [preauth] Dec 28 16:01:29 host sshd[29209]: Received disconnect from 184.96.183.228 port 48090:11: Bye Bye [preauth] Dec 28 16:01:29 host sshd[29209]: Disconnected from 184.96.183.228 port 48090 [preauth] Dec 28 16:02:19 host sshd[29404]: Invalid user user from 92.46.108.20 port 44772 Dec 28 16:02:19 host sshd[29404]: input_userauth_request: invalid user user [preauth] Dec 28 16:02:20 host sshd[29404]: pam_unix(sshd:auth): check pass; user unknown Dec 28 16:02:20 host sshd[29404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 28 16:02:22 host sshd[29404]: Failed password for invalid user user from 92.46.108.20 port 44772 ssh2 Dec 28 16:02:22 host sshd[29404]: Connection closed by 92.46.108.20 port 44772 [preauth] Dec 28 16:03:28 host sshd[29587]: Invalid user khs from 184.96.183.228 port 48188 Dec 28 16:03:28 host sshd[29587]: input_userauth_request: invalid user khs [preauth] Dec 28 16:03:28 host sshd[29587]: pam_unix(sshd:auth): check pass; user unknown Dec 28 16:03:28 host sshd[29587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.96.183.228 Dec 28 16:03:30 host sshd[29587]: Failed password for invalid user khs from 184.96.183.228 port 48188 ssh2 Dec 28 16:08:40 host sshd[30390]: Connection closed by 167.248.133.120 port 42450 [preauth] Dec 28 16:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 16:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 16:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 16:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 16:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 16:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 16:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 16:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 16:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 28 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 28 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 28 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 28 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 28 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 28 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 28 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 28 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 28 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=vfmassets user-2=shalinijames user-3=wwwtestugo user-4=pmcresources user-5=wwwkmaorg user-6=disposeat user-7=remysagr user-8=wwwkapin user-9=woodpeck user-10=palco123 user-11=gifterman user-12=phmetals user-13=kottayamcalldriv user-14=mrsclean user-15=wwwnexidigital user-16=bonifacegroup user-17=wwwevmhonda user-18=wwwletsstalkfood user-19=straightcurve user-20=a2zgroup user-21=dartsimp user-22=laundryboniface user-23=wwwkaretakers user-24=cochintaxi user-25=travelboniface user-26=wwwresourcehunte user-27=keralaholi user-28=wwwrmswll user-29=ugotscom user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 28 16:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 28 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 16:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 16:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 16:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-XajmuZPbrO5YBipV.~ Dec 28 16:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 16:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-XajmuZPbrO5YBipV.~' Dec 28 16:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 16:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-XajmuZPbrO5YBipV.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 16:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 16:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 28 16:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 16:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 28 16:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 16:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 16:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 16:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 16:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 16:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 28 16:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 16:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 16:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 16:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 16:21:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 28 16:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 28 16:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 28 16:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 28 16:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 16:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 16:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 28 16:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 16:21:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 16:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 28 16:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 16:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 16:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 28 16:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 16:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 16:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 28 16:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 16:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 16:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 28 16:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 16:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 16:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 28 16:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 16:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 16:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 28 16:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 16:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 16:34:49 host sshd[2477]: Invalid user eb from 45.93.201.90 port 36490 Dec 28 16:34:49 host sshd[2477]: input_userauth_request: invalid user eb [preauth] Dec 28 16:34:49 host sshd[2477]: pam_unix(sshd:auth): check pass; user unknown Dec 28 16:34:49 host sshd[2477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 28 16:34:52 host sshd[2477]: Failed password for invalid user eb from 45.93.201.90 port 36490 ssh2 Dec 28 16:34:55 host sshd[2477]: pam_unix(sshd:auth): check pass; user unknown Dec 28 16:34:57 host sshd[2477]: Failed password for invalid user eb from 45.93.201.90 port 36490 ssh2 Dec 28 16:35:00 host sshd[2477]: pam_unix(sshd:auth): check pass; user unknown Dec 28 16:35:03 host sshd[2477]: Failed password for invalid user eb from 45.93.201.90 port 36490 ssh2 Dec 28 16:35:06 host sshd[2477]: Connection closed by 45.93.201.90 port 36490 [preauth] Dec 28 16:35:06 host sshd[2477]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 28 16:35:56 host sshd[2673]: ssh_dispatch_run_fatal: Connection from 177.207.220.99 port 58133: Connection corrupted [preauth] Dec 28 16:40:57 host sshd[3668]: Invalid user oracle from 162.218.126.136 port 42764 Dec 28 16:40:57 host sshd[3668]: input_userauth_request: invalid user oracle [preauth] Dec 28 16:40:58 host sshd[3668]: pam_unix(sshd:auth): check pass; user unknown Dec 28 16:40:58 host sshd[3668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 28 16:41:00 host sshd[3668]: Failed password for invalid user oracle from 162.218.126.136 port 42764 ssh2 Dec 28 16:41:00 host sshd[3668]: Connection closed by 162.218.126.136 port 42764 [preauth] Dec 28 16:41:23 host sshd[3735]: Invalid user test from 41.197.31.178 port 34476 Dec 28 16:41:23 host sshd[3735]: input_userauth_request: invalid user test [preauth] Dec 28 16:41:24 host sshd[3735]: pam_unix(sshd:auth): check pass; user unknown Dec 28 16:41:24 host sshd[3735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 28 16:41:26 host sshd[3735]: Failed password for invalid user test from 41.197.31.178 port 34476 ssh2 Dec 28 16:41:26 host sshd[3735]: Connection closed by 41.197.31.178 port 34476 [preauth] Dec 28 16:47:31 host sshd[4746]: Invalid user george from 107.189.30.59 port 33160 Dec 28 16:47:31 host sshd[4746]: input_userauth_request: invalid user george [preauth] Dec 28 16:47:31 host sshd[4746]: pam_unix(sshd:auth): check pass; user unknown Dec 28 16:47:31 host sshd[4746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Dec 28 16:47:33 host sshd[4746]: Failed password for invalid user george from 107.189.30.59 port 33160 ssh2 Dec 28 16:47:34 host sshd[4746]: Connection closed by 107.189.30.59 port 33160 [preauth] Dec 28 17:01:05 host sshd[6996]: Invalid user user1 from 106.10.122.53 port 49968 Dec 28 17:01:05 host sshd[6996]: input_userauth_request: invalid user user1 [preauth] Dec 28 17:01:05 host sshd[6996]: pam_unix(sshd:auth): check pass; user unknown Dec 28 17:01:05 host sshd[6996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 28 17:01:07 host sshd[6996]: Failed password for invalid user user1 from 106.10.122.53 port 49968 ssh2 Dec 28 17:01:08 host sshd[6996]: Connection closed by 106.10.122.53 port 49968 [preauth] Dec 28 17:01:45 host sshd[7087]: User root from 103.13.40.2 not allowed because not listed in AllowUsers Dec 28 17:01:45 host sshd[7087]: input_userauth_request: invalid user root [preauth] Dec 28 17:01:45 host unix_chkpwd[7089]: password check failed for user (root) Dec 28 17:01:45 host sshd[7087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 user=root Dec 28 17:01:45 host sshd[7087]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 17:01:46 host sshd[7087]: Failed password for invalid user root from 103.13.40.2 port 42904 ssh2 Dec 28 17:01:47 host sshd[7087]: Connection closed by 103.13.40.2 port 42904 [preauth] Dec 28 17:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 17:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 17:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 17:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 17:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 17:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 17:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 17:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 17:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 28 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 28 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 28 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 28 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 28 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 28 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 28 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 28 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 17:21:48 host sshd[10533]: Did not receive identification string from 27.71.231.21 port 33176 Dec 28 17:21:49 host sshd[10535]: Invalid user deployer from 27.71.231.21 port 33178 Dec 28 17:21:49 host sshd[10536]: User ftp from 27.71.231.21 not allowed because not listed in AllowUsers Dec 28 17:21:49 host sshd[10535]: input_userauth_request: invalid user deployer [preauth] Dec 28 17:21:49 host sshd[10536]: input_userauth_request: invalid user ftp [preauth] Dec 28 17:21:49 host sshd[10537]: Invalid user web from 27.71.231.21 port 33512 Dec 28 17:21:49 host sshd[10541]: Invalid user dev from 27.71.231.21 port 33488 Dec 28 17:21:49 host sshd[10537]: input_userauth_request: invalid user web [preauth] Dec 28 17:21:49 host sshd[10541]: input_userauth_request: invalid user dev [preauth] Dec 28 17:21:49 host sshd[10538]: Invalid user oracle from 27.71.231.21 port 33244 Dec 28 17:21:49 host sshd[10538]: input_userauth_request: invalid user oracle [preauth] Dec 28 17:21:49 host sshd[10540]: Invalid user discord from 27.71.231.21 port 33304 Dec 28 17:21:49 host sshd[10540]: input_userauth_request: invalid user discord [preauth] Dec 28 17:21:49 host sshd[10544]: Invalid user guest from 27.71.231.21 port 33328 Dec 28 17:21:49 host sshd[10544]: input_userauth_request: invalid user guest [preauth] Dec 28 17:21:49 host sshd[10535]: pam_unix(sshd:auth): check pass; user unknown Dec 28 17:21:49 host sshd[10535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 28 17:21:49 host unix_chkpwd[10560]: password check failed for user (ftp) Dec 28 17:21:49 host sshd[10536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 user=ftp Dec 28 17:21:49 host sshd[10536]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Dec 28 17:21:49 host sshd[10537]: pam_unix(sshd:auth): check pass; user unknown Dec 28 17:21:49 host sshd[10537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 28 17:21:49 host sshd[10541]: pam_unix(sshd:auth): check pass; user unknown Dec 28 17:21:49 host sshd[10541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 28 17:21:49 host sshd[10538]: pam_unix(sshd:auth): check pass; user unknown Dec 28 17:21:49 host sshd[10538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 28 17:21:49 host sshd[10540]: pam_unix(sshd:auth): check pass; user unknown Dec 28 17:21:49 host sshd[10540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 28 17:21:49 host sshd[10544]: pam_unix(sshd:auth): check pass; user unknown Dec 28 17:21:49 host sshd[10544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 28 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 28 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 17:21:49 host sshd[10546]: Invalid user hello from 27.71.231.21 port 33236 Dec 28 17:21:49 host sshd[10546]: input_userauth_request: invalid user hello [preauth] Dec 28 17:21:49 host sshd[10543]: Invalid user steam from 27.71.231.21 port 33508 Dec 28 17:21:49 host sshd[10545]: Invalid user steam from 27.71.231.21 port 33352 Dec 28 17:21:49 host sshd[10543]: input_userauth_request: invalid user steam [preauth] Dec 28 17:21:49 host sshd[10542]: Invalid user jenkins from 27.71.231.21 port 33468 Dec 28 17:21:49 host sshd[10539]: Invalid user postgres from 27.71.231.21 port 33528 Dec 28 17:21:49 host sshd[10542]: input_userauth_request: invalid user jenkins [preauth] Dec 28 17:21:49 host sshd[10539]: input_userauth_request: invalid user postgres [preauth] Dec 28 17:21:49 host sshd[10545]: input_userauth_request: invalid user steam [preauth] Dec 28 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 17:21:49 host sshd[10545]: pam_unix(sshd:auth): check pass; user unknown Dec 28 17:21:49 host sshd[10545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 28 17:21:49 host sshd[10539]: pam_unix(sshd:auth): check pass; user unknown Dec 28 17:21:49 host sshd[10539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 28 17:21:49 host sshd[10546]: pam_unix(sshd:auth): check pass; user unknown Dec 28 17:21:49 host sshd[10546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 28 17:21:49 host sshd[10543]: pam_unix(sshd:auth): check pass; user unknown Dec 28 17:21:49 host sshd[10543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 28 17:21:49 host sshd[10542]: pam_unix(sshd:auth): check pass; user unknown Dec 28 17:21:49 host sshd[10542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 28 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=vfmassets user-2=wwwtestugo user-3=shalinijames user-4=pmcresources user-5=wwwkmaorg user-6=disposeat user-7=remysagr user-8=wwwkapin user-9=woodpeck user-10=gifterman user-11=palco123 user-12=phmetals user-13=kottayamcalldriv user-14=mrsclean user-15=wwwnexidigital user-16=bonifacegroup user-17=wwwevmhonda user-18=wwwletsstalkfood user-19=straightcurve user-20=dartsimp user-21=a2zgroup user-22=laundryboniface user-23=cochintaxi user-24=wwwkaretakers user-25=travelboniface user-26=wwwrmswll user-27=keralaholi user-28=wwwresourcehunte user-29=ugotscom user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 28 17:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 28 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-iga0AjwiX0aMNc4x.~ Dec 28 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-iga0AjwiX0aMNc4x.~' Dec 28 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-iga0AjwiX0aMNc4x.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 28 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 17:21:50 host sshd[10590]: Invalid user oracle from 27.71.231.21 port 33490 Dec 28 17:21:50 host sshd[10590]: input_userauth_request: invalid user oracle [preauth] Dec 28 17:21:50 host sshd[10589]: Invalid user git from 27.71.231.21 port 33464 Dec 28 17:21:50 host sshd[10589]: input_userauth_request: invalid user git [preauth] Dec 28 17:21:50 host sshd[10592]: Invalid user ftpuser from 27.71.231.21 port 33410 Dec 28 17:21:50 host sshd[10592]: input_userauth_request: invalid user ftpuser [preauth] Dec 28 17:21:50 host sshd[10596]: Invalid user postgres from 27.71.231.21 port 33420 Dec 28 17:21:50 host sshd[10596]: input_userauth_request: invalid user postgres [preauth] Dec 28 17:21:50 host sshd[10597]: Invalid user oracle from 27.71.231.21 port 33418 Dec 28 17:21:50 host sshd[10600]: Invalid user ubuntu from 27.71.231.21 port 33340 Dec 28 17:21:50 host sshd[10595]: Invalid user dockeradmin from 27.71.231.21 port 33188 Dec 28 17:21:50 host sshd[10595]: input_userauth_request: invalid user dockeradmin [preauth] Dec 28 17:21:50 host sshd[10597]: input_userauth_request: invalid user oracle [preauth] Dec 28 17:21:50 host sshd[10598]: Invalid user devops from 27.71.231.21 port 33226 Dec 28 17:21:50 host sshd[10601]: Invalid user elastic from 27.71.231.21 port 33446 Dec 28 17:21:50 host sshd[10602]: Invalid user vagrant from 27.71.231.21 port 33544 Dec 28 17:21:50 host sshd[10600]: input_userauth_request: invalid user ubuntu [preauth] Dec 28 17:21:50 host sshd[10593]: Invalid user guest from 27.71.231.21 port 33194 Dec 28 17:21:50 host sshd[10602]: input_userauth_request: invalid user vagrant [preauth] Dec 28 17:21:50 host sshd[10593]: input_userauth_request: invalid user guest [preauth] Dec 28 17:21:50 host sshd[10601]: input_userauth_request: invalid user elastic [preauth] Dec 28 17:21:50 host sshd[10598]: input_userauth_request: invalid user devops [preauth] Dec 28 17:21:50 host sshd[10604]: Invalid user www from 27.71.231.21 port 33368 Dec 28 17:21:50 host sshd[10605]: Invalid user dmdba from 27.71.231.21 port 33260 Dec 28 17:21:50 host sshd[10604]: input_userauth_request: invalid user www [preauth] Dec 28 17:21:50 host sshd[10605]: input_userauth_request: invalid user dmdba [preauth] Dec 28 17:21:50 host sshd[10603]: Invalid user mc from 27.71.231.21 port 33504 Dec 28 17:21:50 host sshd[10603]: input_userauth_request: invalid user mc [preauth] Dec 28 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 28 17:21:50 host sshd[10594]: Invalid user guest from 27.71.231.21 port 33208 Dec 28 17:21:50 host sshd[10594]: input_userauth_request: invalid user guest [preauth] Dec 28 17:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 17:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 17:21:50 host sshd[10597]: pam_unix(sshd:auth): check pass; user unknown Dec 28 17:21:50 host sshd[10597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 28 17:21:50 host sshd[10592]: pam_unix(sshd:auth): check pass; user unknown Dec 28 17:21:50 host sshd[10592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 28 17:21:50 host sshd[10590]: pam_unix(sshd:auth): check pass; user unknown Dec 28 17:21:50 host sshd[10590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 28 17:21:50 host sshd[10595]: pam_unix(sshd:auth): check pass; user unknown Dec 28 17:21:50 host sshd[10595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 28 17:21:50 host sshd[10596]: pam_unix(sshd:auth): check pass; user unknown Dec 28 17:21:50 host sshd[10596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 28 17:21:50 host sshd[10589]: pam_unix(sshd:auth): check pass; user unknown Dec 28 17:21:50 host sshd[10589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 28 17:21:50 host sshd[10594]: pam_unix(sshd:auth): check pass; user unknown Dec 28 17:21:50 host sshd[10594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 28 17:21:50 host sshd[10600]: pam_unix(sshd:auth): check pass; user unknown Dec 28 17:21:50 host sshd[10600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 28 17:21:50 host sshd[10601]: pam_unix(sshd:auth): check pass; user unknown Dec 28 17:21:50 host sshd[10601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 28 17:21:50 host sshd[10598]: pam_unix(sshd:auth): check pass; user unknown Dec 28 17:21:50 host sshd[10598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 28 17:21:50 host sshd[10602]: pam_unix(sshd:auth): check pass; user unknown Dec 28 17:21:50 host sshd[10602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 28 17:21:50 host sshd[10593]: pam_unix(sshd:auth): check pass; user unknown Dec 28 17:21:50 host sshd[10593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 28 17:21:50 host sshd[10605]: pam_unix(sshd:auth): check pass; user unknown Dec 28 17:21:50 host sshd[10605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 28 17:21:50 host sshd[10604]: pam_unix(sshd:auth): check pass; user unknown Dec 28 17:21:50 host sshd[10604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 28 17:21:50 host sshd[10603]: pam_unix(sshd:auth): check pass; user unknown Dec 28 17:21:50 host sshd[10603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.231.21 Dec 28 17:21:50 host sshd[10535]: Failed password for invalid user deployer from 27.71.231.21 port 33178 ssh2 Dec 28 17:21:50 host sshd[10536]: Failed password for invalid user ftp from 27.71.231.21 port 33392 ssh2 Dec 28 17:21:50 host sshd[10537]: Failed password for invalid user web from 27.71.231.21 port 33512 ssh2 Dec 28 17:21:50 host sshd[10538]: Failed password for invalid user oracle from 27.71.231.21 port 33244 ssh2 Dec 28 17:21:50 host sshd[10541]: Failed password for invalid user dev from 27.71.231.21 port 33488 ssh2 Dec 28 17:21:50 host sshd[10540]: Failed password for invalid user discord from 27.71.231.21 port 33304 ssh2 Dec 28 17:21:50 host sshd[10544]: Failed password for invalid user guest from 27.71.231.21 port 33328 ssh2 Dec 28 17:21:50 host sshd[10535]: Connection closed by 27.71.231.21 port 33178 [preauth] Dec 28 17:21:50 host sshd[10536]: Connection closed by 27.71.231.21 port 33392 [preauth] Dec 28 17:21:50 host sshd[10537]: Connection closed by 27.71.231.21 port 33512 [preauth] Dec 28 17:21:50 host sshd[10538]: Connection closed by 27.71.231.21 port 33244 [preauth] Dec 28 17:21:50 host sshd[10541]: Connection closed by 27.71.231.21 port 33488 [preauth] Dec 28 17:21:50 host sshd[10544]: Connection closed by 27.71.231.21 port 33328 [preauth] Dec 28 17:21:50 host sshd[10540]: Connection closed by 27.71.231.21 port 33304 [preauth] Dec 28 17:21:51 host sshd[10545]: Failed password for invalid user steam from 27.71.231.21 port 33352 ssh2 Dec 28 17:21:51 host sshd[10539]: Failed password for invalid user postgres from 27.71.231.21 port 33528 ssh2 Dec 28 17:21:51 host sshd[10543]: Failed password for invalid user steam from 27.71.231.21 port 33508 ssh2 Dec 28 17:21:51 host sshd[10546]: Failed password for invalid user hello from 27.71.231.21 port 33236 ssh2 Dec 28 17:21:51 host sshd[10542]: Failed password for invalid user jenkins from 27.71.231.21 port 33468 ssh2 Dec 28 17:21:51 host sshd[10545]: Connection closed by 27.71.231.21 port 33352 [preauth] Dec 28 17:21:51 host sshd[10539]: Connection closed by 27.71.231.21 port 33528 [preauth] Dec 28 17:21:51 host sshd[10543]: Connection closed by 27.71.231.21 port 33508 [preauth] Dec 28 17:21:51 host sshd[10546]: Connection closed by 27.71.231.21 port 33236 [preauth] Dec 28 17:21:51 host sshd[10542]: Connection closed by 27.71.231.21 port 33468 [preauth] Dec 28 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 28 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 17:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 17:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 17:21:52 host sshd[10597]: Failed password for invalid user oracle from 27.71.231.21 port 33418 ssh2 Dec 28 17:21:52 host sshd[10592]: Failed password for invalid user ftpuser from 27.71.231.21 port 33410 ssh2 Dec 28 17:21:52 host sshd[10590]: Failed password for invalid user oracle from 27.71.231.21 port 33490 ssh2 Dec 28 17:21:52 host sshd[10595]: Failed password for invalid user dockeradmin from 27.71.231.21 port 33188 ssh2 Dec 28 17:21:52 host sshd[10596]: Failed password for invalid user postgres from 27.71.231.21 port 33420 ssh2 Dec 28 17:21:52 host sshd[10589]: Failed password for invalid user git from 27.71.231.21 port 33464 ssh2 Dec 28 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 28 17:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 28 17:21:52 host sshd[10594]: Failed password for invalid user guest from 27.71.231.21 port 33208 ssh2 Dec 28 17:21:52 host sshd[10600]: Failed password for invalid user ubuntu from 27.71.231.21 port 33340 ssh2 Dec 28 17:21:52 host sshd[10598]: Failed password for invalid user devops from 27.71.231.21 port 33226 ssh2 Dec 28 17:21:52 host sshd[10601]: Failed password for invalid user elastic from 27.71.231.21 port 33446 ssh2 Dec 28 17:21:52 host sshd[10602]: Failed password for invalid user vagrant from 27.71.231.21 port 33544 ssh2 Dec 28 17:21:52 host sshd[10593]: Failed password for invalid user guest from 27.71.231.21 port 33194 ssh2 Dec 28 17:21:52 host sshd[10605]: Failed password for invalid user dmdba from 27.71.231.21 port 33260 ssh2 Dec 28 17:21:52 host sshd[10604]: Failed password for invalid user www from 27.71.231.21 port 33368 ssh2 Dec 28 17:21:52 host sshd[10603]: Failed password for invalid user mc from 27.71.231.21 port 33504 ssh2 Dec 28 17:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 28 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 28 17:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 17:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 28 17:21:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 17:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 17:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 28 17:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 17:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 28 17:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 17:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 28 17:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 17:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 17:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 28 17:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 17:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 17:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 28 17:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 17:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 17:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 28 17:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 17:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 17:59:58 host sshd[17078]: Did not receive identification string from 36.7.85.8 port 52086 Dec 28 18:09:20 host sshd[18652]: Connection closed by 172.104.11.4 port 61352 [preauth] Dec 28 18:09:22 host sshd[18661]: Connection closed by 172.104.11.4 port 61358 [preauth] Dec 28 18:09:24 host sshd[18666]: Connection closed by 172.104.11.4 port 61364 [preauth] Dec 28 18:14:51 host sshd[19564]: Invalid user user2 from 142.93.210.182 port 36036 Dec 28 18:14:51 host sshd[19564]: input_userauth_request: invalid user user2 [preauth] Dec 28 18:14:51 host sshd[19564]: pam_unix(sshd:auth): check pass; user unknown Dec 28 18:14:51 host sshd[19564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.210.182 Dec 28 18:14:52 host sshd[19564]: Failed password for invalid user user2 from 142.93.210.182 port 36036 ssh2 Dec 28 18:14:52 host sshd[19564]: Received disconnect from 142.93.210.182 port 36036:11: Bye Bye [preauth] Dec 28 18:14:52 host sshd[19564]: Disconnected from 142.93.210.182 port 36036 [preauth] Dec 28 18:18:06 host sshd[20106]: Invalid user dst from 80.68.7.50 port 36704 Dec 28 18:18:06 host sshd[20106]: input_userauth_request: invalid user dst [preauth] Dec 28 18:18:06 host sshd[20106]: pam_unix(sshd:auth): check pass; user unknown Dec 28 18:18:06 host sshd[20106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.68.7.50 Dec 28 18:18:08 host sshd[20106]: Failed password for invalid user dst from 80.68.7.50 port 36704 ssh2 Dec 28 18:18:09 host sshd[20106]: Received disconnect from 80.68.7.50 port 36704:11: Bye Bye [preauth] Dec 28 18:18:09 host sshd[20106]: Disconnected from 80.68.7.50 port 36704 [preauth] Dec 28 18:18:21 host sshd[20136]: Invalid user ec from 45.93.201.90 port 42472 Dec 28 18:18:21 host sshd[20136]: input_userauth_request: invalid user ec [preauth] Dec 28 18:18:21 host sshd[20136]: pam_unix(sshd:auth): check pass; user unknown Dec 28 18:18:21 host sshd[20136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 28 18:18:23 host sshd[20136]: Failed password for invalid user ec from 45.93.201.90 port 42472 ssh2 Dec 28 18:18:26 host sshd[20136]: pam_unix(sshd:auth): check pass; user unknown Dec 28 18:18:28 host sshd[20136]: Failed password for invalid user ec from 45.93.201.90 port 42472 ssh2 Dec 28 18:18:31 host sshd[20136]: pam_unix(sshd:auth): check pass; user unknown Dec 28 18:18:33 host sshd[20136]: Failed password for invalid user ec from 45.93.201.90 port 42472 ssh2 Dec 28 18:18:36 host sshd[20136]: Connection closed by 45.93.201.90 port 42472 [preauth] Dec 28 18:18:36 host sshd[20136]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 28 18:18:49 host sshd[20320]: User root from 142.93.210.182 not allowed because not listed in AllowUsers Dec 28 18:18:49 host sshd[20320]: input_userauth_request: invalid user root [preauth] Dec 28 18:18:49 host unix_chkpwd[20322]: password check failed for user (root) Dec 28 18:18:49 host sshd[20320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.210.182 user=root Dec 28 18:18:49 host sshd[20320]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 18:18:50 host sshd[20320]: Failed password for invalid user root from 142.93.210.182 port 35214 ssh2 Dec 28 18:18:50 host sshd[20320]: Received disconnect from 142.93.210.182 port 35214:11: Bye Bye [preauth] Dec 28 18:18:50 host sshd[20320]: Disconnected from 142.93.210.182 port 35214 [preauth] Dec 28 18:19:55 host sshd[20525]: User root from 80.68.7.50 not allowed because not listed in AllowUsers Dec 28 18:19:55 host sshd[20525]: input_userauth_request: invalid user root [preauth] Dec 28 18:19:55 host unix_chkpwd[20528]: password check failed for user (root) Dec 28 18:19:55 host sshd[20525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.68.7.50 user=root Dec 28 18:19:55 host sshd[20525]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 18:19:56 host sshd[20525]: Failed password for invalid user root from 80.68.7.50 port 35454 ssh2 Dec 28 18:19:56 host sshd[20525]: Received disconnect from 80.68.7.50 port 35454:11: Bye Bye [preauth] Dec 28 18:19:56 host sshd[20525]: Disconnected from 80.68.7.50 port 35454 [preauth] Dec 28 18:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 18:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 18:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 18:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 18:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 18:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 18:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 18:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 18:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 28 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 28 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 28 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 28 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 28 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 28 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 28 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 28 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 18:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 18:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 18:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 18:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 28 18:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 18:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 18:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=straightcurve user-2=wwwletsstalkfood user-3=wwwevmhonda user-4=bonifacegroup user-5=mrsclean user-6=wwwnexidigital user-7=phmetals user-8=kottayamcalldriv user-9=palco123 user-10=gifterman user-11=wwwkapin user-12=woodpeck user-13=wwwkmaorg user-14=disposeat user-15=remysagr user-16=pmcresources user-17=shalinijames user-18=wwwtestugo user-19=vfmassets user-20=wwwpmcresource user-21=ugotscom user-22=keralaholi user-23=wwwresourcehunte user-24=wwwrmswll user-25=travelboniface user-26=cochintaxi user-27=wwwkaretakers user-28=laundryboniface user-29=a2zgroup user-30=dartsimp feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 28 18:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 28 18:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 18:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 18:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 18:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 18:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-nJs04t1GQL2pdjj1.~ Dec 28 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-nJs04t1GQL2pdjj1.~' Dec 28 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-nJs04t1GQL2pdjj1.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 28 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 28 18:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 18:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 28 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 18:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 18:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 18:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 18:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 28 18:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 28 18:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 28 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 28 18:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 18:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 18:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 28 18:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 18:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 18:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 28 18:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 18:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 18:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 28 18:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 18:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 28 18:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 18:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 18:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 28 18:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 18:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 18:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 28 18:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 18:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 18:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 28 18:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 18:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 18:27:45 host sshd[22065]: Connection closed by 162.142.125.213 port 57356 [preauth] Dec 28 18:28:06 host sshd[22138]: Did not receive identification string from 103.203.57.11 port 52832 Dec 28 18:28:16 host sshd[22152]: Invalid user tiago from 103.13.40.2 port 53172 Dec 28 18:28:16 host sshd[22152]: input_userauth_request: invalid user tiago [preauth] Dec 28 18:28:16 host sshd[22152]: pam_unix(sshd:auth): check pass; user unknown Dec 28 18:28:16 host sshd[22152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 28 18:28:18 host sshd[22152]: Failed password for invalid user tiago from 103.13.40.2 port 53172 ssh2 Dec 28 18:28:18 host sshd[22152]: Connection closed by 103.13.40.2 port 53172 [preauth] Dec 28 18:28:22 host sshd[22173]: Invalid user user from 106.10.122.53 port 51284 Dec 28 18:28:22 host sshd[22173]: input_userauth_request: invalid user user [preauth] Dec 28 18:28:23 host sshd[22173]: pam_unix(sshd:auth): check pass; user unknown Dec 28 18:28:23 host sshd[22173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 28 18:28:25 host sshd[22173]: Failed password for invalid user user from 106.10.122.53 port 51284 ssh2 Dec 28 18:28:25 host sshd[22173]: Connection closed by 106.10.122.53 port 51284 [preauth] Dec 28 18:28:28 host sshd[22209]: User root from 41.197.31.178 not allowed because not listed in AllowUsers Dec 28 18:28:28 host sshd[22209]: input_userauth_request: invalid user root [preauth] Dec 28 18:28:28 host unix_chkpwd[22213]: password check failed for user (root) Dec 28 18:28:28 host sshd[22209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 user=root Dec 28 18:28:28 host sshd[22209]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 18:28:30 host sshd[22209]: Failed password for invalid user root from 41.197.31.178 port 43776 ssh2 Dec 28 18:28:31 host sshd[22209]: Connection closed by 41.197.31.178 port 43776 [preauth] Dec 28 18:34:14 host sshd[23097]: Invalid user tecmint from 43.153.83.173 port 47840 Dec 28 18:34:14 host sshd[23097]: input_userauth_request: invalid user tecmint [preauth] Dec 28 18:34:14 host sshd[23097]: pam_unix(sshd:auth): check pass; user unknown Dec 28 18:34:14 host sshd[23097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.83.173 Dec 28 18:34:17 host sshd[23097]: Failed password for invalid user tecmint from 43.153.83.173 port 47840 ssh2 Dec 28 18:34:17 host sshd[23097]: Received disconnect from 43.153.83.173 port 47840:11: Bye Bye [preauth] Dec 28 18:34:17 host sshd[23097]: Disconnected from 43.153.83.173 port 47840 [preauth] Dec 28 18:34:57 host sshd[23189]: Invalid user pradeep from 201.182.72.250 port 57514 Dec 28 18:34:57 host sshd[23189]: input_userauth_request: invalid user pradeep [preauth] Dec 28 18:34:57 host sshd[23189]: pam_unix(sshd:auth): check pass; user unknown Dec 28 18:34:57 host sshd[23189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.182.72.250 Dec 28 18:34:59 host sshd[23189]: Failed password for invalid user pradeep from 201.182.72.250 port 57514 ssh2 Dec 28 18:35:00 host sshd[23189]: Received disconnect from 201.182.72.250 port 57514:11: Bye Bye [preauth] Dec 28 18:35:00 host sshd[23189]: Disconnected from 201.182.72.250 port 57514 [preauth] Dec 28 18:35:15 host sshd[23251]: Invalid user raul from 85.172.107.10 port 48870 Dec 28 18:35:15 host sshd[23251]: input_userauth_request: invalid user raul [preauth] Dec 28 18:35:15 host sshd[23251]: pam_unix(sshd:auth): check pass; user unknown Dec 28 18:35:15 host sshd[23251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.172.107.10 Dec 28 18:35:17 host sshd[23251]: Failed password for invalid user raul from 85.172.107.10 port 48870 ssh2 Dec 28 18:35:17 host sshd[23255]: User root from 131.72.64.18 not allowed because not listed in AllowUsers Dec 28 18:35:17 host sshd[23255]: input_userauth_request: invalid user root [preauth] Dec 28 18:35:17 host unix_chkpwd[23262]: password check failed for user (root) Dec 28 18:35:17 host sshd[23255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.72.64.18 user=root Dec 28 18:35:17 host sshd[23255]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 18:35:17 host sshd[23251]: Received disconnect from 85.172.107.10 port 48870:11: Bye Bye [preauth] Dec 28 18:35:17 host sshd[23251]: Disconnected from 85.172.107.10 port 48870 [preauth] Dec 28 18:35:19 host sshd[23255]: Failed password for invalid user root from 131.72.64.18 port 44452 ssh2 Dec 28 18:35:19 host sshd[23255]: Received disconnect from 131.72.64.18 port 44452:11: Bye Bye [preauth] Dec 28 18:35:19 host sshd[23255]: Disconnected from 131.72.64.18 port 44452 [preauth] Dec 28 18:36:01 host sshd[23346]: Invalid user huang from 159.223.146.249 port 49448 Dec 28 18:36:01 host sshd[23346]: input_userauth_request: invalid user huang [preauth] Dec 28 18:36:01 host sshd[23346]: pam_unix(sshd:auth): check pass; user unknown Dec 28 18:36:01 host sshd[23346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.146.249 Dec 28 18:36:04 host sshd[23346]: Failed password for invalid user huang from 159.223.146.249 port 49448 ssh2 Dec 28 18:36:04 host sshd[23346]: Received disconnect from 159.223.146.249 port 49448:11: Bye Bye [preauth] Dec 28 18:36:04 host sshd[23346]: Disconnected from 159.223.146.249 port 49448 [preauth] Dec 28 18:36:54 host sshd[23566]: Connection closed by 223.75.51.167 port 26810 [preauth] Dec 28 18:37:03 host sshd[23593]: User root from 92.46.108.20 not allowed because not listed in AllowUsers Dec 28 18:37:03 host sshd[23593]: input_userauth_request: invalid user root [preauth] Dec 28 18:37:03 host sshd[23610]: Invalid user ftptest from 47.24.26.23 port 42414 Dec 28 18:37:03 host sshd[23610]: input_userauth_request: invalid user ftptest [preauth] Dec 28 18:37:03 host sshd[23610]: pam_unix(sshd:auth): check pass; user unknown Dec 28 18:37:03 host sshd[23610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.24.26.23 Dec 28 18:37:04 host unix_chkpwd[23613]: password check failed for user (root) Dec 28 18:37:04 host sshd[23593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 user=root Dec 28 18:37:04 host sshd[23593]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 18:37:05 host sshd[23610]: Failed password for invalid user ftptest from 47.24.26.23 port 42414 ssh2 Dec 28 18:37:06 host sshd[23610]: Received disconnect from 47.24.26.23 port 42414:11: Bye Bye [preauth] Dec 28 18:37:06 host sshd[23610]: Disconnected from 47.24.26.23 port 42414 [preauth] Dec 28 18:37:06 host sshd[23593]: Failed password for invalid user root from 92.46.108.20 port 45660 ssh2 Dec 28 18:37:07 host sshd[23593]: Connection closed by 92.46.108.20 port 45660 [preauth] Dec 28 18:38:09 host sshd[23746]: Invalid user gitlab from 82.170.109.90 port 38958 Dec 28 18:38:09 host sshd[23746]: input_userauth_request: invalid user gitlab [preauth] Dec 28 18:38:09 host sshd[23746]: pam_unix(sshd:auth): check pass; user unknown Dec 28 18:38:09 host sshd[23746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.170.109.90 Dec 28 18:38:10 host sshd[23746]: Failed password for invalid user gitlab from 82.170.109.90 port 38958 ssh2 Dec 28 18:38:11 host sshd[23746]: Received disconnect from 82.170.109.90 port 38958:11: Bye Bye [preauth] Dec 28 18:38:11 host sshd[23746]: Disconnected from 82.170.109.90 port 38958 [preauth] Dec 28 18:39:37 host sshd[23974]: User root from 99.130.111.161 not allowed because not listed in AllowUsers Dec 28 18:39:37 host sshd[23974]: input_userauth_request: invalid user root [preauth] Dec 28 18:39:37 host unix_chkpwd[23981]: password check failed for user (root) Dec 28 18:39:37 host sshd[23974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=99.130.111.161 user=root Dec 28 18:39:37 host sshd[23974]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 18:39:39 host sshd[23974]: Failed password for invalid user root from 99.130.111.161 port 51224 ssh2 Dec 28 18:39:40 host sshd[23974]: Received disconnect from 99.130.111.161 port 51224:11: Bye Bye [preauth] Dec 28 18:39:40 host sshd[23974]: Disconnected from 99.130.111.161 port 51224 [preauth] Dec 28 18:39:53 host sshd[24016]: User root from 82.170.109.90 not allowed because not listed in AllowUsers Dec 28 18:39:53 host sshd[24016]: input_userauth_request: invalid user root [preauth] Dec 28 18:39:53 host unix_chkpwd[24019]: password check failed for user (root) Dec 28 18:39:53 host sshd[24016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.170.109.90 user=root Dec 28 18:39:53 host sshd[24016]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 18:39:55 host sshd[24016]: Failed password for invalid user root from 82.170.109.90 port 42880 ssh2 Dec 28 18:39:55 host sshd[24016]: Received disconnect from 82.170.109.90 port 42880:11: Bye Bye [preauth] Dec 28 18:39:55 host sshd[24016]: Disconnected from 82.170.109.90 port 42880 [preauth] Dec 28 18:40:07 host sshd[24097]: User root from 201.182.72.250 not allowed because not listed in AllowUsers Dec 28 18:40:07 host sshd[24097]: input_userauth_request: invalid user root [preauth] Dec 28 18:40:07 host unix_chkpwd[24104]: password check failed for user (root) Dec 28 18:40:07 host sshd[24097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.182.72.250 user=root Dec 28 18:40:07 host sshd[24097]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 18:40:10 host sshd[24097]: Failed password for invalid user root from 201.182.72.250 port 56487 ssh2 Dec 28 18:40:10 host sshd[24097]: Received disconnect from 201.182.72.250 port 56487:11: Bye Bye [preauth] Dec 28 18:40:10 host sshd[24097]: Disconnected from 201.182.72.250 port 56487 [preauth] Dec 28 18:40:20 host sshd[24151]: Invalid user vps from 85.172.107.10 port 41514 Dec 28 18:40:20 host sshd[24151]: input_userauth_request: invalid user vps [preauth] Dec 28 18:40:20 host sshd[24151]: pam_unix(sshd:auth): check pass; user unknown Dec 28 18:40:20 host sshd[24151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.172.107.10 Dec 28 18:40:21 host sshd[24158]: Invalid user benson from 43.153.83.173 port 36850 Dec 28 18:40:21 host sshd[24158]: input_userauth_request: invalid user benson [preauth] Dec 28 18:40:21 host sshd[24158]: pam_unix(sshd:auth): check pass; user unknown Dec 28 18:40:21 host sshd[24158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.83.173 Dec 28 18:40:22 host sshd[24151]: Failed password for invalid user vps from 85.172.107.10 port 41514 ssh2 Dec 28 18:40:22 host sshd[24151]: Received disconnect from 85.172.107.10 port 41514:11: Bye Bye [preauth] Dec 28 18:40:22 host sshd[24151]: Disconnected from 85.172.107.10 port 41514 [preauth] Dec 28 18:40:23 host sshd[24158]: Failed password for invalid user benson from 43.153.83.173 port 36850 ssh2 Dec 28 18:40:23 host sshd[24158]: Received disconnect from 43.153.83.173 port 36850:11: Bye Bye [preauth] Dec 28 18:40:23 host sshd[24158]: Disconnected from 43.153.83.173 port 36850 [preauth] Dec 28 18:40:28 host sshd[24197]: User root from 104.219.41.87 not allowed because not listed in AllowUsers Dec 28 18:40:28 host sshd[24197]: input_userauth_request: invalid user root [preauth] Dec 28 18:40:28 host unix_chkpwd[24213]: password check failed for user (root) Dec 28 18:40:28 host sshd[24197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.219.41.87 user=root Dec 28 18:40:28 host sshd[24197]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 18:40:30 host sshd[24197]: Failed password for invalid user root from 104.219.41.87 port 42176 ssh2 Dec 28 18:40:30 host sshd[24197]: Received disconnect from 104.219.41.87 port 42176:11: Bye Bye [preauth] Dec 28 18:40:30 host sshd[24197]: Disconnected from 104.219.41.87 port 42176 [preauth] Dec 28 18:40:37 host sshd[24224]: User root from 47.24.26.23 not allowed because not listed in AllowUsers Dec 28 18:40:37 host sshd[24224]: input_userauth_request: invalid user root [preauth] Dec 28 18:40:37 host unix_chkpwd[24230]: password check failed for user (root) Dec 28 18:40:37 host sshd[24224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.24.26.23 user=root Dec 28 18:40:37 host sshd[24224]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 18:40:39 host sshd[24224]: Failed password for invalid user root from 47.24.26.23 port 51056 ssh2 Dec 28 18:40:40 host sshd[24224]: Received disconnect from 47.24.26.23 port 51056:11: Bye Bye [preauth] Dec 28 18:40:40 host sshd[24224]: Disconnected from 47.24.26.23 port 51056 [preauth] Dec 28 18:40:52 host sshd[24288]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Dec 28 18:40:52 host sshd[24288]: input_userauth_request: invalid user root [preauth] Dec 28 18:40:52 host unix_chkpwd[24300]: password check failed for user (root) Dec 28 18:40:52 host sshd[24288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Dec 28 18:40:52 host sshd[24288]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 18:40:53 host sshd[24293]: Invalid user front from 131.72.64.18 port 50776 Dec 28 18:40:53 host sshd[24293]: input_userauth_request: invalid user front [preauth] Dec 28 18:40:53 host sshd[24293]: pam_unix(sshd:auth): check pass; user unknown Dec 28 18:40:53 host sshd[24293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.72.64.18 Dec 28 18:40:54 host sshd[24288]: Failed password for invalid user root from 162.218.126.136 port 36360 ssh2 Dec 28 18:40:55 host sshd[24288]: Connection closed by 162.218.126.136 port 36360 [preauth] Dec 28 18:40:56 host sshd[24293]: Failed password for invalid user front from 131.72.64.18 port 50776 ssh2 Dec 28 18:40:56 host sshd[24293]: Received disconnect from 131.72.64.18 port 50776:11: Bye Bye [preauth] Dec 28 18:40:56 host sshd[24293]: Disconnected from 131.72.64.18 port 50776 [preauth] Dec 28 18:41:06 host sshd[24381]: User root from 99.130.111.161 not allowed because not listed in AllowUsers Dec 28 18:41:06 host sshd[24381]: input_userauth_request: invalid user root [preauth] Dec 28 18:41:06 host unix_chkpwd[24434]: password check failed for user (root) Dec 28 18:41:06 host sshd[24381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=99.130.111.161 user=root Dec 28 18:41:06 host sshd[24381]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 18:41:08 host sshd[24381]: Failed password for invalid user root from 99.130.111.161 port 49150 ssh2 Dec 28 18:41:09 host sshd[24458]: Invalid user andrew from 159.223.146.249 port 43680 Dec 28 18:41:09 host sshd[24458]: input_userauth_request: invalid user andrew [preauth] Dec 28 18:41:09 host sshd[24458]: pam_unix(sshd:auth): check pass; user unknown Dec 28 18:41:09 host sshd[24458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.146.249 Dec 28 18:41:11 host sshd[24458]: Failed password for invalid user andrew from 159.223.146.249 port 43680 ssh2 Dec 28 18:41:11 host sshd[24458]: Received disconnect from 159.223.146.249 port 43680:11: Bye Bye [preauth] Dec 28 18:41:11 host sshd[24458]: Disconnected from 159.223.146.249 port 43680 [preauth] Dec 28 18:41:31 host sshd[24580]: Invalid user ga from 85.172.107.10 port 36892 Dec 28 18:41:31 host sshd[24580]: input_userauth_request: invalid user ga [preauth] Dec 28 18:41:31 host sshd[24580]: pam_unix(sshd:auth): check pass; user unknown Dec 28 18:41:31 host sshd[24580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.172.107.10 Dec 28 18:41:33 host sshd[24580]: Failed password for invalid user ga from 85.172.107.10 port 36892 ssh2 Dec 28 18:42:17 host sshd[24747]: Invalid user raul from 159.223.146.249 port 39542 Dec 28 18:42:17 host sshd[24747]: input_userauth_request: invalid user raul [preauth] Dec 28 18:42:17 host sshd[24747]: pam_unix(sshd:auth): check pass; user unknown Dec 28 18:42:17 host sshd[24747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.146.249 Dec 28 18:42:19 host sshd[24747]: Failed password for invalid user raul from 159.223.146.249 port 39542 ssh2 Dec 28 18:42:20 host sshd[24747]: Received disconnect from 159.223.146.249 port 39542:11: Bye Bye [preauth] Dec 28 18:42:20 host sshd[24747]: Disconnected from 159.223.146.249 port 39542 [preauth] Dec 28 18:42:38 host sshd[24841]: Invalid user admin from 43.153.83.173 port 37836 Dec 28 18:42:38 host sshd[24841]: input_userauth_request: invalid user admin [preauth] Dec 28 18:42:38 host sshd[24841]: pam_unix(sshd:auth): check pass; user unknown Dec 28 18:42:38 host sshd[24841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.83.173 Dec 28 18:42:40 host sshd[24841]: Failed password for invalid user admin from 43.153.83.173 port 37836 ssh2 Dec 28 18:42:40 host sshd[24841]: Received disconnect from 43.153.83.173 port 37836:11: Bye Bye [preauth] Dec 28 18:42:40 host sshd[24841]: Disconnected from 43.153.83.173 port 37836 [preauth] Dec 28 18:42:45 host sshd[24886]: Invalid user deploy from 104.219.41.87 port 36836 Dec 28 18:42:45 host sshd[24886]: input_userauth_request: invalid user deploy [preauth] Dec 28 18:42:45 host sshd[24886]: pam_unix(sshd:auth): check pass; user unknown Dec 28 18:42:45 host sshd[24886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.219.41.87 Dec 28 18:42:47 host sshd[24886]: Failed password for invalid user deploy from 104.219.41.87 port 36836 ssh2 Dec 28 18:42:47 host sshd[24886]: Received disconnect from 104.219.41.87 port 36836:11: Bye Bye [preauth] Dec 28 18:42:47 host sshd[24886]: Disconnected from 104.219.41.87 port 36836 [preauth] Dec 28 19:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 19:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 19:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 19:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 19:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 19:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 19:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 28 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 28 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 28 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 28 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 28 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 28 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 28 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 28 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 19:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 19:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 19:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 19:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 28 19:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 19:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 19:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkapin user-2=woodpeck user-3=remysagr user-4=disposeat user-5=wwwkmaorg user-6=pmcresources user-7=wwwtestugo user-8=shalinijames user-9=vfmassets user-10=wwwletsstalkfood user-11=straightcurve user-12=wwwevmhonda user-13=bonifacegroup user-14=wwwnexidigital user-15=mrsclean user-16=phmetals user-17=kottayamcalldriv user-18=gifterman user-19=palco123 user-20=cochintaxi user-21=wwwkaretakers user-22=laundryboniface user-23=dartsimp user-24=a2zgroup user-25=wwwpmcresource user-26=ugotscom user-27=wwwrmswll user-28=wwwresourcehunte user-29=keralaholi user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 28 19:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 28 19:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 19:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 19:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 19:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 19:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 19:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-uT81Q21a9kuocrGe.~ Dec 28 19:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-uT81Q21a9kuocrGe.~' Dec 28 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-uT81Q21a9kuocrGe.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 28 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 28 19:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 19:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 28 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 28 19:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 28 19:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 28 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 28 19:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 19:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 19:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 28 19:21:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 19:21:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 19:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 28 19:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 19:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 19:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 28 19:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 19:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 28 19:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 19:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 28 19:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 19:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 19:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 28 19:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 19:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 19:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 28 19:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 19:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 19:38:29 host sshd[1694]: Invalid user ubnt from 188.244.141.168 port 38586 Dec 28 19:38:29 host sshd[1694]: input_userauth_request: invalid user ubnt [preauth] Dec 28 19:38:29 host sshd[1694]: pam_unix(sshd:auth): check pass; user unknown Dec 28 19:38:29 host sshd[1694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.244.141.168 Dec 28 19:38:31 host sshd[1694]: Failed password for invalid user ubnt from 188.244.141.168 port 38586 ssh2 Dec 28 19:38:33 host sshd[1694]: pam_unix(sshd:auth): check pass; user unknown Dec 28 19:38:36 host sshd[1694]: Failed password for invalid user ubnt from 188.244.141.168 port 38586 ssh2 Dec 28 19:38:36 host sshd[1694]: Failed password for invalid user ubnt from 188.244.141.168 port 38586 ssh2 Dec 28 19:38:37 host sshd[1694]: pam_unix(sshd:auth): check pass; user unknown Dec 28 19:38:39 host sshd[1694]: Failed password for invalid user ubnt from 188.244.141.168 port 38586 ssh2 Dec 28 19:38:40 host sshd[1694]: pam_unix(sshd:auth): check pass; user unknown Dec 28 19:38:43 host sshd[1694]: Failed password for invalid user ubnt from 188.244.141.168 port 38586 ssh2 Dec 28 19:48:11 host sshd[3711]: Bad protocol version identification 'GET / HTTP/1.1' from 143.198.226.17 port 42782 Dec 28 19:48:43 host sshd[3761]: Connection closed by 143.198.226.17 port 43846 [preauth] Dec 28 19:54:06 host sshd[4765]: User root from 103.13.40.2 not allowed because not listed in AllowUsers Dec 28 19:54:06 host sshd[4765]: input_userauth_request: invalid user root [preauth] Dec 28 19:54:06 host unix_chkpwd[4767]: password check failed for user (root) Dec 28 19:54:06 host sshd[4765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 user=root Dec 28 19:54:06 host sshd[4765]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 19:54:08 host sshd[4765]: Failed password for invalid user root from 103.13.40.2 port 35168 ssh2 Dec 28 19:54:08 host sshd[4765]: Connection closed by 103.13.40.2 port 35168 [preauth] Dec 28 19:55:27 host sshd[5119]: Invalid user user1 from 106.10.122.53 port 49848 Dec 28 19:55:27 host sshd[5119]: input_userauth_request: invalid user user1 [preauth] Dec 28 19:55:27 host sshd[5119]: pam_unix(sshd:auth): check pass; user unknown Dec 28 19:55:27 host sshd[5119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 28 19:55:29 host sshd[5119]: Failed password for invalid user user1 from 106.10.122.53 port 49848 ssh2 Dec 28 19:55:29 host sshd[5119]: Connection closed by 106.10.122.53 port 49848 [preauth] Dec 28 19:58:06 host sshd[5493]: User root from 128.199.28.158 not allowed because not listed in AllowUsers Dec 28 19:58:06 host sshd[5493]: input_userauth_request: invalid user root [preauth] Dec 28 19:58:06 host unix_chkpwd[5495]: password check failed for user (root) Dec 28 19:58:06 host sshd[5493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.28.158 user=root Dec 28 19:58:06 host sshd[5493]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 19:58:09 host sshd[5493]: Failed password for invalid user root from 128.199.28.158 port 52162 ssh2 Dec 28 19:58:09 host sshd[5493]: Received disconnect from 128.199.28.158 port 52162:11: Bye Bye [preauth] Dec 28 19:58:09 host sshd[5493]: Disconnected from 128.199.28.158 port 52162 [preauth] Dec 28 19:58:30 host sshd[5577]: Invalid user ftpuser from 194.113.236.217 port 47566 Dec 28 19:58:30 host sshd[5577]: input_userauth_request: invalid user ftpuser [preauth] Dec 28 19:58:30 host sshd[5577]: pam_unix(sshd:auth): check pass; user unknown Dec 28 19:58:30 host sshd[5577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.113.236.217 Dec 28 19:58:32 host sshd[5577]: Failed password for invalid user ftpuser from 194.113.236.217 port 47566 ssh2 Dec 28 19:58:32 host sshd[5577]: Received disconnect from 194.113.236.217 port 47566:11: Bye Bye [preauth] Dec 28 19:58:32 host sshd[5577]: Disconnected from 194.113.236.217 port 47566 [preauth] Dec 28 19:59:01 host sshd[5639]: User root from 107.173.156.194 not allowed because not listed in AllowUsers Dec 28 19:59:01 host sshd[5639]: input_userauth_request: invalid user root [preauth] Dec 28 19:59:01 host unix_chkpwd[5652]: password check failed for user (root) Dec 28 19:59:01 host sshd[5639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.173.156.194 user=root Dec 28 19:59:01 host sshd[5639]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 19:59:03 host sshd[5639]: Failed password for invalid user root from 107.173.156.194 port 57908 ssh2 Dec 28 19:59:03 host sshd[5639]: Received disconnect from 107.173.156.194 port 57908:11: Bye Bye [preauth] Dec 28 19:59:03 host sshd[5639]: Disconnected from 107.173.156.194 port 57908 [preauth] Dec 28 19:59:22 host sshd[5699]: Invalid user hg from 37.157.220.156 port 48894 Dec 28 19:59:22 host sshd[5699]: input_userauth_request: invalid user hg [preauth] Dec 28 19:59:22 host sshd[5699]: pam_unix(sshd:auth): check pass; user unknown Dec 28 19:59:22 host sshd[5699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.157.220.156 Dec 28 19:59:24 host sshd[5699]: Failed password for invalid user hg from 37.157.220.156 port 48894 ssh2 Dec 28 19:59:24 host sshd[5699]: Received disconnect from 37.157.220.156 port 48894:11: Bye Bye [preauth] Dec 28 19:59:24 host sshd[5699]: Disconnected from 37.157.220.156 port 48894 [preauth] Dec 28 19:59:36 host sshd[5747]: Invalid user everdata from 84.53.228.192 port 55026 Dec 28 19:59:36 host sshd[5747]: input_userauth_request: invalid user everdata [preauth] Dec 28 19:59:36 host sshd[5747]: pam_unix(sshd:auth): check pass; user unknown Dec 28 19:59:36 host sshd[5747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.53.228.192 Dec 28 19:59:38 host sshd[5747]: Failed password for invalid user everdata from 84.53.228.192 port 55026 ssh2 Dec 28 19:59:39 host sshd[5747]: Received disconnect from 84.53.228.192 port 55026:11: Bye Bye [preauth] Dec 28 19:59:39 host sshd[5747]: Disconnected from 84.53.228.192 port 55026 [preauth] Dec 28 20:00:28 host sshd[5988]: Invalid user test from 151.93.146.217 port 48824 Dec 28 20:00:28 host sshd[5988]: input_userauth_request: invalid user test [preauth] Dec 28 20:00:28 host sshd[5988]: pam_unix(sshd:auth): check pass; user unknown Dec 28 20:00:28 host sshd[5988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.93.146.217 Dec 28 20:00:29 host sshd[5988]: Failed password for invalid user test from 151.93.146.217 port 48824 ssh2 Dec 28 20:00:29 host sshd[5988]: Received disconnect from 151.93.146.217 port 48824:11: Bye Bye [preauth] Dec 28 20:00:29 host sshd[5988]: Disconnected from 151.93.146.217 port 48824 [preauth] Dec 28 20:00:34 host sshd[5997]: User root from 185.17.229.65 not allowed because not listed in AllowUsers Dec 28 20:00:34 host sshd[5997]: input_userauth_request: invalid user root [preauth] Dec 28 20:00:34 host unix_chkpwd[6007]: password check failed for user (root) Dec 28 20:00:34 host sshd[5997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.17.229.65 user=root Dec 28 20:00:34 host sshd[5997]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 20:00:36 host sshd[5997]: Failed password for invalid user root from 185.17.229.65 port 14670 ssh2 Dec 28 20:00:36 host sshd[5997]: Received disconnect from 185.17.229.65 port 14670:11: Bye Bye [preauth] Dec 28 20:00:36 host sshd[5997]: Disconnected from 185.17.229.65 port 14670 [preauth] Dec 28 20:02:08 host sshd[6215]: Invalid user node from 106.51.19.224 port 59102 Dec 28 20:02:08 host sshd[6215]: input_userauth_request: invalid user node [preauth] Dec 28 20:02:08 host sshd[6215]: pam_unix(sshd:auth): check pass; user unknown Dec 28 20:02:08 host sshd[6215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.19.224 Dec 28 20:02:10 host sshd[6215]: Failed password for invalid user node from 106.51.19.224 port 59102 ssh2 Dec 28 20:02:10 host sshd[6215]: Received disconnect from 106.51.19.224 port 59102:11: Bye Bye [preauth] Dec 28 20:02:10 host sshd[6215]: Disconnected from 106.51.19.224 port 59102 [preauth] Dec 28 20:02:20 host sshd[6231]: Invalid user git from 188.166.97.136 port 34572 Dec 28 20:02:20 host sshd[6231]: input_userauth_request: invalid user git [preauth] Dec 28 20:02:20 host sshd[6231]: pam_unix(sshd:auth): check pass; user unknown Dec 28 20:02:20 host sshd[6231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.97.136 Dec 28 20:02:22 host sshd[6231]: Failed password for invalid user git from 188.166.97.136 port 34572 ssh2 Dec 28 20:02:22 host sshd[6231]: Received disconnect from 188.166.97.136 port 34572:11: Bye Bye [preauth] Dec 28 20:02:22 host sshd[6231]: Disconnected from 188.166.97.136 port 34572 [preauth] Dec 28 20:02:38 host sshd[6306]: Invalid user test from 138.68.162.6 port 47942 Dec 28 20:02:38 host sshd[6306]: input_userauth_request: invalid user test [preauth] Dec 28 20:02:38 host sshd[6306]: pam_unix(sshd:auth): check pass; user unknown Dec 28 20:02:38 host sshd[6306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.162.6 Dec 28 20:02:41 host sshd[6306]: Failed password for invalid user test from 138.68.162.6 port 47942 ssh2 Dec 28 20:02:41 host sshd[6306]: Received disconnect from 138.68.162.6 port 47942:11: Bye Bye [preauth] Dec 28 20:02:41 host sshd[6306]: Disconnected from 138.68.162.6 port 47942 [preauth] Dec 28 20:03:05 host sshd[6362]: User root from 167.71.0.227 not allowed because not listed in AllowUsers Dec 28 20:03:05 host sshd[6362]: input_userauth_request: invalid user root [preauth] Dec 28 20:03:05 host unix_chkpwd[6371]: password check failed for user (root) Dec 28 20:03:05 host sshd[6362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.0.227 user=root Dec 28 20:03:05 host sshd[6362]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 20:03:07 host sshd[6362]: Failed password for invalid user root from 167.71.0.227 port 44856 ssh2 Dec 28 20:03:07 host sshd[6362]: Received disconnect from 167.71.0.227 port 44856:11: Bye Bye [preauth] Dec 28 20:03:07 host sshd[6362]: Disconnected from 167.71.0.227 port 44856 [preauth] Dec 28 20:03:14 host sshd[6384]: Invalid user ed from 45.93.201.90 port 44706 Dec 28 20:03:14 host sshd[6384]: input_userauth_request: invalid user ed [preauth] Dec 28 20:03:14 host sshd[6384]: pam_unix(sshd:auth): check pass; user unknown Dec 28 20:03:14 host sshd[6384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 28 20:03:17 host sshd[6384]: Failed password for invalid user ed from 45.93.201.90 port 44706 ssh2 Dec 28 20:03:20 host sshd[6384]: pam_unix(sshd:auth): check pass; user unknown Dec 28 20:03:22 host sshd[6384]: Failed password for invalid user ed from 45.93.201.90 port 44706 ssh2 Dec 28 20:03:25 host sshd[6384]: pam_unix(sshd:auth): check pass; user unknown Dec 28 20:03:27 host sshd[6384]: Failed password for invalid user ed from 45.93.201.90 port 44706 ssh2 Dec 28 20:03:30 host sshd[6384]: Connection closed by 45.93.201.90 port 44706 [preauth] Dec 28 20:03:30 host sshd[6384]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 28 20:03:33 host sshd[6437]: Invalid user mike from 128.199.28.158 port 60986 Dec 28 20:03:33 host sshd[6437]: input_userauth_request: invalid user mike [preauth] Dec 28 20:03:33 host sshd[6437]: pam_unix(sshd:auth): check pass; user unknown Dec 28 20:03:33 host sshd[6437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.28.158 Dec 28 20:03:34 host sshd[6435]: User root from 151.93.146.217 not allowed because not listed in AllowUsers Dec 28 20:03:34 host sshd[6435]: input_userauth_request: invalid user root [preauth] Dec 28 20:03:34 host unix_chkpwd[6449]: password check failed for user (root) Dec 28 20:03:34 host sshd[6435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.93.146.217 user=root Dec 28 20:03:34 host sshd[6435]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 20:03:35 host sshd[6437]: Failed password for invalid user mike from 128.199.28.158 port 60986 ssh2 Dec 28 20:03:35 host sshd[6437]: Received disconnect from 128.199.28.158 port 60986:11: Bye Bye [preauth] Dec 28 20:03:35 host sshd[6437]: Disconnected from 128.199.28.158 port 60986 [preauth] Dec 28 20:03:36 host sshd[6435]: Failed password for invalid user root from 151.93.146.217 port 34454 ssh2 Dec 28 20:03:36 host sshd[6435]: Received disconnect from 151.93.146.217 port 34454:11: Bye Bye [preauth] Dec 28 20:03:36 host sshd[6435]: Disconnected from 151.93.146.217 port 34454 [preauth] Dec 28 20:03:52 host sshd[6533]: Invalid user rundeck from 188.166.97.136 port 37620 Dec 28 20:03:52 host sshd[6533]: input_userauth_request: invalid user rundeck [preauth] Dec 28 20:03:52 host sshd[6533]: pam_unix(sshd:auth): check pass; user unknown Dec 28 20:03:52 host sshd[6533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.97.136 Dec 28 20:03:53 host sshd[6535]: User root from 138.68.162.6 not allowed because not listed in AllowUsers Dec 28 20:03:53 host sshd[6535]: input_userauth_request: invalid user root [preauth] Dec 28 20:03:53 host unix_chkpwd[6539]: password check failed for user (root) Dec 28 20:03:53 host sshd[6535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.162.6 user=root Dec 28 20:03:53 host sshd[6535]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 20:03:54 host sshd[6533]: Failed password for invalid user rundeck from 188.166.97.136 port 37620 ssh2 Dec 28 20:03:54 host sshd[6533]: Received disconnect from 188.166.97.136 port 37620:11: Bye Bye [preauth] Dec 28 20:03:54 host sshd[6533]: Disconnected from 188.166.97.136 port 37620 [preauth] Dec 28 20:03:55 host sshd[6535]: Failed password for invalid user root from 138.68.162.6 port 49204 ssh2 Dec 28 20:03:55 host sshd[6535]: Received disconnect from 138.68.162.6 port 49204:11: Bye Bye [preauth] Dec 28 20:03:55 host sshd[6535]: Disconnected from 138.68.162.6 port 49204 [preauth] Dec 28 20:04:09 host sshd[6608]: Invalid user git from 194.113.236.217 port 44736 Dec 28 20:04:09 host sshd[6608]: input_userauth_request: invalid user git [preauth] Dec 28 20:04:09 host sshd[6608]: pam_unix(sshd:auth): check pass; user unknown Dec 28 20:04:09 host sshd[6608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.113.236.217 Dec 28 20:04:10 host sshd[6608]: Failed password for invalid user git from 194.113.236.217 port 44736 ssh2 Dec 28 20:04:11 host sshd[6608]: Received disconnect from 194.113.236.217 port 44736:11: Bye Bye [preauth] Dec 28 20:04:11 host sshd[6608]: Disconnected from 194.113.236.217 port 44736 [preauth] Dec 28 20:04:24 host sshd[6633]: Invalid user student1 from 185.17.229.65 port 25056 Dec 28 20:04:24 host sshd[6633]: input_userauth_request: invalid user student1 [preauth] Dec 28 20:04:24 host sshd[6633]: pam_unix(sshd:auth): check pass; user unknown Dec 28 20:04:24 host sshd[6633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.17.229.65 Dec 28 20:04:25 host sshd[6635]: Invalid user marketing from 84.53.228.192 port 46106 Dec 28 20:04:25 host sshd[6635]: input_userauth_request: invalid user marketing [preauth] Dec 28 20:04:25 host sshd[6635]: pam_unix(sshd:auth): check pass; user unknown Dec 28 20:04:25 host sshd[6635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.53.228.192 Dec 28 20:04:26 host sshd[6633]: Failed password for invalid user student1 from 185.17.229.65 port 25056 ssh2 Dec 28 20:04:26 host sshd[6633]: Received disconnect from 185.17.229.65 port 25056:11: Bye Bye [preauth] Dec 28 20:04:26 host sshd[6633]: Disconnected from 185.17.229.65 port 25056 [preauth] Dec 28 20:04:27 host sshd[6635]: Failed password for invalid user marketing from 84.53.228.192 port 46106 ssh2 Dec 28 20:04:27 host sshd[6635]: Received disconnect from 84.53.228.192 port 46106:11: Bye Bye [preauth] Dec 28 20:04:27 host sshd[6635]: Disconnected from 84.53.228.192 port 46106 [preauth] Dec 28 20:04:28 host sshd[6663]: User root from 107.173.156.194 not allowed because not listed in AllowUsers Dec 28 20:04:28 host sshd[6663]: input_userauth_request: invalid user root [preauth] Dec 28 20:04:28 host unix_chkpwd[6666]: password check failed for user (root) Dec 28 20:04:28 host sshd[6663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.173.156.194 user=root Dec 28 20:04:28 host sshd[6663]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 20:04:30 host sshd[6663]: Failed password for invalid user root from 107.173.156.194 port 53596 ssh2 Dec 28 20:04:44 host sshd[6767]: User root from 106.51.19.224 not allowed because not listed in AllowUsers Dec 28 20:04:44 host sshd[6767]: input_userauth_request: invalid user root [preauth] Dec 28 20:04:44 host unix_chkpwd[6769]: password check failed for user (root) Dec 28 20:04:44 host sshd[6767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.19.224 user=root Dec 28 20:04:44 host sshd[6767]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 20:04:46 host sshd[6767]: Failed password for invalid user root from 106.51.19.224 port 54546 ssh2 Dec 28 20:04:46 host sshd[6767]: Received disconnect from 106.51.19.224 port 54546:11: Bye Bye [preauth] Dec 28 20:04:46 host sshd[6767]: Disconnected from 106.51.19.224 port 54546 [preauth] Dec 28 20:04:51 host sshd[6807]: Invalid user alexis from 167.71.0.227 port 44956 Dec 28 20:04:51 host sshd[6807]: input_userauth_request: invalid user alexis [preauth] Dec 28 20:04:51 host sshd[6807]: pam_unix(sshd:auth): check pass; user unknown Dec 28 20:04:51 host sshd[6807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.0.227 Dec 28 20:04:53 host sshd[6807]: Failed password for invalid user alexis from 167.71.0.227 port 44956 ssh2 Dec 28 20:04:53 host sshd[6807]: Received disconnect from 167.71.0.227 port 44956:11: Bye Bye [preauth] Dec 28 20:04:53 host sshd[6807]: Disconnected from 167.71.0.227 port 44956 [preauth] Dec 28 20:05:03 host sshd[6984]: User root from 188.166.97.136 not allowed because not listed in AllowUsers Dec 28 20:05:03 host sshd[6984]: input_userauth_request: invalid user root [preauth] Dec 28 20:05:03 host unix_chkpwd[6987]: password check failed for user (root) Dec 28 20:05:03 host sshd[6984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.97.136 user=root Dec 28 20:05:03 host sshd[6984]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 20:05:05 host sshd[6984]: Failed password for invalid user root from 188.166.97.136 port 38268 ssh2 Dec 28 20:05:18 host sshd[7048]: Invalid user everdata from 194.113.236.217 port 40220 Dec 28 20:05:18 host sshd[7048]: input_userauth_request: invalid user everdata [preauth] Dec 28 20:05:18 host sshd[7048]: pam_unix(sshd:auth): check pass; user unknown Dec 28 20:05:18 host sshd[7048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.113.236.217 Dec 28 20:05:20 host sshd[7051]: Invalid user proxy from 37.157.220.156 port 49972 Dec 28 20:05:20 host sshd[7051]: input_userauth_request: invalid user proxy [preauth] Dec 28 20:05:20 host sshd[7051]: pam_unix(sshd:auth): check pass; user unknown Dec 28 20:05:20 host sshd[7051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.157.220.156 Dec 28 20:05:20 host sshd[7048]: Failed password for invalid user everdata from 194.113.236.217 port 40220 ssh2 Dec 28 20:05:22 host sshd[7051]: Failed password for invalid user proxy from 37.157.220.156 port 49972 ssh2 Dec 28 20:05:22 host sshd[7051]: Received disconnect from 37.157.220.156 port 49972:11: Bye Bye [preauth] Dec 28 20:05:22 host sshd[7051]: Disconnected from 37.157.220.156 port 49972 [preauth] Dec 28 20:05:39 host sshd[7141]: User root from 84.53.228.192 not allowed because not listed in AllowUsers Dec 28 20:05:39 host sshd[7141]: input_userauth_request: invalid user root [preauth] Dec 28 20:05:39 host unix_chkpwd[7144]: password check failed for user (root) Dec 28 20:05:39 host sshd[7141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.53.228.192 user=root Dec 28 20:05:39 host sshd[7141]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 20:05:41 host sshd[7141]: Failed password for invalid user root from 84.53.228.192 port 41676 ssh2 Dec 28 20:07:28 host sshd[7403]: Invalid user desarrollo from 37.157.220.156 port 48166 Dec 28 20:07:28 host sshd[7403]: input_userauth_request: invalid user desarrollo [preauth] Dec 28 20:07:28 host sshd[7403]: pam_unix(sshd:auth): check pass; user unknown Dec 28 20:07:28 host sshd[7403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.157.220.156 Dec 28 20:07:30 host sshd[7403]: Failed password for invalid user desarrollo from 37.157.220.156 port 48166 ssh2 Dec 28 20:15:03 host sshd[8549]: User root from 41.197.31.178 not allowed because not listed in AllowUsers Dec 28 20:15:03 host sshd[8549]: input_userauth_request: invalid user root [preauth] Dec 28 20:15:03 host unix_chkpwd[8552]: password check failed for user (root) Dec 28 20:15:03 host sshd[8549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 user=root Dec 28 20:15:03 host sshd[8549]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 20:15:05 host sshd[8549]: Failed password for invalid user root from 41.197.31.178 port 59784 ssh2 Dec 28 20:15:06 host sshd[8549]: Connection closed by 41.197.31.178 port 59784 [preauth] Dec 28 20:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 20:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 20:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 28 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 28 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 28 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 28 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 28 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 28 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 28 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 28 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 28 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=ugotscom user-3=wwwresourcehunte user-4=keralaholi user-5=wwwrmswll user-6=travelboniface user-7=cochintaxi user-8=wwwkaretakers user-9=laundryboniface user-10=a2zgroup user-11=dartsimp user-12=wwwletsstalkfood user-13=straightcurve user-14=wwwevmhonda user-15=bonifacegroup user-16=mrsclean user-17=wwwnexidigital user-18=phmetals user-19=kottayamcalldriv user-20=palco123 user-21=gifterman user-22=wwwkapin user-23=woodpeck user-24=disposeat user-25=wwwkmaorg user-26=remysagr user-27=pmcresources user-28=shalinijames user-29=wwwtestugo user-30=vfmassets feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 28 20:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 28 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Eg1jTELH9MuGcQ4Q.~ Dec 28 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Eg1jTELH9MuGcQ4Q.~' Dec 28 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Eg1jTELH9MuGcQ4Q.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 28 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 28 20:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 20:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 28 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 20:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 20:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 28 20:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 28 20:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 28 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 28 20:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 20:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 20:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 28 20:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 20:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 20:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 28 20:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 20:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 28 20:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 20:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 20:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 28 20:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 20:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 20:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 28 20:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 20:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 20:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 28 20:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 20:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 20:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 28 20:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 20:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 20:45:20 host sshd[13430]: User root from 131.0.0.11 not allowed because not listed in AllowUsers Dec 28 20:45:20 host sshd[13430]: input_userauth_request: invalid user root [preauth] Dec 28 20:45:21 host unix_chkpwd[13438]: password check failed for user (root) Dec 28 20:45:21 host sshd[13430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.0.0.11 user=root Dec 28 20:45:21 host sshd[13430]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 20:45:24 host sshd[13430]: Failed password for invalid user root from 131.0.0.11 port 36060 ssh2 Dec 28 20:45:25 host sshd[13430]: Connection closed by 131.0.0.11 port 36060 [preauth] Dec 28 20:50:07 host sshd[14348]: User root from 104.131.55.236 not allowed because not listed in AllowUsers Dec 28 20:50:07 host sshd[14348]: input_userauth_request: invalid user root [preauth] Dec 28 20:50:07 host unix_chkpwd[14367]: password check failed for user (root) Dec 28 20:50:07 host sshd[14348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.55.236 user=root Dec 28 20:50:07 host sshd[14348]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 20:50:09 host sshd[14348]: Failed password for invalid user root from 104.131.55.236 port 50928 ssh2 Dec 28 20:50:10 host sshd[14348]: Received disconnect from 104.131.55.236 port 50928:11: Bye Bye [preauth] Dec 28 20:50:10 host sshd[14348]: Disconnected from 104.131.55.236 port 50928 [preauth] Dec 28 20:51:35 host sshd[14583]: Invalid user git from 116.247.81.99 port 52816 Dec 28 20:51:35 host sshd[14583]: input_userauth_request: invalid user git [preauth] Dec 28 20:51:35 host sshd[14583]: pam_unix(sshd:auth): check pass; user unknown Dec 28 20:51:35 host sshd[14583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.247.81.99 Dec 28 20:51:38 host sshd[14583]: Failed password for invalid user git from 116.247.81.99 port 52816 ssh2 Dec 28 20:51:38 host sshd[14583]: Received disconnect from 116.247.81.99 port 52816:11: Bye Bye [preauth] Dec 28 20:51:38 host sshd[14583]: Disconnected from 116.247.81.99 port 52816 [preauth] Dec 28 20:51:59 host sshd[14633]: Invalid user app from 162.218.126.136 port 33736 Dec 28 20:51:59 host sshd[14633]: input_userauth_request: invalid user app [preauth] Dec 28 20:51:59 host sshd[14633]: pam_unix(sshd:auth): check pass; user unknown Dec 28 20:51:59 host sshd[14633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 28 20:52:01 host sshd[14633]: Failed password for invalid user app from 162.218.126.136 port 33736 ssh2 Dec 28 20:52:02 host sshd[14633]: Connection closed by 162.218.126.136 port 33736 [preauth] Dec 28 20:53:41 host sshd[14901]: Invalid user spider from 116.247.81.99 port 37271 Dec 28 20:53:41 host sshd[14901]: input_userauth_request: invalid user spider [preauth] Dec 28 20:53:41 host sshd[14901]: pam_unix(sshd:auth): check pass; user unknown Dec 28 20:53:41 host sshd[14901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.247.81.99 Dec 28 20:53:43 host sshd[14901]: Failed password for invalid user spider from 116.247.81.99 port 37271 ssh2 Dec 28 20:53:44 host sshd[14901]: Received disconnect from 116.247.81.99 port 37271:11: Bye Bye [preauth] Dec 28 20:53:44 host sshd[14901]: Disconnected from 116.247.81.99 port 37271 [preauth] Dec 28 20:54:05 host sshd[14967]: User root from 104.131.55.236 not allowed because not listed in AllowUsers Dec 28 20:54:05 host sshd[14967]: input_userauth_request: invalid user root [preauth] Dec 28 20:54:05 host unix_chkpwd[14970]: password check failed for user (root) Dec 28 20:54:05 host sshd[14967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.55.236 user=root Dec 28 20:54:05 host sshd[14967]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 20:54:07 host sshd[14967]: Failed password for invalid user root from 104.131.55.236 port 44419 ssh2 Dec 28 20:54:08 host sshd[14967]: Received disconnect from 104.131.55.236 port 44419:11: Bye Bye [preauth] Dec 28 20:54:08 host sshd[14967]: Disconnected from 104.131.55.236 port 44419 [preauth] Dec 28 20:54:46 host sshd[15095]: Invalid user activemq from 116.247.81.99 port 45511 Dec 28 20:54:46 host sshd[15095]: input_userauth_request: invalid user activemq [preauth] Dec 28 20:54:46 host sshd[15095]: pam_unix(sshd:auth): check pass; user unknown Dec 28 20:54:46 host sshd[15095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.247.81.99 Dec 28 20:54:48 host sshd[15095]: Failed password for invalid user activemq from 116.247.81.99 port 45511 ssh2 Dec 28 20:54:48 host sshd[15095]: Received disconnect from 116.247.81.99 port 45511:11: Bye Bye [preauth] Dec 28 20:54:48 host sshd[15095]: Disconnected from 116.247.81.99 port 45511 [preauth] Dec 28 21:07:59 host sshd[17267]: Invalid user test4 from 92.46.108.20 port 54216 Dec 28 21:07:59 host sshd[17267]: input_userauth_request: invalid user test4 [preauth] Dec 28 21:07:59 host sshd[17267]: pam_unix(sshd:auth): check pass; user unknown Dec 28 21:07:59 host sshd[17267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 28 21:08:01 host sshd[17267]: Failed password for invalid user test4 from 92.46.108.20 port 54216 ssh2 Dec 28 21:08:02 host sshd[17267]: Connection closed by 92.46.108.20 port 54216 [preauth] Dec 28 21:19:30 host sshd[19007]: Invalid user user1 from 103.13.40.2 port 45900 Dec 28 21:19:30 host sshd[19007]: input_userauth_request: invalid user user1 [preauth] Dec 28 21:19:30 host sshd[19007]: pam_unix(sshd:auth): check pass; user unknown Dec 28 21:19:30 host sshd[19007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 28 21:19:32 host sshd[19007]: Failed password for invalid user user1 from 103.13.40.2 port 45900 ssh2 Dec 28 21:19:32 host sshd[19007]: Connection closed by 103.13.40.2 port 45900 [preauth] Dec 28 21:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 28 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 28 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 28 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 28 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 28 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 28 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 28 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 28 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 21:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 21:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 21:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 21:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 28 21:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 21:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 21:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=palco123 user-2=gifterman user-3=phmetals user-4=kottayamcalldriv user-5=mrsclean user-6=wwwnexidigital user-7=bonifacegroup user-8=wwwevmhonda user-9=wwwletsstalkfood user-10=straightcurve user-11=vfmassets user-12=shalinijames user-13=wwwtestugo user-14=pmcresources user-15=wwwkmaorg user-16=disposeat user-17=remysagr user-18=wwwkapin user-19=woodpeck user-20=travelboniface user-21=wwwresourcehunte user-22=keralaholi user-23=wwwrmswll user-24=ugotscom user-25=wwwpmcresource user-26=a2zgroup user-27=dartsimp user-28=laundryboniface user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 28 21:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 28 21:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-CI6EurW5QK3h51Jv.~ Dec 28 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-CI6EurW5QK3h51Jv.~' Dec 28 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-CI6EurW5QK3h51Jv.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 28 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 28 21:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 21:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 28 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 21:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 21:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 21:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 21:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 28 21:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 28 21:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 28 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 28 21:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 21:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 21:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 28 21:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 21:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 28 21:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 21:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 21:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 28 21:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 21:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 28 21:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 21:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 21:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 28 21:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 21:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 21:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 28 21:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 21:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 21:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 28 21:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 21:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 21:22:12 host sshd[19751]: User bin from 106.10.122.53 not allowed because not listed in AllowUsers Dec 28 21:22:12 host sshd[19751]: input_userauth_request: invalid user bin [preauth] Dec 28 21:22:12 host unix_chkpwd[19754]: password check failed for user (bin) Dec 28 21:22:12 host sshd[19751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 user=bin Dec 28 21:22:12 host sshd[19751]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "bin" Dec 28 21:22:15 host sshd[19751]: Failed password for invalid user bin from 106.10.122.53 port 53146 ssh2 Dec 28 21:22:15 host sshd[19751]: Connection closed by 106.10.122.53 port 53146 [preauth] Dec 28 21:42:16 host sshd[22780]: Invalid user kenneth from 107.189.30.59 port 47852 Dec 28 21:42:16 host sshd[22780]: input_userauth_request: invalid user kenneth [preauth] Dec 28 21:42:16 host sshd[22780]: pam_unix(sshd:auth): check pass; user unknown Dec 28 21:42:16 host sshd[22780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Dec 28 21:42:18 host sshd[22780]: Failed password for invalid user kenneth from 107.189.30.59 port 47852 ssh2 Dec 28 21:42:19 host sshd[22780]: Connection closed by 107.189.30.59 port 47852 [preauth] Dec 28 21:46:28 host sshd[23523]: Invalid user ee from 45.93.201.90 port 56836 Dec 28 21:46:28 host sshd[23523]: input_userauth_request: invalid user ee [preauth] Dec 28 21:46:28 host sshd[23523]: pam_unix(sshd:auth): check pass; user unknown Dec 28 21:46:28 host sshd[23523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 28 21:46:30 host sshd[23523]: Failed password for invalid user ee from 45.93.201.90 port 56836 ssh2 Dec 28 21:46:33 host sshd[23523]: pam_unix(sshd:auth): check pass; user unknown Dec 28 21:46:35 host sshd[23523]: Failed password for invalid user ee from 45.93.201.90 port 56836 ssh2 Dec 28 21:46:38 host sshd[23523]: pam_unix(sshd:auth): check pass; user unknown Dec 28 21:46:40 host sshd[23523]: Failed password for invalid user ee from 45.93.201.90 port 56836 ssh2 Dec 28 21:46:43 host sshd[23523]: Connection closed by 45.93.201.90 port 56836 [preauth] Dec 28 21:46:43 host sshd[23523]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 28 22:01:42 host sshd[25859]: Invalid user gpuadmin from 41.197.31.178 port 55682 Dec 28 22:01:42 host sshd[25859]: input_userauth_request: invalid user gpuadmin [preauth] Dec 28 22:01:42 host sshd[25859]: pam_unix(sshd:auth): check pass; user unknown Dec 28 22:01:42 host sshd[25859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 28 22:01:44 host sshd[25859]: Failed password for invalid user gpuadmin from 41.197.31.178 port 55682 ssh2 Dec 28 22:01:44 host sshd[25859]: Connection closed by 41.197.31.178 port 55682 [preauth] Dec 28 22:02:45 host sshd[26097]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Dec 28 22:02:45 host sshd[26097]: input_userauth_request: invalid user root [preauth] Dec 28 22:02:46 host unix_chkpwd[26100]: password check failed for user (root) Dec 28 22:02:46 host sshd[26097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Dec 28 22:02:46 host sshd[26097]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 22:02:48 host sshd[26097]: Failed password for invalid user root from 162.218.126.136 port 54620 ssh2 Dec 28 22:02:48 host sshd[26097]: Connection closed by 162.218.126.136 port 54620 [preauth] Dec 28 22:16:58 host sshd[28176]: Invalid user office from 147.182.171.152 port 45992 Dec 28 22:16:58 host sshd[28176]: input_userauth_request: invalid user office [preauth] Dec 28 22:16:58 host sshd[28176]: pam_unix(sshd:auth): check pass; user unknown Dec 28 22:16:58 host sshd[28176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.171.152 Dec 28 22:17:00 host sshd[28176]: Failed password for invalid user office from 147.182.171.152 port 45992 ssh2 Dec 28 22:17:00 host sshd[28176]: Received disconnect from 147.182.171.152 port 45992:11: Bye Bye [preauth] Dec 28 22:17:00 host sshd[28176]: Disconnected from 147.182.171.152 port 45992 [preauth] Dec 28 22:17:17 host sshd[28217]: Invalid user fff from 213.230.65.54 port 39804 Dec 28 22:17:17 host sshd[28217]: input_userauth_request: invalid user fff [preauth] Dec 28 22:17:17 host sshd[28217]: pam_unix(sshd:auth): check pass; user unknown Dec 28 22:17:17 host sshd[28217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.230.65.54 Dec 28 22:17:19 host sshd[28217]: Failed password for invalid user fff from 213.230.65.54 port 39804 ssh2 Dec 28 22:17:19 host sshd[28217]: Received disconnect from 213.230.65.54 port 39804:11: Bye Bye [preauth] Dec 28 22:17:19 host sshd[28217]: Disconnected from 213.230.65.54 port 39804 [preauth] Dec 28 22:19:04 host sshd[28576]: User root from 157.230.239.179 not allowed because not listed in AllowUsers Dec 28 22:19:04 host sshd[28576]: input_userauth_request: invalid user root [preauth] Dec 28 22:19:04 host unix_chkpwd[28581]: password check failed for user (root) Dec 28 22:19:04 host sshd[28576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.239.179 user=root Dec 28 22:19:04 host sshd[28576]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 22:19:06 host sshd[28576]: Failed password for invalid user root from 157.230.239.179 port 56676 ssh2 Dec 28 22:19:07 host sshd[28576]: Received disconnect from 157.230.239.179 port 56676:11: Bye Bye [preauth] Dec 28 22:19:07 host sshd[28576]: Disconnected from 157.230.239.179 port 56676 [preauth] Dec 28 22:19:32 host sshd[28653]: User root from 103.185.239.10 not allowed because not listed in AllowUsers Dec 28 22:19:32 host sshd[28653]: input_userauth_request: invalid user root [preauth] Dec 28 22:19:32 host unix_chkpwd[28655]: password check failed for user (root) Dec 28 22:19:32 host sshd[28653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.185.239.10 user=root Dec 28 22:19:32 host sshd[28653]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 22:19:35 host sshd[28653]: Failed password for invalid user root from 103.185.239.10 port 38886 ssh2 Dec 28 22:19:35 host sshd[28653]: Received disconnect from 103.185.239.10 port 38886:11: Bye Bye [preauth] Dec 28 22:19:35 host sshd[28653]: Disconnected from 103.185.239.10 port 38886 [preauth] Dec 28 22:19:36 host sshd[28663]: Invalid user newuser from 207.138.39.234 port 55122 Dec 28 22:19:36 host sshd[28663]: input_userauth_request: invalid user newuser [preauth] Dec 28 22:19:36 host sshd[28663]: pam_unix(sshd:auth): check pass; user unknown Dec 28 22:19:36 host sshd[28663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.138.39.234 Dec 28 22:19:38 host sshd[28663]: Failed password for invalid user newuser from 207.138.39.234 port 55122 ssh2 Dec 28 22:19:39 host sshd[28663]: Received disconnect from 207.138.39.234 port 55122:11: Bye Bye [preauth] Dec 28 22:19:39 host sshd[28663]: Disconnected from 207.138.39.234 port 55122 [preauth] Dec 28 22:20:40 host sshd[28860]: User root from 138.68.243.208 not allowed because not listed in AllowUsers Dec 28 22:20:40 host sshd[28860]: input_userauth_request: invalid user root [preauth] Dec 28 22:20:40 host unix_chkpwd[28869]: password check failed for user (root) Dec 28 22:20:40 host sshd[28860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.243.208 user=root Dec 28 22:20:40 host sshd[28860]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 22:20:42 host sshd[28860]: Failed password for invalid user root from 138.68.243.208 port 41120 ssh2 Dec 28 22:20:42 host sshd[28860]: Received disconnect from 138.68.243.208 port 41120:11: Bye Bye [preauth] Dec 28 22:20:42 host sshd[28860]: Disconnected from 138.68.243.208 port 41120 [preauth] Dec 28 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 28 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 28 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 28 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 28 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 28 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 28 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 28 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 28 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 22:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 22:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 22:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 22:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 28 22:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 22:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 22:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=palco123 user-2=gifterman user-3=kottayamcalldriv user-4=phmetals user-5=wwwnexidigital user-6=mrsclean user-7=bonifacegroup user-8=wwwevmhonda user-9=wwwletsstalkfood user-10=straightcurve user-11=vfmassets user-12=shalinijames user-13=wwwtestugo user-14=pmcresources user-15=disposeat user-16=wwwkmaorg user-17=remysagr user-18=wwwkapin user-19=woodpeck user-20=travelboniface user-21=wwwresourcehunte user-22=keralaholi user-23=wwwrmswll user-24=ugotscom user-25=wwwpmcresource user-26=a2zgroup user-27=dartsimp user-28=laundryboniface user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 28 22:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 28 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fMCo620nvz0jbw4k.~ Dec 28 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fMCo620nvz0jbw4k.~' Dec 28 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fMCo620nvz0jbw4k.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 28 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 28 22:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 22:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 28 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 22:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 22:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 22:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 22:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 22:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 28 22:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 28 22:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 28 22:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 28 22:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 22:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 22:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 28 22:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 22:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 22:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 28 22:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 22:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 22:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 28 22:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 22:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 22:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 28 22:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 22:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 22:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 28 22:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 22:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 22:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 28 22:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 22:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 22:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 28 22:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 22:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 22:22:50 host sshd[29338]: Invalid user apacher from 213.230.65.54 port 33160 Dec 28 22:22:50 host sshd[29338]: input_userauth_request: invalid user apacher [preauth] Dec 28 22:22:50 host sshd[29338]: pam_unix(sshd:auth): check pass; user unknown Dec 28 22:22:50 host sshd[29338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.230.65.54 Dec 28 22:22:52 host sshd[29338]: Failed password for invalid user apacher from 213.230.65.54 port 33160 ssh2 Dec 28 22:22:52 host sshd[29338]: Received disconnect from 213.230.65.54 port 33160:11: Bye Bye [preauth] Dec 28 22:22:52 host sshd[29338]: Disconnected from 213.230.65.54 port 33160 [preauth] Dec 28 22:23:14 host sshd[29489]: User root from 147.182.171.152 not allowed because not listed in AllowUsers Dec 28 22:23:14 host sshd[29489]: input_userauth_request: invalid user root [preauth] Dec 28 22:23:14 host unix_chkpwd[29493]: password check failed for user (root) Dec 28 22:23:14 host sshd[29489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.171.152 user=root Dec 28 22:23:14 host sshd[29489]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 22:23:15 host sshd[29489]: Failed password for invalid user root from 147.182.171.152 port 48328 ssh2 Dec 28 22:23:16 host sshd[29489]: Received disconnect from 147.182.171.152 port 48328:11: Bye Bye [preauth] Dec 28 22:23:16 host sshd[29489]: Disconnected from 147.182.171.152 port 48328 [preauth] Dec 28 22:23:49 host sshd[29617]: Invalid user webserver from 103.185.239.10 port 34375 Dec 28 22:23:49 host sshd[29617]: input_userauth_request: invalid user webserver [preauth] Dec 28 22:23:49 host sshd[29617]: pam_unix(sshd:auth): check pass; user unknown Dec 28 22:23:49 host sshd[29617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.185.239.10 Dec 28 22:23:51 host sshd[29617]: Failed password for invalid user webserver from 103.185.239.10 port 34375 ssh2 Dec 28 22:23:51 host sshd[29617]: Received disconnect from 103.185.239.10 port 34375:11: Bye Bye [preauth] Dec 28 22:23:51 host sshd[29617]: Disconnected from 103.185.239.10 port 34375 [preauth] Dec 28 22:24:10 host sshd[29697]: Invalid user webserver from 138.68.243.208 port 52628 Dec 28 22:24:10 host sshd[29697]: input_userauth_request: invalid user webserver [preauth] Dec 28 22:24:10 host sshd[29697]: pam_unix(sshd:auth): check pass; user unknown Dec 28 22:24:10 host sshd[29697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.243.208 Dec 28 22:24:13 host sshd[29697]: Failed password for invalid user webserver from 138.68.243.208 port 52628 ssh2 Dec 28 22:24:13 host sshd[29697]: Received disconnect from 138.68.243.208 port 52628:11: Bye Bye [preauth] Dec 28 22:24:13 host sshd[29697]: Disconnected from 138.68.243.208 port 52628 [preauth] Dec 28 22:24:13 host sshd[29705]: Invalid user kiran from 213.230.65.54 port 35228 Dec 28 22:24:13 host sshd[29705]: input_userauth_request: invalid user kiran [preauth] Dec 28 22:24:13 host sshd[29705]: pam_unix(sshd:auth): check pass; user unknown Dec 28 22:24:13 host sshd[29705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.230.65.54 Dec 28 22:24:13 host sshd[29703]: Invalid user teamspeak from 207.138.39.234 port 57758 Dec 28 22:24:13 host sshd[29703]: input_userauth_request: invalid user teamspeak [preauth] Dec 28 22:24:13 host sshd[29703]: pam_unix(sshd:auth): check pass; user unknown Dec 28 22:24:13 host sshd[29703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.138.39.234 Dec 28 22:24:15 host sshd[29705]: Failed password for invalid user kiran from 213.230.65.54 port 35228 ssh2 Dec 28 22:24:15 host sshd[29703]: Failed password for invalid user teamspeak from 207.138.39.234 port 57758 ssh2 Dec 28 22:24:16 host sshd[29703]: Received disconnect from 207.138.39.234 port 57758:11: Bye Bye [preauth] Dec 28 22:24:16 host sshd[29703]: Disconnected from 207.138.39.234 port 57758 [preauth] Dec 28 22:24:18 host sshd[29774]: User root from 157.230.239.179 not allowed because not listed in AllowUsers Dec 28 22:24:18 host sshd[29774]: input_userauth_request: invalid user root [preauth] Dec 28 22:24:18 host unix_chkpwd[29778]: password check failed for user (root) Dec 28 22:24:18 host sshd[29774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.239.179 user=root Dec 28 22:24:18 host sshd[29774]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 22:24:20 host sshd[29774]: Failed password for invalid user root from 157.230.239.179 port 49232 ssh2 Dec 28 22:25:35 host sshd[30024]: User root from 207.138.39.234 not allowed because not listed in AllowUsers Dec 28 22:25:35 host sshd[30024]: input_userauth_request: invalid user root [preauth] Dec 28 22:25:35 host unix_chkpwd[30029]: password check failed for user (root) Dec 28 22:25:35 host sshd[30024]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.138.39.234 user=root Dec 28 22:25:35 host sshd[30024]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 22:25:37 host sshd[30024]: Failed password for invalid user root from 207.138.39.234 port 55108 ssh2 Dec 28 22:25:37 host sshd[30024]: Received disconnect from 207.138.39.234 port 55108:11: Bye Bye [preauth] Dec 28 22:25:37 host sshd[30024]: Disconnected from 207.138.39.234 port 55108 [preauth] Dec 28 22:33:09 host sshd[31105]: Connection reset by 14.99.68.91 port 43820 [preauth] Dec 28 22:34:16 host sshd[31306]: Invalid user stefan from 87.245.184.61 port 48424 Dec 28 22:34:16 host sshd[31306]: input_userauth_request: invalid user stefan [preauth] Dec 28 22:34:16 host sshd[31306]: pam_unix(sshd:auth): check pass; user unknown Dec 28 22:34:16 host sshd[31306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.245.184.61 Dec 28 22:34:18 host sshd[31306]: Failed password for invalid user stefan from 87.245.184.61 port 48424 ssh2 Dec 28 22:34:18 host sshd[31306]: Received disconnect from 87.245.184.61 port 48424:11: Bye Bye [preauth] Dec 28 22:34:18 host sshd[31306]: Disconnected from 87.245.184.61 port 48424 [preauth] Dec 28 22:35:37 host sshd[31733]: Invalid user ubuntu from 87.245.184.61 port 38282 Dec 28 22:35:37 host sshd[31733]: input_userauth_request: invalid user ubuntu [preauth] Dec 28 22:35:37 host sshd[31733]: pam_unix(sshd:auth): check pass; user unknown Dec 28 22:35:37 host sshd[31733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.245.184.61 Dec 28 22:35:39 host sshd[31733]: Failed password for invalid user ubuntu from 87.245.184.61 port 38282 ssh2 Dec 28 22:35:39 host sshd[31733]: Received disconnect from 87.245.184.61 port 38282:11: Bye Bye [preauth] Dec 28 22:35:39 host sshd[31733]: Disconnected from 87.245.184.61 port 38282 [preauth] Dec 28 22:35:56 host sshd[31798]: Connection reset by 14.99.68.91 port 53104 [preauth] Dec 28 22:36:53 host sshd[31985]: Connection reset by 14.99.68.91 port 51058 [preauth] Dec 28 22:36:55 host sshd[31989]: Invalid user hive from 87.245.184.61 port 45918 Dec 28 22:36:55 host sshd[31989]: input_userauth_request: invalid user hive [preauth] Dec 28 22:36:55 host sshd[31989]: pam_unix(sshd:auth): check pass; user unknown Dec 28 22:36:55 host sshd[31989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.245.184.61 Dec 28 22:36:57 host sshd[31989]: Failed password for invalid user hive from 87.245.184.61 port 45918 ssh2 Dec 28 22:37:50 host sshd[32196]: Connection reset by 14.99.68.91 port 48990 [preauth] Dec 28 22:39:44 host sshd[32684]: Connection reset by 14.99.68.91 port 44912 [preauth] Dec 28 22:40:42 host sshd[453]: Connection reset by 14.99.68.91 port 42886 [preauth] Dec 28 22:41:40 host sshd[682]: Connection reset by 14.99.68.91 port 40840 [preauth] Dec 28 22:42:37 host sshd[941]: Connection reset by 14.99.68.91 port 38808 [preauth] Dec 28 22:43:35 host sshd[1187]: Connection reset by 14.99.68.91 port 36764 [preauth] Dec 28 22:44:32 host sshd[1513]: User root from 103.13.40.2 not allowed because not listed in AllowUsers Dec 28 22:44:32 host sshd[1513]: input_userauth_request: invalid user root [preauth] Dec 28 22:44:32 host unix_chkpwd[1516]: password check failed for user (root) Dec 28 22:44:32 host sshd[1513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 user=root Dec 28 22:44:32 host sshd[1513]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 22:44:35 host sshd[1513]: Failed password for invalid user root from 103.13.40.2 port 48334 ssh2 Dec 28 22:44:35 host sshd[1513]: Connection closed by 103.13.40.2 port 48334 [preauth] Dec 28 22:44:39 host sshd[1536]: Connection reset by 14.99.68.91 port 34732 [preauth] Dec 28 22:44:54 host sshd[1596]: Did not receive identification string from 64.227.181.236 port 61000 Dec 28 22:45:30 host sshd[1763]: Connection reset by 14.99.68.91 port 60938 [preauth] Dec 28 22:47:25 host sshd[2206]: Connection reset by 14.99.68.91 port 56874 [preauth] Dec 28 22:48:23 host sshd[2438]: Connection reset by 14.99.68.91 port 54808 [preauth] Dec 28 22:48:57 host sshd[2556]: Invalid user weiwei from 106.10.122.53 port 33054 Dec 28 22:48:57 host sshd[2556]: input_userauth_request: invalid user weiwei [preauth] Dec 28 22:48:58 host sshd[2556]: pam_unix(sshd:auth): check pass; user unknown Dec 28 22:48:58 host sshd[2556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 28 22:48:59 host sshd[2556]: Failed password for invalid user weiwei from 106.10.122.53 port 33054 ssh2 Dec 28 22:48:59 host sshd[2556]: Connection closed by 106.10.122.53 port 33054 [preauth] Dec 28 22:49:21 host sshd[2633]: Connection reset by 14.99.68.91 port 52792 [preauth] Dec 28 22:52:14 host sshd[3427]: Connection reset by 14.99.68.91 port 46700 [preauth] Dec 28 22:53:11 host sshd[3656]: Connection reset by 14.99.68.91 port 44688 [preauth] Dec 28 22:54:09 host sshd[3898]: Connection reset by 14.99.68.91 port 42652 [preauth] Dec 28 22:55:06 host sshd[4204]: Connection reset by 14.99.68.91 port 40576 [preauth] Dec 28 22:56:03 host sshd[4445]: Connection reset by 14.99.68.91 port 38580 [preauth] Dec 28 22:57:00 host sshd[4693]: Connection reset by 14.99.68.91 port 36548 [preauth] Dec 28 22:58:04 host sshd[4946]: Connection reset by 14.99.68.91 port 34540 [preauth] Dec 28 22:59:53 host sshd[5429]: Connection reset by 14.99.68.91 port 58722 [preauth] Dec 28 23:00:51 host sshd[5683]: Connection reset by 14.99.68.91 port 56696 [preauth] Dec 28 23:01:30 host sshd[5880]: Invalid user gitblit from 143.198.165.162 port 57538 Dec 28 23:01:30 host sshd[5880]: input_userauth_request: invalid user gitblit [preauth] Dec 28 23:01:30 host sshd[5880]: pam_unix(sshd:auth): check pass; user unknown Dec 28 23:01:30 host sshd[5880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.165.162 Dec 28 23:01:30 host sshd[5878]: User root from 172.58.160.1 not allowed because not listed in AllowUsers Dec 28 23:01:30 host sshd[5878]: input_userauth_request: invalid user root [preauth] Dec 28 23:01:30 host unix_chkpwd[5888]: password check failed for user (root) Dec 28 23:01:30 host sshd[5878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.58.160.1 user=root Dec 28 23:01:30 host sshd[5878]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 23:01:32 host sshd[5880]: Failed password for invalid user gitblit from 143.198.165.162 port 57538 ssh2 Dec 28 23:01:32 host sshd[5880]: Received disconnect from 143.198.165.162 port 57538:11: Bye Bye [preauth] Dec 28 23:01:32 host sshd[5880]: Disconnected from 143.198.165.162 port 57538 [preauth] Dec 28 23:01:32 host sshd[5878]: Failed password for invalid user root from 172.58.160.1 port 64587 ssh2 Dec 28 23:01:33 host sshd[5878]: Received disconnect from 172.58.160.1 port 64587:11: Bye Bye [preauth] Dec 28 23:01:33 host sshd[5878]: Disconnected from 172.58.160.1 port 64587 [preauth] Dec 28 23:01:35 host sshd[5902]: User root from 128.199.140.27 not allowed because not listed in AllowUsers Dec 28 23:01:35 host sshd[5902]: input_userauth_request: invalid user root [preauth] Dec 28 23:01:35 host unix_chkpwd[5905]: password check failed for user (root) Dec 28 23:01:35 host sshd[5902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.140.27 user=root Dec 28 23:01:35 host sshd[5902]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 23:01:37 host sshd[5902]: Failed password for invalid user root from 128.199.140.27 port 60482 ssh2 Dec 28 23:01:37 host sshd[5902]: Received disconnect from 128.199.140.27 port 60482:11: Bye Bye [preauth] Dec 28 23:01:37 host sshd[5902]: Disconnected from 128.199.140.27 port 60482 [preauth] Dec 28 23:01:40 host sshd[5922]: Invalid user ricoh from 162.216.141.255 port 60464 Dec 28 23:01:40 host sshd[5922]: input_userauth_request: invalid user ricoh [preauth] Dec 28 23:01:40 host sshd[5922]: pam_unix(sshd:auth): check pass; user unknown Dec 28 23:01:40 host sshd[5922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.216.141.255 Dec 28 23:01:42 host sshd[5922]: Failed password for invalid user ricoh from 162.216.141.255 port 60464 ssh2 Dec 28 23:01:42 host sshd[5922]: Received disconnect from 162.216.141.255 port 60464:11: Bye Bye [preauth] Dec 28 23:01:42 host sshd[5922]: Disconnected from 162.216.141.255 port 60464 [preauth] Dec 28 23:01:53 host sshd[5563]: Connection reset by 193.151.128.185 port 41150 [preauth] Dec 28 23:01:55 host sshd[5984]: Connection reset by 14.99.68.91 port 54672 [preauth] Dec 28 23:02:45 host sshd[6156]: Connection reset by 14.99.68.91 port 52626 [preauth] Dec 28 23:03:31 host sshd[6334]: Invalid user dev from 159.89.206.9 port 33410 Dec 28 23:03:31 host sshd[6334]: input_userauth_request: invalid user dev [preauth] Dec 28 23:03:31 host sshd[6334]: pam_unix(sshd:auth): check pass; user unknown Dec 28 23:03:31 host sshd[6334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.206.9 Dec 28 23:03:33 host sshd[6334]: Failed password for invalid user dev from 159.89.206.9 port 33410 ssh2 Dec 28 23:03:33 host sshd[6334]: Received disconnect from 159.89.206.9 port 33410:11: Bye Bye [preauth] Dec 28 23:03:33 host sshd[6334]: Disconnected from 159.89.206.9 port 33410 [preauth] Dec 28 23:04:39 host sshd[6696]: User root from 43.128.140.17 not allowed because not listed in AllowUsers Dec 28 23:04:39 host sshd[6696]: input_userauth_request: invalid user root [preauth] Dec 28 23:04:39 host unix_chkpwd[6702]: password check failed for user (root) Dec 28 23:04:39 host sshd[6696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.128.140.17 user=root Dec 28 23:04:39 host sshd[6696]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 23:04:41 host sshd[6696]: Failed password for invalid user root from 43.128.140.17 port 41582 ssh2 Dec 28 23:04:41 host sshd[6696]: Received disconnect from 43.128.140.17 port 41582:11: Bye Bye [preauth] Dec 28 23:04:41 host sshd[6696]: Disconnected from 43.128.140.17 port 41582 [preauth] Dec 28 23:05:27 host sshd[6902]: Invalid user jmeter from 128.199.140.27 port 50128 Dec 28 23:05:27 host sshd[6902]: input_userauth_request: invalid user jmeter [preauth] Dec 28 23:05:27 host sshd[6902]: pam_unix(sshd:auth): check pass; user unknown Dec 28 23:05:27 host sshd[6902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.140.27 Dec 28 23:05:28 host sshd[6902]: Failed password for invalid user jmeter from 128.199.140.27 port 50128 ssh2 Dec 28 23:05:28 host sshd[6902]: Received disconnect from 128.199.140.27 port 50128:11: Bye Bye [preauth] Dec 28 23:05:28 host sshd[6902]: Disconnected from 128.199.140.27 port 50128 [preauth] Dec 28 23:05:34 host sshd[6955]: Invalid user sammy from 162.216.141.255 port 49658 Dec 28 23:05:34 host sshd[6955]: input_userauth_request: invalid user sammy [preauth] Dec 28 23:05:34 host sshd[6955]: pam_unix(sshd:auth): check pass; user unknown Dec 28 23:05:34 host sshd[6955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.216.141.255 Dec 28 23:05:36 host sshd[6955]: Failed password for invalid user sammy from 162.216.141.255 port 49658 ssh2 Dec 28 23:05:36 host sshd[6955]: Received disconnect from 162.216.141.255 port 49658:11: Bye Bye [preauth] Dec 28 23:05:36 host sshd[6955]: Disconnected from 162.216.141.255 port 49658 [preauth] Dec 28 23:05:43 host sshd[6977]: User root from 143.198.165.162 not allowed because not listed in AllowUsers Dec 28 23:05:43 host sshd[6977]: input_userauth_request: invalid user root [preauth] Dec 28 23:05:43 host unix_chkpwd[6983]: password check failed for user (root) Dec 28 23:05:43 host sshd[6977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.165.162 user=root Dec 28 23:05:43 host sshd[6977]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 23:05:44 host sshd[6977]: Failed password for invalid user root from 143.198.165.162 port 45564 ssh2 Dec 28 23:05:45 host sshd[6977]: Received disconnect from 143.198.165.162 port 45564:11: Bye Bye [preauth] Dec 28 23:05:45 host sshd[6977]: Disconnected from 143.198.165.162 port 45564 [preauth] Dec 28 23:05:54 host sshd[7055]: User root from 159.89.206.9 not allowed because not listed in AllowUsers Dec 28 23:05:54 host sshd[7055]: input_userauth_request: invalid user root [preauth] Dec 28 23:05:54 host unix_chkpwd[7059]: password check failed for user (root) Dec 28 23:05:54 host sshd[7055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.206.9 user=root Dec 28 23:05:54 host sshd[7055]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 23:05:56 host sshd[7055]: Failed password for invalid user root from 159.89.206.9 port 40472 ssh2 Dec 28 23:05:56 host sshd[7055]: Received disconnect from 159.89.206.9 port 40472:11: Bye Bye [preauth] Dec 28 23:05:56 host sshd[7055]: Disconnected from 159.89.206.9 port 40472 [preauth] Dec 28 23:06:14 host sshd[7152]: Invalid user vpnuser from 43.128.140.17 port 37928 Dec 28 23:06:14 host sshd[7152]: input_userauth_request: invalid user vpnuser [preauth] Dec 28 23:06:14 host sshd[7152]: pam_unix(sshd:auth): check pass; user unknown Dec 28 23:06:14 host sshd[7152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.128.140.17 Dec 28 23:06:16 host sshd[7152]: Failed password for invalid user vpnuser from 43.128.140.17 port 37928 ssh2 Dec 28 23:06:16 host sshd[7152]: Received disconnect from 43.128.140.17 port 37928:11: Bye Bye [preauth] Dec 28 23:06:16 host sshd[7152]: Disconnected from 43.128.140.17 port 37928 [preauth] Dec 28 23:06:57 host sshd[7366]: Invalid user dan from 162.216.141.255 port 50014 Dec 28 23:06:57 host sshd[7366]: input_userauth_request: invalid user dan [preauth] Dec 28 23:06:57 host sshd[7366]: pam_unix(sshd:auth): check pass; user unknown Dec 28 23:06:57 host sshd[7366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.216.141.255 Dec 28 23:06:59 host sshd[7366]: Failed password for invalid user dan from 162.216.141.255 port 50014 ssh2 Dec 28 23:11:31 host sshd[8569]: Invalid user yxd from 162.218.126.136 port 54406 Dec 28 23:11:31 host sshd[8569]: input_userauth_request: invalid user yxd [preauth] Dec 28 23:11:31 host sshd[8569]: pam_unix(sshd:auth): check pass; user unknown Dec 28 23:11:31 host sshd[8569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 28 23:11:33 host sshd[8569]: Failed password for invalid user yxd from 162.218.126.136 port 54406 ssh2 Dec 28 23:11:33 host sshd[8569]: Connection closed by 162.218.126.136 port 54406 [preauth] Dec 28 23:14:47 host sshd[9353]: User root from 172.58.138.150 not allowed because not listed in AllowUsers Dec 28 23:14:47 host sshd[9353]: input_userauth_request: invalid user root [preauth] Dec 28 23:14:47 host unix_chkpwd[9359]: password check failed for user (root) Dec 28 23:14:47 host sshd[9353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.58.138.150 user=root Dec 28 23:14:47 host sshd[9353]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 23:14:49 host sshd[9353]: Failed password for invalid user root from 172.58.138.150 port 12670 ssh2 Dec 28 23:14:49 host sshd[9353]: Received disconnect from 172.58.138.150 port 12670:11: Bye Bye [preauth] Dec 28 23:14:49 host sshd[9353]: Disconnected from 172.58.138.150 port 12670 [preauth] Dec 28 23:16:35 host sshd[9770]: Invalid user system from 172.58.138.150 port 55838 Dec 28 23:16:35 host sshd[9770]: input_userauth_request: invalid user system [preauth] Dec 28 23:16:35 host sshd[9770]: pam_unix(sshd:auth): check pass; user unknown Dec 28 23:16:35 host sshd[9770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.58.138.150 Dec 28 23:16:37 host sshd[9770]: Failed password for invalid user system from 172.58.138.150 port 55838 ssh2 Dec 28 23:16:38 host sshd[9770]: Received disconnect from 172.58.138.150 port 55838:11: Bye Bye [preauth] Dec 28 23:16:38 host sshd[9770]: Disconnected from 172.58.138.150 port 55838 [preauth] Dec 28 23:18:04 host sshd[10109]: Invalid user username from 193.169.255.30 port 37388 Dec 28 23:18:04 host sshd[10109]: input_userauth_request: invalid user username [preauth] Dec 28 23:18:04 host sshd[10109]: pam_unix(sshd:auth): check pass; user unknown Dec 28 23:18:04 host sshd[10109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.169.255.30 Dec 28 23:18:06 host sshd[10109]: Failed password for invalid user username from 193.169.255.30 port 37388 ssh2 Dec 28 23:18:09 host sshd[10109]: pam_unix(sshd:auth): check pass; user unknown Dec 28 23:18:10 host sshd[10109]: Failed password for invalid user username from 193.169.255.30 port 37388 ssh2 Dec 28 23:18:14 host sshd[10109]: pam_unix(sshd:auth): check pass; user unknown Dec 28 23:18:16 host sshd[10109]: Failed password for invalid user username from 193.169.255.30 port 37388 ssh2 Dec 28 23:18:20 host sshd[10109]: pam_unix(sshd:auth): check pass; user unknown Dec 28 23:18:22 host sshd[10109]: Failed password for invalid user username from 193.169.255.30 port 37388 ssh2 Dec 28 23:18:25 host sshd[10109]: pam_unix(sshd:auth): check pass; user unknown Dec 28 23:18:28 host sshd[10109]: Failed password for invalid user username from 193.169.255.30 port 37388 ssh2 Dec 28 23:20:16 host sshd[10876]: User root from 172.58.160.1 not allowed because not listed in AllowUsers Dec 28 23:20:16 host sshd[10876]: input_userauth_request: invalid user root [preauth] Dec 28 23:20:16 host unix_chkpwd[10883]: password check failed for user (root) Dec 28 23:20:16 host sshd[10876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.58.160.1 user=root Dec 28 23:20:16 host sshd[10876]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 28 23:20:18 host sshd[10876]: Failed password for invalid user root from 172.58.160.1 port 4184 ssh2 Dec 28 23:20:19 host sshd[10876]: Received disconnect from 172.58.160.1 port 4184:11: Bye Bye [preauth] Dec 28 23:20:19 host sshd[10876]: Disconnected from 172.58.160.1 port 4184 [preauth] Dec 28 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 28 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 28 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 28 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 28 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 28 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 28 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 28 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 28 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 28 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=keralaholi user-4=wwwresourcehunte user-5=wwwrmswll user-6=ugotscom user-7=cochintaxi user-8=wwwkaretakers user-9=a2zgroup user-10=dartsimp user-11=laundryboniface user-12=bonifacegroup user-13=wwwevmhonda user-14=straightcurve user-15=wwwletsstalkfood user-16=palco123 user-17=gifterman user-18=kottayamcalldriv user-19=phmetals user-20=mrsclean user-21=wwwnexidigital user-22=disposeat user-23=wwwkmaorg user-24=remysagr user-25=woodpeck user-26=wwwkapin user-27=vfmassets user-28=shalinijames user-29=wwwtestugo user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 28 23:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 28 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-6J4pvyHIlWPqqR3Q.~ Dec 28 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-6J4pvyHIlWPqqR3Q.~' Dec 28 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-6J4pvyHIlWPqqR3Q.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 28 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 28 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 28 23:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 23:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 23:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 28 23:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 23:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 23:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 28 23:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 23:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 23:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 28 23:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 23:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 23:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 28 23:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 23:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 28 23:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 28 23:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 28 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 28 23:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 28 23:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 28 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 28 23:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 28 23:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 28 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 28 23:21:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 28 23:21:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 28 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 28 23:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 23:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 28 23:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 23:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 28 23:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 28 23:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 28 23:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 28 23:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 23:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 23:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 28 23:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 28 23:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 28 23:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 28 23:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 28 23:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 28 23:30:39 host sshd[13779]: Invalid user ef from 45.93.201.90 port 59948 Dec 28 23:30:39 host sshd[13779]: input_userauth_request: invalid user ef [preauth] Dec 28 23:30:39 host sshd[13779]: pam_unix(sshd:auth): check pass; user unknown Dec 28 23:30:39 host sshd[13779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 28 23:30:41 host sshd[13779]: Failed password for invalid user ef from 45.93.201.90 port 59948 ssh2 Dec 28 23:30:44 host sshd[13779]: pam_unix(sshd:auth): check pass; user unknown Dec 28 23:30:47 host sshd[13779]: Failed password for invalid user ef from 45.93.201.90 port 59948 ssh2 Dec 28 23:30:50 host sshd[13779]: pam_unix(sshd:auth): check pass; user unknown Dec 28 23:30:51 host sshd[13779]: Failed password for invalid user ef from 45.93.201.90 port 59948 ssh2 Dec 28 23:30:55 host sshd[13779]: Connection closed by 45.93.201.90 port 59948 [preauth] Dec 28 23:30:55 host sshd[13779]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 28 23:39:47 host sshd[16046]: Invalid user zhangh from 92.46.108.20 port 44304 Dec 28 23:39:47 host sshd[16046]: input_userauth_request: invalid user zhangh [preauth] Dec 28 23:39:48 host sshd[16046]: pam_unix(sshd:auth): check pass; user unknown Dec 28 23:39:48 host sshd[16046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 28 23:39:50 host sshd[16046]: Failed password for invalid user zhangh from 92.46.108.20 port 44304 ssh2 Dec 28 23:39:51 host sshd[16046]: Connection closed by 92.46.108.20 port 44304 [preauth] Dec 28 23:43:55 host sshd[16930]: Invalid user backup from 31.41.244.124 port 9288 Dec 28 23:43:55 host sshd[16930]: input_userauth_request: invalid user backup [preauth] Dec 28 23:43:56 host sshd[16930]: pam_unix(sshd:auth): check pass; user unknown Dec 28 23:43:56 host sshd[16930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Dec 28 23:43:57 host sshd[16930]: Failed password for invalid user backup from 31.41.244.124 port 9288 ssh2 Dec 28 23:43:58 host sshd[16930]: Received disconnect from 31.41.244.124 port 9288:11: Client disconnecting normally [preauth] Dec 28 23:43:58 host sshd[16930]: Disconnected from 31.41.244.124 port 9288 [preauth] Dec 28 23:43:59 host sshd[16941]: Invalid user ftpuser from 31.41.244.124 port 13038 Dec 28 23:43:59 host sshd[16941]: input_userauth_request: invalid user ftpuser [preauth] Dec 28 23:43:59 host sshd[16941]: pam_unix(sshd:auth): check pass; user unknown Dec 28 23:43:59 host sshd[16941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Dec 28 23:44:01 host sshd[16941]: Failed password for invalid user ftpuser from 31.41.244.124 port 13038 ssh2 Dec 28 23:44:01 host sshd[16941]: Received disconnect from 31.41.244.124 port 13038:11: Client disconnecting normally [preauth] Dec 28 23:44:01 host sshd[16941]: Disconnected from 31.41.244.124 port 13038 [preauth] Dec 28 23:44:02 host sshd[16962]: Invalid user service from 31.41.244.124 port 17788 Dec 28 23:44:02 host sshd[16962]: input_userauth_request: invalid user service [preauth] Dec 28 23:44:03 host sshd[16962]: pam_unix(sshd:auth): check pass; user unknown Dec 28 23:44:03 host sshd[16962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Dec 28 23:44:05 host sshd[16962]: Failed password for invalid user service from 31.41.244.124 port 17788 ssh2 Dec 28 23:44:05 host sshd[16962]: Received disconnect from 31.41.244.124 port 17788:11: Client disconnecting normally [preauth] Dec 28 23:44:05 host sshd[16962]: Disconnected from 31.41.244.124 port 17788 [preauth] Dec 28 23:47:28 host sshd[17806]: Invalid user user1 from 41.197.31.178 port 38692 Dec 28 23:47:28 host sshd[17806]: input_userauth_request: invalid user user1 [preauth] Dec 28 23:47:28 host sshd[17806]: pam_unix(sshd:auth): check pass; user unknown Dec 28 23:47:28 host sshd[17806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 28 23:47:30 host sshd[17806]: Failed password for invalid user user1 from 41.197.31.178 port 38692 ssh2 Dec 28 23:47:31 host sshd[17806]: Connection closed by 41.197.31.178 port 38692 [preauth] Dec 29 00:09:52 host sshd[23041]: Invalid user user1 from 103.13.40.2 port 60136 Dec 29 00:09:52 host sshd[23041]: input_userauth_request: invalid user user1 [preauth] Dec 29 00:09:52 host sshd[23041]: pam_unix(sshd:auth): check pass; user unknown Dec 29 00:09:52 host sshd[23041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 29 00:09:53 host sshd[23041]: Failed password for invalid user user1 from 103.13.40.2 port 60136 ssh2 Dec 29 00:09:53 host sshd[23041]: Connection closed by 103.13.40.2 port 60136 [preauth] Dec 29 00:12:21 host sshd[23625]: Connection closed by 172.104.11.34 port 34710 [preauth] Dec 29 00:12:23 host sshd[23633]: Connection closed by 172.104.11.34 port 34722 [preauth] Dec 29 00:12:24 host sshd[23640]: Connection closed by 172.104.11.34 port 34732 [preauth] Dec 29 00:15:52 host sshd[25290]: User root from 106.10.122.53 not allowed because not listed in AllowUsers Dec 29 00:15:52 host sshd[25290]: input_userauth_request: invalid user root [preauth] Dec 29 00:15:52 host unix_chkpwd[25294]: password check failed for user (root) Dec 29 00:15:52 host sshd[25290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 user=root Dec 29 00:15:52 host sshd[25290]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 00:15:54 host sshd[25290]: Failed password for invalid user root from 106.10.122.53 port 57182 ssh2 Dec 29 00:15:54 host sshd[25290]: Connection closed by 106.10.122.53 port 57182 [preauth] Dec 29 00:19:51 host sshd[26393]: Invalid user user1 from 162.218.126.136 port 55486 Dec 29 00:19:51 host sshd[26393]: input_userauth_request: invalid user user1 [preauth] Dec 29 00:19:51 host sshd[26393]: pam_unix(sshd:auth): check pass; user unknown Dec 29 00:19:51 host sshd[26393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 29 00:19:53 host sshd[26393]: Failed password for invalid user user1 from 162.218.126.136 port 55486 ssh2 Dec 29 00:19:54 host sshd[26393]: Connection closed by 162.218.126.136 port 55486 [preauth] Dec 29 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 29 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 29 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 29 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 29 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 29 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 29 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 29 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 29 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 29 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=vfmassets user-3=shalinijames user-4=wwwtestugo user-5=woodpeck user-6=wwwkapin user-7=disposeat user-8=remysagr user-9=wwwkmaorg user-10=wwwnexidigital user-11=mrsclean user-12=palco123 user-13=gifterman user-14=kottayamcalldriv user-15=phmetals user-16=straightcurve user-17=wwwletsstalkfood user-18=bonifacegroup user-19=wwwevmhonda user-20=laundryboniface user-21=a2zgroup user-22=dartsimp user-23=wwwkaretakers user-24=cochintaxi user-25=keralaholi user-26=wwwresourcehunte user-27=wwwrmswll user-28=ugotscom user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 29 00:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 29 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-VOrY4DbZANDnGUby.~ Dec 29 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-VOrY4DbZANDnGUby.~' Dec 29 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-VOrY4DbZANDnGUby.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 29 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 29 00:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 00:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 00:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 00:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 00:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 00:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 00:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 00:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 00:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 00:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 00:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 00:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 29 00:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 00:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 00:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 00:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 00:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 00:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 29 00:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 29 00:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 29 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 29 00:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 00:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 29 00:21:59 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 00:22:01 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 00:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 29 00:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 00:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 00:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 29 00:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 00:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 00:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 29 00:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 00:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 00:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 29 00:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 00:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 00:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 29 00:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 00:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 00:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 29 00:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 00:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 00:28:24 host sshd[28693]: Did not receive identification string from 193.42.33.214 port 46512 Dec 29 00:28:41 host sshd[28753]: User root from 193.42.33.214 not allowed because not listed in AllowUsers Dec 29 00:28:41 host sshd[28753]: input_userauth_request: invalid user root [preauth] Dec 29 00:28:41 host unix_chkpwd[28760]: password check failed for user (root) Dec 29 00:28:41 host sshd[28753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.42.33.214 user=root Dec 29 00:28:41 host sshd[28753]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 00:28:43 host sshd[28753]: Failed password for invalid user root from 193.42.33.214 port 52426 ssh2 Dec 29 00:28:44 host sshd[28753]: Received disconnect from 193.42.33.214 port 52426:11: Normal Shutdown, Thank you for playing [preauth] Dec 29 00:28:44 host sshd[28753]: Disconnected from 193.42.33.214 port 52426 [preauth] Dec 29 00:28:56 host sshd[28792]: User root from 193.42.33.214 not allowed because not listed in AllowUsers Dec 29 00:28:56 host sshd[28792]: input_userauth_request: invalid user root [preauth] Dec 29 00:28:56 host unix_chkpwd[28798]: password check failed for user (root) Dec 29 00:28:56 host sshd[28792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.42.33.214 user=root Dec 29 00:28:56 host sshd[28792]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 00:28:58 host sshd[28792]: Failed password for invalid user root from 193.42.33.214 port 57266 ssh2 Dec 29 00:28:58 host sshd[28792]: Received disconnect from 193.42.33.214 port 57266:11: Normal Shutdown, Thank you for playing [preauth] Dec 29 00:28:58 host sshd[28792]: Disconnected from 193.42.33.214 port 57266 [preauth] Dec 29 01:14:34 host sshd[7308]: Connection reset by 14.99.68.91 port 58346 [preauth] Dec 29 01:18:10 host sshd[8181]: Invalid user eg from 45.93.201.90 port 58462 Dec 29 01:18:10 host sshd[8181]: input_userauth_request: invalid user eg [preauth] Dec 29 01:18:10 host sshd[8181]: pam_unix(sshd:auth): check pass; user unknown Dec 29 01:18:10 host sshd[8181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 29 01:18:12 host sshd[8181]: Failed password for invalid user eg from 45.93.201.90 port 58462 ssh2 Dec 29 01:18:15 host sshd[8181]: pam_unix(sshd:auth): check pass; user unknown Dec 29 01:18:18 host sshd[8181]: Failed password for invalid user eg from 45.93.201.90 port 58462 ssh2 Dec 29 01:18:21 host sshd[8181]: pam_unix(sshd:auth): check pass; user unknown Dec 29 01:18:24 host sshd[8181]: Failed password for invalid user eg from 45.93.201.90 port 58462 ssh2 Dec 29 01:18:27 host sshd[8181]: Connection closed by 45.93.201.90 port 58462 [preauth] Dec 29 01:18:27 host sshd[8181]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 29 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 29 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 29 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 29 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 29 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 29 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 29 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 29 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 29 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 29 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=mrsclean user-2=wwwnexidigital user-3=palco123 user-4=gifterman user-5=kottayamcalldriv user-6=phmetals user-7=straightcurve user-8=wwwletsstalkfood user-9=bonifacegroup user-10=wwwevmhonda user-11=pmcresources user-12=vfmassets user-13=shalinijames user-14=wwwtestugo user-15=woodpeck user-16=wwwkapin user-17=remysagr user-18=disposeat user-19=wwwkmaorg user-20=wwwresourcehunte user-21=keralaholi user-22=wwwrmswll user-23=ugotscom user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=a2zgroup user-28=dartsimp user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 29 01:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 29 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-MCajwVHdlQC3nmVF.~ Dec 29 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-MCajwVHdlQC3nmVF.~' Dec 29 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-MCajwVHdlQC3nmVF.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 29 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 29 01:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 01:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 01:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 01:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 01:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 29 01:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 01:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 01:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 01:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 01:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 29 01:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 29 01:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 29 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 29 01:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 01:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 29 01:21:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 01:21:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 01:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 29 01:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 01:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 01:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 29 01:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 01:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 29 01:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 01:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 01:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 29 01:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 01:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 29 01:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 01:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 01:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 29 01:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 01:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 01:28:03 host sshd[10877]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Dec 29 01:28:03 host sshd[10877]: input_userauth_request: invalid user root [preauth] Dec 29 01:28:03 host unix_chkpwd[10883]: password check failed for user (root) Dec 29 01:28:03 host sshd[10877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Dec 29 01:28:03 host sshd[10877]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 01:28:05 host sshd[10877]: Failed password for invalid user root from 162.218.126.136 port 41234 ssh2 Dec 29 01:28:05 host sshd[10877]: Connection closed by 162.218.126.136 port 41234 [preauth] Dec 29 01:33:29 host sshd[12231]: User root from 41.197.31.178 not allowed because not listed in AllowUsers Dec 29 01:33:29 host sshd[12231]: input_userauth_request: invalid user root [preauth] Dec 29 01:33:29 host unix_chkpwd[12236]: password check failed for user (root) Dec 29 01:33:29 host sshd[12231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 user=root Dec 29 01:33:29 host sshd[12231]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 01:33:30 host sshd[12231]: Failed password for invalid user root from 41.197.31.178 port 41898 ssh2 Dec 29 01:33:31 host sshd[12231]: Connection closed by 41.197.31.178 port 41898 [preauth] Dec 29 01:36:02 host sshd[12909]: Connection reset by 14.99.68.91 port 59834 [preauth] Dec 29 01:36:08 host sshd[12925]: Invalid user lixin from 103.13.40.2 port 34194 Dec 29 01:36:08 host sshd[12925]: input_userauth_request: invalid user lixin [preauth] Dec 29 01:36:08 host sshd[12925]: pam_unix(sshd:auth): check pass; user unknown Dec 29 01:36:08 host sshd[12925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 29 01:36:10 host sshd[12925]: Failed password for invalid user lixin from 103.13.40.2 port 34194 ssh2 Dec 29 01:36:10 host sshd[12925]: Connection closed by 103.13.40.2 port 34194 [preauth] Dec 29 01:37:39 host sshd[13235]: Did not receive identification string from 35.168.7.88 port 49234 Dec 29 01:39:48 host sshd[13686]: Invalid user admin from 35.168.7.88 port 51584 Dec 29 01:39:48 host sshd[13686]: input_userauth_request: invalid user admin [preauth] Dec 29 01:39:48 host sshd[13686]: pam_unix(sshd:auth): check pass; user unknown Dec 29 01:39:48 host sshd[13686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.168.7.88 Dec 29 01:39:50 host sshd[13686]: Failed password for invalid user admin from 35.168.7.88 port 51584 ssh2 Dec 29 01:39:50 host sshd[13686]: Connection closed by 35.168.7.88 port 51584 [preauth] Dec 29 01:40:56 host sshd[14023]: Invalid user admin from 35.168.7.88 port 58018 Dec 29 01:40:56 host sshd[14023]: input_userauth_request: invalid user admin [preauth] Dec 29 01:40:56 host sshd[14023]: pam_unix(sshd:auth): check pass; user unknown Dec 29 01:40:56 host sshd[14023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.168.7.88 Dec 29 01:40:58 host sshd[14023]: Failed password for invalid user admin from 35.168.7.88 port 58018 ssh2 Dec 29 01:40:59 host sshd[14023]: Connection closed by 35.168.7.88 port 58018 [preauth] Dec 29 01:42:38 host sshd[14456]: Invalid user user1 from 106.10.122.53 port 40658 Dec 29 01:42:38 host sshd[14456]: input_userauth_request: invalid user user1 [preauth] Dec 29 01:42:38 host sshd[14456]: pam_unix(sshd:auth): check pass; user unknown Dec 29 01:42:38 host sshd[14456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 29 01:42:40 host sshd[14456]: Failed password for invalid user user1 from 106.10.122.53 port 40658 ssh2 Dec 29 01:42:40 host sshd[14456]: Connection closed by 106.10.122.53 port 40658 [preauth] Dec 29 01:48:08 host sshd[16068]: Connection reset by 14.99.68.91 port 38670 [preauth] Dec 29 02:05:19 host sshd[20354]: Invalid user user1 from 92.46.108.20 port 43872 Dec 29 02:05:19 host sshd[20354]: input_userauth_request: invalid user user1 [preauth] Dec 29 02:05:19 host sshd[20354]: pam_unix(sshd:auth): check pass; user unknown Dec 29 02:05:19 host sshd[20354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 29 02:05:21 host sshd[20354]: Failed password for invalid user user1 from 92.46.108.20 port 43872 ssh2 Dec 29 02:05:22 host sshd[20354]: Connection closed by 92.46.108.20 port 43872 [preauth] Dec 29 02:12:18 host sshd[22179]: Invalid user pi from 191.251.125.84 port 48050 Dec 29 02:12:18 host sshd[22179]: input_userauth_request: invalid user pi [preauth] Dec 29 02:12:18 host sshd[22181]: Invalid user pi from 191.251.125.84 port 48056 Dec 29 02:12:18 host sshd[22181]: input_userauth_request: invalid user pi [preauth] Dec 29 02:12:18 host sshd[22179]: pam_unix(sshd:auth): check pass; user unknown Dec 29 02:12:18 host sshd[22179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.251.125.84 Dec 29 02:12:18 host sshd[22181]: pam_unix(sshd:auth): check pass; user unknown Dec 29 02:12:18 host sshd[22181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.251.125.84 Dec 29 02:12:20 host sshd[22179]: Failed password for invalid user pi from 191.251.125.84 port 48050 ssh2 Dec 29 02:12:20 host sshd[22181]: Failed password for invalid user pi from 191.251.125.84 port 48056 ssh2 Dec 29 02:12:20 host sshd[22179]: Connection closed by 191.251.125.84 port 48050 [preauth] Dec 29 02:12:21 host sshd[22181]: Connection closed by 191.251.125.84 port 48056 [preauth] Dec 29 02:15:33 host sshd[23055]: Connection closed by 107.170.255.12 port 57874 [preauth] Dec 29 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 29 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 29 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 29 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 29 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 29 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 29 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 29 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 29 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 02:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 29 02:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=dartsimp user-3=a2zgroup user-4=cochintaxi user-5=wwwkaretakers user-6=wwwrmswll user-7=keralaholi user-8=wwwresourcehunte user-9=ugotscom user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=vfmassets user-14=wwwtestugo user-15=shalinijames user-16=wwwkapin user-17=woodpeck user-18=wwwkmaorg user-19=disposeat user-20=remysagr user-21=wwwnexidigital user-22=mrsclean user-23=gifterman user-24=palco123 user-25=phmetals user-26=kottayamcalldriv user-27=straightcurve user-28=wwwletsstalkfood user-29=bonifacegroup user-30=wwwevmhonda feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 29 02:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 29 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-J14Fyy57mlJo0Cec.~ Dec 29 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-J14Fyy57mlJo0Cec.~' Dec 29 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-J14Fyy57mlJo0Cec.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 29 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 29 02:21:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:21:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 29 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 02:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 29 02:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 29 02:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 29 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 29 02:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 02:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 29 02:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 02:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 02:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 29 02:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 29 02:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 29 02:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 29 02:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 29 02:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 29 02:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 02:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 02:25:27 host sshd[24962]: Invalid user steven from 107.189.30.59 port 34312 Dec 29 02:25:27 host sshd[24962]: input_userauth_request: invalid user steven [preauth] Dec 29 02:25:27 host sshd[24962]: pam_unix(sshd:auth): check pass; user unknown Dec 29 02:25:27 host sshd[24962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Dec 29 02:25:29 host sshd[24962]: Failed password for invalid user steven from 107.189.30.59 port 34312 ssh2 Dec 29 02:25:30 host sshd[24962]: Connection closed by 107.189.30.59 port 34312 [preauth] Dec 29 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 02:29:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:29:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 02:29:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:29:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 02:29:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:29:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 29 02:29:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:29:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 02:29:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:29:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=straightcurve user-2=wwwletsstalkfood user-3=wwwevmhonda user-4=bonifacegroup user-5=wwwnexidigital user-6=mrsclean user-7=phmetals user-8=kottayamcalldriv user-9=gifterman user-10=palco123 user-11=woodpeck user-12=wwwkapin user-13=disposeat user-14=wwwkmaorg user-15=remysagr user-16=pmcresources user-17=wwwtestugo user-18=shalinijames user-19=vfmassets user-20=wwwpmcresource user-21=ugotscom user-22=wwwrmswll user-23=keralaholi user-24=wwwresourcehunte user-25=travelboniface user-26=wwwkaretakers user-27=cochintaxi user-28=laundryboniface user-29=dartsimp user-30=a2zgroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 29 02:29:46 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 29 02:29:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:29:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwevmhonda --output=json Dec 29 02:29:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:29:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color instance info --format=json --check-updates=true Dec 29 02:29:46 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 29 02:29:51 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 29 02:29:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 29 02:29:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 29 02:29:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 29 02:29:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 29 02:29:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 29 02:29:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 29 02:29:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 29 02:29:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 29 02:29:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 29 02:29:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwevmhonda LangPHP php_get_vhost_versions --output=json Dec 29 02:29:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:29:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:29:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 package_manager_get_package_info package-0=ea-php72 --output=json Dec 29 02:29:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:29:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:29:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color instance login-url --skip-plugins=false --format=json Dec 29 02:29:55 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 29 02:29:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 29 02:29:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwletsstalkfood --output=json Dec 29 02:29:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:29:56 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:29:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color instance info --format=json --check-updates=true Dec 29 02:29:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 02:30:02 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 02:30:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 29 02:30:03 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 02:30:04 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 02:30:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 29 02:30:04 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 02:30:10 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 02:30:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 29 02:30:10 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 02:30:10 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 02:30:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood LangPHP php_get_vhost_versions --output=json Dec 29 02:30:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:30:10 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:30:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color instance login-url --skip-plugins=false --format=json Dec 29 02:30:10 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 02:30:10 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 02:30:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DomainInfo single_domain_data domain=letsstalkfood.com return_https_redirect_status=1 --output=json Dec 29 02:30:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:30:10 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:30:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_vhost_ssl_components --output=json Dec 29 02:30:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:30:11 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:30:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_ssl_vhosts --output=json Dec 29 02:30:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:30:11 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:30:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood Mime list_redirects --output=json Dec 29 02:30:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:30:11 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:30:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 29 02:30:11 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 02:30:12 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 02:30:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 29 02:30:12 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 02:30:14 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 02:30:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 29 02:30:14 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 02:30:19 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 02:30:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 29 02:30:19 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 02:30:24 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 02:30:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/wp-config.php Dec 29 02:30:24 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 02:30:24 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 02:30:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:30:24 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 02:30:25 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 02:30:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/.maintenance Dec 29 02:30:25 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 02:30:25 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 02:30:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color db-prefix get Dec 29 02:30:25 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 02:30:25 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 02:30:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DirectoryPrivacy is_directory_protected dir=/home/wwwletsstalkfood/public_html --output=json Dec 29 02:30:25 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:30:25 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:30:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:30:25 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 02:30:26 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 02:30:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 29 02:30:26 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 02:30:27 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 02:30:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 29 02:30:27 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 02:30:27 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 02:30:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 29 02:30:27 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 02:30:27 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 02:30:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 29 02:30:27 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 02:30:28 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 02:30:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color admin-username is-secure Dec 29 02:30:28 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 02:30:28 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 02:30:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:30:28 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 02:30:29 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 02:30:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/wp-config.php Dec 29 02:30:29 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 02:30:29 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 02:30:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/stat -c %a /home/wwwletsstalkfood/public_html/wp-config.php Dec 29 02:30:29 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 02:30:29 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 02:30:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color pingbacks is_disabled Dec 29 02:30:29 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 02:30:29 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 02:30:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:30:29 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 02:30:30 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 02:30:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color security-keys are_keys_correct Dec 29 02:30:30 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 02:30:30 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 02:30:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=mrsclean --output=json Dec 29 02:30:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:30:30 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:30:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/backup --no-color instance info --format=json --check-updates=true Dec 29 02:30:30 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 29 02:30:31 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 29 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean DomainInfo single_domain_data domain=mrsclean.co.in return_https_redirect_status=1 --output=json Dec 29 02:30:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:30:31 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean Mime list_redirects --output=json Dec 29 02:30:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:30:31 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/public_html/backup/wp-includes/version.php Dec 29 02:30:31 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 29 02:30:31 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 29 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/public_html/backup/wp-includes/version.php Dec 29 02:30:31 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 29 02:30:31 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 29 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 29 02:30:31 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 29 02:30:31 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 29 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean LangPHP php_get_vhost_versions --output=json Dec 29 02:30:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:30:31 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 29 02:30:31 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:30:31 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/blog --no-color instance info --format=json --check-updates=true Dec 29 02:30:31 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 29 02:30:31 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 29 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/public_html/blog/wp-includes/version.php Dec 29 02:30:31 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 29 02:30:31 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 29 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/public_html/blog/wp-includes/version.php Dec 29 02:30:32 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 29 02:30:32 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 29 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 29 02:30:32 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 29 02:30:32 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 29 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=shalinijames --output=json Dec 29 02:30:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:30:32 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color instance info --format=json --check-updates=true Dec 29 02:30:32 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 02:30:39 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 02:30:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_plugins --format=json Dec 29 02:30:39 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 02:30:40 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 02:30:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_themes --format=json Dec 29 02:30:40 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 02:30:40 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 02:30:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 29 02:30:40 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 02:30:40 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 02:30:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames LangPHP php_get_vhost_versions --output=json Dec 29 02:30:40 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:30:40 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:30:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color instance login-url --skip-plugins=false --format=json Dec 29 02:30:40 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 02:30:41 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 02:30:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DomainInfo single_domain_data domain=shalinijames.com return_https_redirect_status=1 --output=json Dec 29 02:30:41 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:30:41 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:30:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames Mime list_redirects --output=json Dec 29 02:30:41 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:30:41 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:30:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 29 02:30:41 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 02:30:43 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 02:30:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_plugins --format=json Dec 29 02:30:43 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 02:30:43 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 02:30:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 29 02:30:43 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 02:30:48 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 02:30:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_themes --format=json Dec 29 02:30:48 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 02:30:48 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 02:30:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/wp-config.php Dec 29 02:30:48 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 02:30:48 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 02:30:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:30:48 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 02:30:49 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 02:30:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/.maintenance Dec 29 02:30:49 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 02:30:49 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 02:30:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color db-prefix get Dec 29 02:30:49 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 02:30:49 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 02:30:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DirectoryPrivacy is_directory_protected dir=/home/shalinijames/public_html --output=json Dec 29 02:30:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:30:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:30:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:30:49 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 02:30:50 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 02:30:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 29 02:30:50 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 02:30:50 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 02:30:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 29 02:30:50 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 02:30:51 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 02:30:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 29 02:30:51 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 02:30:51 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 02:30:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 29 02:30:51 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 02:30:51 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 02:30:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color admin-username is-secure Dec 29 02:30:51 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 02:30:52 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 02:30:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:30:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 02:30:52 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 02:30:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/wp-config.php Dec 29 02:30:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 02:30:52 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 02:30:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/stat -c %a /home/shalinijames/public_html/wp-config.php Dec 29 02:30:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 02:30:52 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 02:30:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color pingbacks is_disabled Dec 29 02:30:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 02:30:53 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 02:30:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:30:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 02:30:53 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 02:30:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color security-keys are_keys_correct Dec 29 02:30:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 02:30:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 02:30:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwtestugo --output=json Dec 29 02:30:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:30:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:30:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color instance info --format=json --check-updates=true Dec 29 02:30:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_plugins --format=json Dec 29 02:31:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_themes --format=json Dec 29 02:31:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 29 02:31:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo LangPHP php_get_vhost_versions --output=json Dec 29 02:31:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:31:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:31:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color instance login-url --skip-plugins=false --format=json Dec 29 02:31:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DomainInfo single_domain_data domain=testugo.in return_https_redirect_status=1 --output=json Dec 29 02:31:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:31:02 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:31:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo Mime list_redirects --output=json Dec 29 02:31:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:31:02 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:31:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 29 02:31:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_plugins --format=json Dec 29 02:31:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 29 02:31:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_themes --format=json Dec 29 02:31:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/wp-config.php Dec 29 02:31:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:31:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/.maintenance Dec 29 02:31:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color db-prefix get Dec 29 02:31:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt1 --output=json Dec 29 02:31:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:31:08 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:31:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:31:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 29 02:31:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 29 02:31:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 29 02:31:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 29 02:31:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color admin-username is-secure Dec 29 02:31:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:31:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/wp-config.php Dec 29 02:31:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/tt1/wp-config.php Dec 29 02:31:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color pingbacks is_disabled Dec 29 02:31:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:31:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color security-keys are_keys_correct Dec 29 02:31:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color instance info --format=json --check-updates=true Dec 29 02:31:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_plugins --format=json Dec 29 02:31:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_themes --format=json Dec 29 02:31:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:18 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 29 02:31:18 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:18 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color instance login-url --skip-plugins=false --format=json Dec 29 02:31:18 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:18 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 29 02:31:18 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:19 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_plugins --format=json Dec 29 02:31:19 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:19 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 29 02:31:19 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:23 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_themes --format=json Dec 29 02:31:23 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:23 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/wp-config.php Dec 29 02:31:23 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:23 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:31:24 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:24 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/.maintenance Dec 29 02:31:24 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:24 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color db-prefix get Dec 29 02:31:24 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:24 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt --output=json Dec 29 02:31:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:31:24 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:31:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:31:24 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:25 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 29 02:31:25 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:25 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 29 02:31:25 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:26 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 29 02:31:26 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:26 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 29 02:31:26 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color admin-username is-secure Dec 29 02:31:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:31:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/wp-config.php Dec 29 02:31:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/tt/wp-config.php Dec 29 02:31:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color pingbacks is_disabled Dec 29 02:31:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:28 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:31:28 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:28 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color security-keys are_keys_correct Dec 29 02:31:28 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:29 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color instance info --format=json --check-updates=true Dec 29 02:31:29 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:34 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_plugins --format=json Dec 29 02:31:34 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:34 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_themes --format=json Dec 29 02:31:34 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:35 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 29 02:31:35 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:35 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color instance login-url --skip-plugins=false --format=json Dec 29 02:31:35 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:37 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 29 02:31:37 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:38 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_plugins --format=json Dec 29 02:31:38 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:38 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 29 02:31:38 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:42 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_themes --format=json Dec 29 02:31:42 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:42 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/wp-config.php Dec 29 02:31:42 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:42 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:31:42 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:43 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/.maintenance Dec 29 02:31:43 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:43 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color db-prefix get Dec 29 02:31:43 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:43 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/HYPE --output=json Dec 29 02:31:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:31:43 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:31:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:31:43 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:44 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 29 02:31:44 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:44 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 29 02:31:44 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:45 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 29 02:31:45 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:45 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 29 02:31:45 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color admin-username is-secure Dec 29 02:31:46 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:31:46 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/wp-config.php Dec 29 02:31:46 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/HYPE/wp-config.php Dec 29 02:31:46 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color pingbacks is_disabled Dec 29 02:31:46 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:47 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:31:47 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:47 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color security-keys are_keys_correct Dec 29 02:31:47 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:31:48 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:31:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=ugotscom --output=json Dec 29 02:31:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:31:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:31:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/boniface/blog --no-color instance info --format=json --check-updates=true Dec 29 02:31:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:31:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:31:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DomainInfo single_domain_data domain=ugotechnologies.com return_https_redirect_status=1 --output=json Dec 29 02:31:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:31:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:31:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom Mime list_redirects --output=json Dec 29 02:31:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:31:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:31:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/boniface/blog/wp-includes/version.php Dec 29 02:31:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:31:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:31:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/public_html/boniface/blog/wp-includes/version.php Dec 29 02:31:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:31:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:31:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 29 02:31:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:31:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:31:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom LangPHP php_get_vhost_versions --output=json Dec 29 02:31:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:31:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:31:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color instance info --format=json --check-updates=true Dec 29 02:31:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:31:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:31:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_plugins --format=json Dec 29 02:31:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:31:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:31:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_themes --format=json Dec 29 02:31:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:31:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:31:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 29 02:31:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:31:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:31:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color instance login-url --skip-plugins=false --format=json Dec 29 02:31:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:31:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:31:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 29 02:31:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:31:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:31:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_plugins --format=json Dec 29 02:31:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:31:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:31:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 29 02:31:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_themes --format=json Dec 29 02:32:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php Dec 29 02:32:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:32:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/.maintenance Dec 29 02:32:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color db-prefix get Dec 29 02:32:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --output=json Dec 29 02:32:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:32:05 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:32:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:32:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 29 02:32:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 29 02:32:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 29 02:32:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 29 02:32:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color admin-username is-secure Dec 29 02:32:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:32:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php Dec 29 02:32:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/stat -c %a /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php Dec 29 02:32:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color pingbacks is_disabled Dec 29 02:32:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:32:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color security-keys are_keys_correct Dec 29 02:32:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color instance info --format=json --check-updates=true Dec 29 02:32:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_plugins --format=json Dec 29 02:32:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_themes --format=json Dec 29 02:32:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 29 02:32:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color instance login-url --skip-plugins=false --format=json Dec 29 02:32:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 29 02:32:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_plugins --format=json Dec 29 02:32:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 29 02:32:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_themes --format=json Dec 29 02:32:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/wp-config.php Dec 29 02:32:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:32:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/.maintenance Dec 29 02:32:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color db-prefix get Dec 29 02:32:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/site --output=json Dec 29 02:32:18 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:32:18 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:32:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:32:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 29 02:32:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:19 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 29 02:32:19 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:19 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 29 02:32:19 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 29 02:32:20 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color admin-username is-secure Dec 29 02:32:20 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:32:20 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/wp-config.php Dec 29 02:32:21 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/stat -c %a /home/ugotscom/public_html/old/site/wp-config.php Dec 29 02:32:21 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color pingbacks is_disabled Dec 29 02:32:21 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:32:21 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color security-keys are_keys_correct Dec 29 02:32:22 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:32:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:32:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=woodpeck --output=json Dec 29 02:32:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:32:22 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:32:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/woodpeck/public_html/wp --no-color instance info --format=json --check-updates=true Dec 29 02:32:22 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 29 02:32:22 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 29 02:32:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck DomainInfo single_domain_data domain=woodpeckerindia.com return_https_redirect_status=1 --output=json Dec 29 02:32:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:32:22 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:32:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck Mime list_redirects --output=json Dec 29 02:32:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:32:22 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:32:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/public_html/wp/wp-includes/version.php Dec 29 02:32:22 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 29 02:32:22 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 29 02:32:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 29 02:32:22 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 29 02:32:23 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 29 02:32:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck LangPHP php_get_vhost_versions --output=json Dec 29 02:32:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:32:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:32:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=palco123 --output=json Dec 29 02:32:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:32:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:32:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color instance info --format=json --check-updates=true Dec 29 02:32:23 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 29 02:32:30 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 29 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 29 02:32:30 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 29 02:32:31 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 29 02:32:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 29 02:32:31 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 29 02:32:36 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 29 02:32:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 29 02:32:36 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 29 02:32:36 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 29 02:32:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 LangPHP php_get_vhost_versions --output=json Dec 29 02:32:36 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:32:37 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:32:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color instance login-url --skip-plugins=false --format=json Dec 29 02:32:37 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 29 02:32:37 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 29 02:32:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DomainInfo single_domain_data domain=panlys.com return_https_redirect_status=1 --output=json Dec 29 02:32:37 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:32:38 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:32:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 Mime list_redirects --output=json Dec 29 02:32:38 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:32:38 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:32:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 29 02:32:38 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 29 02:32:38 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 29 02:32:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 29 02:32:38 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 29 02:32:39 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 29 02:32:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 29 02:32:39 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 29 02:32:44 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 29 02:32:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 29 02:32:44 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 29 02:32:50 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 29 02:32:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/wp-config.php Dec 29 02:32:50 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 29 02:32:50 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 29 02:32:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:32:50 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 29 02:32:51 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 29 02:32:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/.maintenance Dec 29 02:32:51 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 29 02:32:51 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 29 02:32:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color db-prefix get Dec 29 02:32:51 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 29 02:32:51 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 29 02:32:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DirectoryPrivacy is_directory_protected dir=/home/palco123/public_html --output=json Dec 29 02:32:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:32:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:32:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:32:51 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 29 02:32:52 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 29 02:32:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color option get auto_update_core_major Dec 29 02:32:52 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 29 02:32:52 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 29 02:32:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 29 02:32:53 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 29 02:32:53 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 29 02:32:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 29 02:32:53 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 29 02:32:54 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 29 02:32:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color admin-username is-secure Dec 29 02:32:54 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 29 02:32:54 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 29 02:32:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:32:54 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 29 02:32:55 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 29 02:32:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/wp-config.php Dec 29 02:32:55 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 29 02:32:55 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 29 02:32:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/stat -c %a /home/palco123/public_html/wp-config.php Dec 29 02:32:55 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 29 02:32:55 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 29 02:32:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color pingbacks is_disabled Dec 29 02:32:55 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 29 02:32:55 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 29 02:32:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:32:55 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 29 02:32:56 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 29 02:32:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color security-keys are_keys_correct Dec 29 02:32:56 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 29 02:32:56 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 29 02:32:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwresourcehunte --output=json Dec 29 02:32:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:32:56 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:32:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color instance info --format=json --check-updates=true Dec 29 02:32:56 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 02:33:03 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 02:33:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_plugins --format=json Dec 29 02:33:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 02:33:03 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 02:33:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_themes --format=json Dec 29 02:33:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 02:33:03 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 02:33:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 29 02:33:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 02:33:03 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 02:33:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte LangPHP php_get_vhost_versions --output=json Dec 29 02:33:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:04 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color instance login-url --skip-plugins=false --format=json Dec 29 02:33:04 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 02:33:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 02:33:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DomainInfo single_domain_data domain=resourcehunters.com return_https_redirect_status=1 --output=json Dec 29 02:33:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:04 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte Mime list_redirects --output=json Dec 29 02:33:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:04 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 29 02:33:04 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 02:33:05 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 02:33:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_plugins --format=json Dec 29 02:33:05 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 02:33:05 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 02:33:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 29 02:33:05 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 02:33:10 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 02:33:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_themes --format=json Dec 29 02:33:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 02:33:10 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 02:33:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/wp-config.php Dec 29 02:33:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 02:33:10 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 02:33:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:33:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 02:33:10 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 02:33:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/.maintenance Dec 29 02:33:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 02:33:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 02:33:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color db-prefix get Dec 29 02:33:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 02:33:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 02:33:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DirectoryPrivacy is_directory_protected dir=/home/wwwresourcehunte/public_html --output=json Dec 29 02:33:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:11 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:33:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 02:33:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 02:33:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 29 02:33:12 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 02:33:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 02:33:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 29 02:33:12 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 02:33:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 02:33:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 29 02:33:12 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 02:33:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 02:33:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 29 02:33:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 02:33:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 02:33:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color admin-username is-secure Dec 29 02:33:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 02:33:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 02:33:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:33:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 02:33:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 02:33:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/wp-config.php Dec 29 02:33:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 02:33:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 02:33:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/stat -c %a /home/wwwresourcehunte/public_html/wp-config.php Dec 29 02:33:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 02:33:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 02:33:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color pingbacks is_disabled Dec 29 02:33:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 02:33:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 02:33:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 29 02:33:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 02:33:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 02:33:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color security-keys are_keys_correct Dec 29 02:33:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 02:33:15 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=straightcurve WpToolkitNotification send_admin_auto_updates_notification 'available_updates_text=<br/><br/>Updates are available for the following items:<br/><br/>' 'available_updates_list=1. Plugin "Contact Form 7" on Panlys (https://www.panlys.com). Installed version: 5.4.1. Available version: 5.7.2.<br/><br/>2. Plugin "Contact Form 7 Conditional Fields" on Panlys (https://www.panlys.com). Installed version: 2.0.3. Available version: 2.3.2.<br/><br/>' installed_updates_text= installed_updates_list= 'failure_updates_text=Updates were not installed for the following items:<br/><br/>' 'failure_updates_list=1. Website "EVM Honda Cochin" (http://www.evmhonda.com): Failed to reset cache for the instance #1: Fatal error: Uncaught Error: Call to undefined function cardealer_is_wpml_active() in Dec 29 02:33:15 host sudo: wp-toolkit : (command continued) /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php:1041#012Stack trace:#012#0 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-init.php(22): require_once()#012#1 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/cardealer-helper-library.php(183): require_once('"'"'/home/wwwevmhon...'"'"')#012#2 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(287): cdhl_include_admin_files('"'"''"'"')#012#3 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(311): WP_Hook->apply_filters(NULL, Array)#012#4 /home/wwwevmhonda/public_html/wp-includes/plugin.php(478): WP_Hook->do_action(Array)#012#5 /home/wwwevmhonda/public_html/wp-settings.php(546): do_action('"'"'init'"'"')#012#6 /usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/vendor/wp-cli/wp-cli/php/WP_CLI/Runner.php(1356): Dec 29 02:33:15 host sudo: wp-toolkit : (command continued) require('"'"'/home/wwwevmhon...'"'"')#012#7 /usr/local/cpanel/3rdparty/wp-toolkit/plib/ve in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php on line 1041#012Error: There has been a critical error on your website.Learn more about debugging in WordPress. There has been a critical error on your website.#012<br/><br/>2. Website "/home/mrsclean/public_html/backup" (http://mrsclean.co.in/backup): Failed to reset cache for the instance #5: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012<br/><br/>3. Website "/home/mrsclean/public_html/blog" (http://mrsclean.co.in/blog): Failed to reset cache for the instance #6: Error: Error establishing a database Dec 29 02:33:15 host sudo: wp-toolkit : (command continued) connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012<br/><br/>4. Website "/home/ugotscom/public_html/boniface/blog" (http://ugotechnologies.com/boniface/blog): Failed to reset cache for the instance #13: Error: Error establishing a database connection.#012<br/><br/>5. Website "/home/woodpeck/public_html/wp" (http://woodpeckerindia.com/wp): Failed to reset cache for the instance #16: /bin/sh: line 0: cd: /home/woodpeck/public_html/wp: No such file or directory#012<br/><br/>' --output=json Dec 29 02:33:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:15 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color cli cache clear Dec 29 02:33:15 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 29 02:33:15 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 29 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color cli cache clear Dec 29 02:33:15 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 02:33:15 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/backup --no-color cli cache clear Dec 29 02:33:15 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 29 02:33:15 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 29 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/blog --no-color cli cache clear Dec 29 02:33:15 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 29 02:33:16 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 29 02:33:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color cli cache clear Dec 29 02:33:16 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 02:33:16 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 02:33:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color cli cache clear Dec 29 02:33:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:33:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:33:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color cli cache clear Dec 29 02:33:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:33:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:33:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color cli cache clear Dec 29 02:33:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:33:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:33:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/boniface/blog --no-color cli cache clear Dec 29 02:33:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:33:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color cli cache clear Dec 29 02:33:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:33:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color cli cache clear Dec 29 02:33:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:33:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/woodpeck/public_html/wp --no-color cli cache clear Dec 29 02:33:17 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 29 02:33:17 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 29 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color cli cache clear Dec 29 02:33:17 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 29 02:33:17 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 29 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color cli cache clear Dec 29 02:33:17 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 02:33:17 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 29 02:33:17 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 29 02:33:18 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 29 02:33:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 29 02:33:18 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 02:33:18 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 02:33:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 29 02:33:18 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 02:33:19 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 02:33:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 29 02:33:19 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:33:20 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:33:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 29 02:33:20 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:33:20 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:33:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 29 02:33:20 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 02:33:21 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 02:33:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 29 02:33:21 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:33:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:33:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 29 02:33:21 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 02:33:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 02:33:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 29 02:33:21 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 29 02:33:22 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 29 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 29 02:33:22 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 02:33:22 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c httpd -v Dec 29 02:33:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:22 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Dec 29 02:33:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:22 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Dec 29 02:33:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:22 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Dec 29 02:33:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:22 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Dec 29 02:33:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:22 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Dec 29 02:33:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:22 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Dec 29 02:33:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:22 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Dec 29 02:33:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:22 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Dec 29 02:33:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:22 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/palco123/panlys.com/wp-toolkit.conf Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/palco123/panlys.com/wp-toolkit.conf Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Dec 29 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Dec 29 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Dec 29 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Dec 29 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Dec 29 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 02:36:41 host sshd[28829]: Invalid user user1 from 162.218.126.136 port 58958 Dec 29 02:36:41 host sshd[28829]: input_userauth_request: invalid user user1 [preauth] Dec 29 02:36:42 host sshd[28829]: pam_unix(sshd:auth): check pass; user unknown Dec 29 02:36:42 host sshd[28829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 29 02:36:44 host sshd[28829]: Failed password for invalid user user1 from 162.218.126.136 port 58958 ssh2 Dec 29 02:36:44 host sshd[28829]: Connection closed by 162.218.126.136 port 58958 [preauth] Dec 29 02:44:50 host sshd[29959]: Did not receive identification string from 197.5.145.44 port 25894 Dec 29 02:44:51 host sshd[29960]: Invalid user carlos from 197.5.145.44 port 25895 Dec 29 02:44:51 host sshd[29960]: input_userauth_request: invalid user carlos [preauth] Dec 29 02:44:52 host sshd[29960]: pam_unix(sshd:auth): check pass; user unknown Dec 29 02:44:52 host sshd[29960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.44 Dec 29 02:44:52 host sshd[29966]: Invalid user ftpuser from 197.5.145.44 port 25907 Dec 29 02:44:52 host sshd[29966]: input_userauth_request: invalid user ftpuser [preauth] Dec 29 02:44:52 host sshd[29964]: Invalid user steam from 197.5.145.44 port 25914 Dec 29 02:44:52 host sshd[29963]: Invalid user user from 197.5.145.44 port 25911 Dec 29 02:44:52 host sshd[29964]: input_userauth_request: invalid user steam [preauth] Dec 29 02:44:52 host sshd[29963]: input_userauth_request: invalid user user [preauth] Dec 29 02:44:52 host sshd[29965]: User centos from 197.5.145.44 not allowed because not listed in AllowUsers Dec 29 02:44:52 host sshd[29965]: input_userauth_request: invalid user centos [preauth] Dec 29 02:44:52 host sshd[29970]: Invalid user ubuntu from 197.5.145.44 port 25898 Dec 29 02:44:52 host sshd[29970]: input_userauth_request: invalid user ubuntu [preauth] Dec 29 02:44:52 host sshd[29971]: User centos from 197.5.145.44 not allowed because not listed in AllowUsers Dec 29 02:44:52 host sshd[29971]: input_userauth_request: invalid user centos [preauth] Dec 29 02:44:52 host sshd[29976]: Invalid user test from 197.5.145.44 port 25929 Dec 29 02:44:52 host sshd[29974]: User centos from 197.5.145.44 not allowed because not listed in AllowUsers Dec 29 02:44:52 host sshd[29972]: Invalid user web from 197.5.145.44 port 25912 Dec 29 02:44:52 host sshd[29974]: input_userauth_request: invalid user centos [preauth] Dec 29 02:44:52 host sshd[29976]: input_userauth_request: invalid user test [preauth] Dec 29 02:44:52 host sshd[29972]: input_userauth_request: invalid user web [preauth] Dec 29 02:44:52 host sshd[29978]: Invalid user hadoop from 197.5.145.44 port 25899 Dec 29 02:44:52 host sshd[29978]: input_userauth_request: invalid user hadoop [preauth] Dec 29 02:44:52 host sshd[29979]: Invalid user tester from 197.5.145.44 port 25932 Dec 29 02:44:52 host sshd[29979]: input_userauth_request: invalid user tester [preauth] Dec 29 02:44:52 host sshd[29984]: User centos from 197.5.145.44 not allowed because not listed in AllowUsers Dec 29 02:44:52 host sshd[29981]: Invalid user test from 197.5.145.44 port 25934 Dec 29 02:44:52 host sshd[29985]: Invalid user hadoop from 197.5.145.44 port 25901 Dec 29 02:44:52 host sshd[29977]: User centos from 197.5.145.44 not allowed because not listed in AllowUsers Dec 29 02:44:52 host sshd[29977]: input_userauth_request: invalid user centos [preauth] Dec 29 02:44:52 host sshd[29984]: input_userauth_request: invalid user centos [preauth] Dec 29 02:44:52 host sshd[29985]: input_userauth_request: invalid user hadoop [preauth] Dec 29 02:44:52 host sshd[29981]: input_userauth_request: invalid user test [preauth] Dec 29 02:44:52 host sshd[29983]: Invalid user git from 197.5.145.44 port 25930 Dec 29 02:44:52 host sshd[29987]: Invalid user posiflex from 197.5.145.44 port 25916 Dec 29 02:44:52 host sshd[29982]: Invalid user devops from 197.5.145.44 port 25905 Dec 29 02:44:52 host sshd[29983]: input_userauth_request: invalid user git [preauth] Dec 29 02:44:52 host sshd[29986]: Invalid user a from 197.5.145.44 port 25928 Dec 29 02:44:52 host sshd[29987]: input_userauth_request: invalid user posiflex [preauth] Dec 29 02:44:52 host sshd[29982]: input_userauth_request: invalid user devops [preauth] Dec 29 02:44:52 host sshd[29986]: input_userauth_request: invalid user a [preauth] Dec 29 02:44:52 host sshd[29975]: Invalid user oracle from 197.5.145.44 port 25909 Dec 29 02:44:52 host sshd[29975]: input_userauth_request: invalid user oracle [preauth] Dec 29 02:44:52 host sshd[29980]: Invalid user ec2-user from 197.5.145.44 port 25897 Dec 29 02:44:52 host sshd[29980]: input_userauth_request: invalid user ec2-user [preauth] Dec 29 02:44:52 host sshd[29989]: Invalid user oracle from 197.5.145.44 port 25933 Dec 29 02:44:52 host sshd[29989]: input_userauth_request: invalid user oracle [preauth] Dec 29 02:44:52 host sshd[29990]: Invalid user test from 197.5.145.44 port 25908 Dec 29 02:44:52 host sshd[29992]: Invalid user ubuntu from 197.5.145.44 port 25918 Dec 29 02:44:52 host sshd[29993]: Invalid user postgres from 197.5.145.44 port 25921 Dec 29 02:44:52 host sshd[29994]: Invalid user steam from 197.5.145.44 port 25900 Dec 29 02:44:52 host sshd[29993]: input_userauth_request: invalid user postgres [preauth] Dec 29 02:44:52 host sshd[29992]: input_userauth_request: invalid user ubuntu [preauth] Dec 29 02:44:52 host sshd[29994]: input_userauth_request: invalid user steam [preauth] Dec 29 02:44:52 host sshd[29991]: User centos from 197.5.145.44 not allowed because not listed in AllowUsers Dec 29 02:44:52 host sshd[29991]: input_userauth_request: invalid user centos [preauth] Dec 29 02:44:52 host sshd[29990]: input_userauth_request: invalid user test [preauth] Dec 29 02:44:52 host sshd[29966]: pam_unix(sshd:auth): check pass; user unknown Dec 29 02:44:52 host sshd[29966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.44 Dec 29 02:44:52 host sshd[29963]: pam_unix(sshd:auth): check pass; user unknown Dec 29 02:44:52 host sshd[29964]: pam_unix(sshd:auth): check pass; user unknown Dec 29 02:44:52 host sshd[29963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.44 Dec 29 02:44:52 host sshd[29964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.44 Dec 29 02:44:52 host unix_chkpwd[30018]: password check failed for user (centos) Dec 29 02:44:52 host sshd[29965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.44 user=centos Dec 29 02:44:52 host sshd[29970]: pam_unix(sshd:auth): check pass; user unknown Dec 29 02:44:52 host sshd[29970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.44 Dec 29 02:44:52 host sshd[29972]: pam_unix(sshd:auth): check pass; user unknown Dec 29 02:44:52 host sshd[29976]: pam_unix(sshd:auth): check pass; user unknown Dec 29 02:44:52 host sshd[29976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.44 Dec 29 02:44:52 host sshd[29972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.44 Dec 29 02:44:52 host unix_chkpwd[30019]: password check failed for user (centos) Dec 29 02:44:52 host unix_chkpwd[30020]: password check failed for user (centos) Dec 29 02:44:52 host sshd[29971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.44 user=centos Dec 29 02:44:52 host sshd[29974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.44 user=centos Dec 29 02:44:52 host sshd[29979]: pam_unix(sshd:auth): check pass; user unknown Dec 29 02:44:52 host sshd[29979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.44 Dec 29 02:44:52 host sshd[29978]: pam_unix(sshd:auth): check pass; user unknown Dec 29 02:44:52 host sshd[29978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.44 Dec 29 02:44:52 host sshd[29981]: pam_unix(sshd:auth): check pass; user unknown Dec 29 02:44:52 host sshd[29985]: pam_unix(sshd:auth): check pass; user unknown Dec 29 02:44:52 host sshd[29981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.44 Dec 29 02:44:52 host sshd[29985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.44 Dec 29 02:44:52 host unix_chkpwd[30022]: password check failed for user (centos) Dec 29 02:44:52 host sshd[29977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.44 user=centos Dec 29 02:44:52 host unix_chkpwd[30021]: password check failed for user (centos) Dec 29 02:44:52 host sshd[29984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.44 user=centos Dec 29 02:44:52 host sshd[29983]: pam_unix(sshd:auth): check pass; user unknown Dec 29 02:44:52 host sshd[29983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.44 Dec 29 02:44:52 host sshd[29987]: pam_unix(sshd:auth): check pass; user unknown Dec 29 02:44:52 host sshd[29987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.44 Dec 29 02:44:53 host sshd[29986]: pam_unix(sshd:auth): check pass; user unknown Dec 29 02:44:53 host sshd[29986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.44 Dec 29 02:44:53 host sshd[29975]: pam_unix(sshd:auth): check pass; user unknown Dec 29 02:44:53 host sshd[29975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.44 Dec 29 02:44:53 host sshd[29982]: pam_unix(sshd:auth): check pass; user unknown Dec 29 02:44:53 host sshd[29982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.44 Dec 29 02:44:53 host sshd[29980]: pam_unix(sshd:auth): check pass; user unknown Dec 29 02:44:53 host sshd[29980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.44 Dec 29 02:44:53 host sshd[29989]: pam_unix(sshd:auth): check pass; user unknown Dec 29 02:44:53 host sshd[29989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.44 Dec 29 02:44:53 host sshd[29992]: pam_unix(sshd:auth): check pass; user unknown Dec 29 02:44:53 host sshd[29992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.44 Dec 29 02:44:53 host sshd[29994]: pam_unix(sshd:auth): check pass; user unknown Dec 29 02:44:53 host sshd[29994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.44 Dec 29 02:44:53 host sshd[29993]: pam_unix(sshd:auth): check pass; user unknown Dec 29 02:44:53 host sshd[29993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.44 Dec 29 02:44:53 host unix_chkpwd[30023]: password check failed for user (centos) Dec 29 02:44:53 host sshd[29991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.44 user=centos Dec 29 02:44:53 host sshd[29990]: pam_unix(sshd:auth): check pass; user unknown Dec 29 02:44:53 host sshd[29990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.44 Dec 29 02:44:53 host sshd[29960]: Failed password for invalid user carlos from 197.5.145.44 port 25895 ssh2 Dec 29 02:44:54 host sshd[29960]: Connection closed by 197.5.145.44 port 25895 [preauth] Dec 29 02:44:54 host sshd[29986]: Failed password for invalid user a from 197.5.145.44 port 25928 ssh2 Dec 29 02:44:54 host sshd[29975]: Failed password for invalid user oracle from 197.5.145.44 port 25909 ssh2 Dec 29 02:44:54 host sshd[29982]: Failed password for invalid user devops from 197.5.145.44 port 25905 ssh2 Dec 29 02:44:54 host sshd[29980]: Failed password for invalid user ec2-user from 197.5.145.44 port 25897 ssh2 Dec 29 02:44:54 host sshd[29989]: Failed password for invalid user oracle from 197.5.145.44 port 25933 ssh2 Dec 29 02:44:54 host sshd[29992]: Failed password for invalid user ubuntu from 197.5.145.44 port 25918 ssh2 Dec 29 02:44:54 host sshd[29994]: Failed password for invalid user steam from 197.5.145.44 port 25900 ssh2 Dec 29 02:44:54 host sshd[29993]: Failed password for invalid user postgres from 197.5.145.44 port 25921 ssh2 Dec 29 02:44:54 host sshd[29991]: Failed password for invalid user centos from 197.5.145.44 port 25904 ssh2 Dec 29 02:44:54 host sshd[29990]: Failed password for invalid user test from 197.5.145.44 port 25908 ssh2 Dec 29 02:44:54 host sshd[29966]: Failed password for invalid user ftpuser from 197.5.145.44 port 25907 ssh2 Dec 29 02:44:54 host sshd[29964]: Failed password for invalid user steam from 197.5.145.44 port 25914 ssh2 Dec 29 02:44:54 host sshd[29963]: Failed password for invalid user user from 197.5.145.44 port 25911 ssh2 Dec 29 02:44:54 host sshd[29965]: Failed password for invalid user centos from 197.5.145.44 port 25923 ssh2 Dec 29 02:44:54 host sshd[29970]: Failed password for invalid user ubuntu from 197.5.145.44 port 25898 ssh2 Dec 29 02:44:54 host sshd[29976]: Failed password for invalid user test from 197.5.145.44 port 25929 ssh2 Dec 29 02:44:54 host sshd[29972]: Failed password for invalid user web from 197.5.145.44 port 25912 ssh2 Dec 29 02:44:54 host sshd[29971]: Failed password for invalid user centos from 197.5.145.44 port 25903 ssh2 Dec 29 02:44:54 host sshd[29974]: Failed password for invalid user centos from 197.5.145.44 port 25910 ssh2 Dec 29 02:44:54 host sshd[29978]: Failed password for invalid user hadoop from 197.5.145.44 port 25899 ssh2 Dec 29 02:44:54 host sshd[29979]: Failed password for invalid user tester from 197.5.145.44 port 25932 ssh2 Dec 29 02:44:54 host sshd[29985]: Failed password for invalid user hadoop from 197.5.145.44 port 25901 ssh2 Dec 29 02:44:54 host sshd[29981]: Failed password for invalid user test from 197.5.145.44 port 25934 ssh2 Dec 29 02:44:54 host sshd[29977]: Failed password for invalid user centos from 197.5.145.44 port 25896 ssh2 Dec 29 02:44:54 host sshd[29984]: Failed password for invalid user centos from 197.5.145.44 port 25919 ssh2 Dec 29 02:44:54 host sshd[29983]: Failed password for invalid user git from 197.5.145.44 port 25930 ssh2 Dec 29 02:44:54 host sshd[29987]: Failed password for invalid user posiflex from 197.5.145.44 port 25916 ssh2 Dec 29 02:44:54 host sshd[29986]: Connection closed by 197.5.145.44 port 25928 [preauth] Dec 29 02:44:54 host sshd[29975]: Connection closed by 197.5.145.44 port 25909 [preauth] Dec 29 02:44:54 host sshd[29982]: Connection closed by 197.5.145.44 port 25905 [preauth] Dec 29 02:44:54 host sshd[29980]: Connection closed by 197.5.145.44 port 25897 [preauth] Dec 29 02:44:54 host sshd[29989]: Connection closed by 197.5.145.44 port 25933 [preauth] Dec 29 02:44:54 host sshd[29992]: Connection closed by 197.5.145.44 port 25918 [preauth] Dec 29 02:44:54 host sshd[29994]: Connection closed by 197.5.145.44 port 25900 [preauth] Dec 29 02:44:54 host sshd[29993]: Connection closed by 197.5.145.44 port 25921 [preauth] Dec 29 02:44:54 host sshd[29990]: Connection closed by 197.5.145.44 port 25908 [preauth] Dec 29 02:44:54 host sshd[29991]: Connection closed by 197.5.145.44 port 25904 [preauth] Dec 29 02:44:55 host sshd[29966]: Connection closed by 197.5.145.44 port 25907 [preauth] Dec 29 02:44:55 host sshd[29963]: Connection closed by 197.5.145.44 port 25911 [preauth] Dec 29 02:44:55 host sshd[29964]: Connection closed by 197.5.145.44 port 25914 [preauth] Dec 29 02:44:55 host sshd[29965]: Connection closed by 197.5.145.44 port 25923 [preauth] Dec 29 02:44:55 host sshd[29970]: Connection closed by 197.5.145.44 port 25898 [preauth] Dec 29 02:44:55 host sshd[29976]: Connection closed by 197.5.145.44 port 25929 [preauth] Dec 29 02:44:55 host sshd[29972]: Connection closed by 197.5.145.44 port 25912 [preauth] Dec 29 02:44:55 host sshd[29974]: Connection closed by 197.5.145.44 port 25910 [preauth] Dec 29 02:44:55 host sshd[29971]: Connection closed by 197.5.145.44 port 25903 [preauth] Dec 29 02:44:55 host sshd[29979]: Connection closed by 197.5.145.44 port 25932 [preauth] Dec 29 02:44:55 host sshd[29978]: Connection closed by 197.5.145.44 port 25899 [preauth] Dec 29 02:44:55 host sshd[29981]: Connection closed by 197.5.145.44 port 25934 [preauth] Dec 29 02:44:55 host sshd[29985]: Connection closed by 197.5.145.44 port 25901 [preauth] Dec 29 02:44:55 host sshd[29984]: Connection closed by 197.5.145.44 port 25919 [preauth] Dec 29 02:44:55 host sshd[29983]: Connection closed by 197.5.145.44 port 25930 [preauth] Dec 29 02:44:55 host sshd[29977]: Connection closed by 197.5.145.44 port 25896 [preauth] Dec 29 02:44:55 host sshd[29987]: Connection closed by 197.5.145.44 port 25916 [preauth] Dec 29 02:47:09 host sshd[30428]: Invalid user from 64.62.197.78 port 42441 Dec 29 02:47:09 host sshd[30428]: input_userauth_request: invalid user [preauth] Dec 29 02:47:12 host sshd[30428]: Connection closed by 64.62.197.78 port 42441 [preauth] Dec 29 02:48:34 host sshd[30620]: Invalid user admin from 194.169.175.102 port 62165 Dec 29 02:48:34 host sshd[30620]: input_userauth_request: invalid user admin [preauth] Dec 29 02:48:34 host sshd[30620]: pam_unix(sshd:auth): check pass; user unknown Dec 29 02:48:34 host sshd[30620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 Dec 29 02:48:36 host sshd[30620]: Failed password for invalid user admin from 194.169.175.102 port 62165 ssh2 Dec 29 02:48:36 host sshd[30620]: Received disconnect from 194.169.175.102 port 62165:11: Client disconnecting normally [preauth] Dec 29 02:48:36 host sshd[30620]: Disconnected from 194.169.175.102 port 62165 [preauth] Dec 29 02:55:10 host sshd[31727]: Invalid user pi from 46.234.145.177 port 51136 Dec 29 02:55:10 host sshd[31727]: input_userauth_request: invalid user pi [preauth] Dec 29 02:55:10 host sshd[31728]: Invalid user pi from 46.234.145.177 port 65356 Dec 29 02:55:10 host sshd[31728]: input_userauth_request: invalid user pi [preauth] Dec 29 02:55:10 host sshd[31727]: pam_unix(sshd:auth): check pass; user unknown Dec 29 02:55:10 host sshd[31727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.234.145.177 Dec 29 02:55:10 host sshd[31728]: pam_unix(sshd:auth): check pass; user unknown Dec 29 02:55:10 host sshd[31728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.234.145.177 Dec 29 02:55:12 host sshd[31727]: Failed password for invalid user pi from 46.234.145.177 port 51136 ssh2 Dec 29 02:55:12 host sshd[31728]: Failed password for invalid user pi from 46.234.145.177 port 65356 ssh2 Dec 29 02:55:12 host sshd[31727]: Connection closed by 46.234.145.177 port 51136 [preauth] Dec 29 02:55:12 host sshd[31728]: Connection closed by 46.234.145.177 port 65356 [preauth] Dec 29 02:59:51 host sshd[32653]: Did not receive identification string from 193.42.33.81 port 34860 Dec 29 03:00:14 host sshd[32713]: User root from 193.42.33.81 not allowed because not listed in AllowUsers Dec 29 03:00:14 host sshd[32713]: input_userauth_request: invalid user root [preauth] Dec 29 03:00:14 host unix_chkpwd[32718]: password check failed for user (root) Dec 29 03:00:14 host sshd[32713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.42.33.81 user=root Dec 29 03:00:14 host sshd[32713]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 03:00:16 host sshd[32713]: Failed password for invalid user root from 193.42.33.81 port 34470 ssh2 Dec 29 03:00:16 host sshd[32713]: Received disconnect from 193.42.33.81 port 34470:11: Normal Shutdown, Thank you for playing [preauth] Dec 29 03:00:16 host sshd[32713]: Disconnected from 193.42.33.81 port 34470 [preauth] Dec 29 03:00:45 host sshd[347]: User root from 193.42.33.81 not allowed because not listed in AllowUsers Dec 29 03:00:45 host sshd[347]: input_userauth_request: invalid user root [preauth] Dec 29 03:00:45 host unix_chkpwd[350]: password check failed for user (root) Dec 29 03:00:45 host sshd[347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.42.33.81 user=root Dec 29 03:00:45 host sshd[347]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 03:00:47 host sshd[347]: Failed password for invalid user root from 193.42.33.81 port 39838 ssh2 Dec 29 03:02:43 host sshd[784]: Invalid user admin from 103.13.40.2 port 60528 Dec 29 03:02:43 host sshd[784]: input_userauth_request: invalid user admin [preauth] Dec 29 03:02:43 host sshd[784]: pam_unix(sshd:auth): check pass; user unknown Dec 29 03:02:43 host sshd[784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 29 03:02:45 host sshd[784]: Failed password for invalid user admin from 103.13.40.2 port 60528 ssh2 Dec 29 03:02:45 host sshd[784]: Connection closed by 103.13.40.2 port 60528 [preauth] Dec 29 03:03:12 host sshd[848]: Invalid user eh from 45.93.201.90 port 59860 Dec 29 03:03:12 host sshd[848]: input_userauth_request: invalid user eh [preauth] Dec 29 03:03:12 host sshd[848]: pam_unix(sshd:auth): check pass; user unknown Dec 29 03:03:12 host sshd[848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 29 03:03:14 host sshd[848]: Failed password for invalid user eh from 45.93.201.90 port 59860 ssh2 Dec 29 03:03:17 host sshd[848]: pam_unix(sshd:auth): check pass; user unknown Dec 29 03:03:20 host sshd[848]: Failed password for invalid user eh from 45.93.201.90 port 59860 ssh2 Dec 29 03:03:23 host sshd[848]: pam_unix(sshd:auth): check pass; user unknown Dec 29 03:03:25 host sshd[848]: Failed password for invalid user eh from 45.93.201.90 port 59860 ssh2 Dec 29 03:03:28 host sshd[848]: Connection closed by 45.93.201.90 port 59860 [preauth] Dec 29 03:03:28 host sshd[848]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 29 03:04:00 host sshd[948]: Connection closed by 167.99.1.98 port 53272 [preauth] Dec 29 03:09:39 host sshd[1841]: User root from 106.10.122.53 not allowed because not listed in AllowUsers Dec 29 03:09:39 host sshd[1841]: input_userauth_request: invalid user root [preauth] Dec 29 03:09:39 host unix_chkpwd[1843]: password check failed for user (root) Dec 29 03:09:39 host sshd[1841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 user=root Dec 29 03:09:39 host sshd[1841]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 03:09:41 host sshd[1841]: Failed password for invalid user root from 106.10.122.53 port 48746 ssh2 Dec 29 03:09:42 host sshd[1841]: Connection closed by 106.10.122.53 port 48746 [preauth] Dec 29 03:13:09 host sshd[2361]: Did not receive identification string from 185.173.145.146 port 42756 Dec 29 03:13:26 host sshd[2411]: User root from 185.173.145.146 not allowed because not listed in AllowUsers Dec 29 03:13:26 host sshd[2411]: input_userauth_request: invalid user root [preauth] Dec 29 03:13:26 host unix_chkpwd[2414]: password check failed for user (root) Dec 29 03:13:26 host sshd[2411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.173.145.146 user=root Dec 29 03:13:26 host sshd[2411]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 03:13:28 host sshd[2411]: Failed password for invalid user root from 185.173.145.146 port 58898 ssh2 Dec 29 03:13:29 host sshd[2411]: Received disconnect from 185.173.145.146 port 58898:11: Normal Shutdown, Thank you for playing [preauth] Dec 29 03:13:29 host sshd[2411]: Disconnected from 185.173.145.146 port 58898 [preauth] Dec 29 03:13:37 host sshd[2429]: User root from 185.173.145.146 not allowed because not listed in AllowUsers Dec 29 03:13:37 host sshd[2429]: input_userauth_request: invalid user root [preauth] Dec 29 03:13:38 host unix_chkpwd[2433]: password check failed for user (root) Dec 29 03:13:38 host sshd[2429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.173.145.146 user=root Dec 29 03:13:38 host sshd[2429]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 03:13:40 host sshd[2429]: Failed password for invalid user root from 185.173.145.146 port 35494 ssh2 Dec 29 03:13:40 host sshd[2429]: Received disconnect from 185.173.145.146 port 35494:11: Normal Shutdown, Thank you for playing [preauth] Dec 29 03:13:40 host sshd[2429]: Disconnected from 185.173.145.146 port 35494 [preauth] Dec 29 03:20:40 host sshd[3688]: Invalid user user1 from 41.197.31.178 port 35446 Dec 29 03:20:40 host sshd[3688]: input_userauth_request: invalid user user1 [preauth] Dec 29 03:20:41 host sshd[3688]: pam_unix(sshd:auth): check pass; user unknown Dec 29 03:20:41 host sshd[3688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 29 03:20:42 host sshd[3688]: Failed password for invalid user user1 from 41.197.31.178 port 35446 ssh2 Dec 29 03:20:43 host sshd[3688]: Connection closed by 41.197.31.178 port 35446 [preauth] Dec 29 03:20:53 host sshd[3713]: Invalid user test1 from 142.93.14.124 port 52488 Dec 29 03:20:53 host sshd[3713]: input_userauth_request: invalid user test1 [preauth] Dec 29 03:20:53 host sshd[3713]: pam_unix(sshd:auth): check pass; user unknown Dec 29 03:20:53 host sshd[3713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.14.124 Dec 29 03:20:55 host sshd[3713]: Failed password for invalid user test1 from 142.93.14.124 port 52488 ssh2 Dec 29 03:20:55 host sshd[3713]: Received disconnect from 142.93.14.124 port 52488:11: Bye Bye [preauth] Dec 29 03:20:55 host sshd[3713]: Disconnected from 142.93.14.124 port 52488 [preauth] Dec 29 03:21:30 host sshd[3807]: User root from 202.158.139.57 not allowed because not listed in AllowUsers Dec 29 03:21:30 host sshd[3807]: input_userauth_request: invalid user root [preauth] Dec 29 03:21:30 host unix_chkpwd[3810]: password check failed for user (root) Dec 29 03:21:30 host sshd[3807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57 user=root Dec 29 03:21:30 host sshd[3807]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 03:21:32 host sshd[3807]: Failed password for invalid user root from 202.158.139.57 port 45114 ssh2 Dec 29 03:21:32 host sshd[3807]: Received disconnect from 202.158.139.57 port 45114:11: Bye Bye [preauth] Dec 29 03:21:32 host sshd[3807]: Disconnected from 202.158.139.57 port 45114 [preauth] Dec 29 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 29 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 29 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 29 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 29 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 29 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 29 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 29 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 29 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 03:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 03:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 03:22:06 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 03:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 29 03:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 03:22:06 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 03:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwtestugo user-2=shalinijames user-3=vfmassets user-4=pmcresources user-5=disposeat user-6=wwwkmaorg user-7=remysagr user-8=wwwkapin user-9=woodpeck user-10=phmetals user-11=kottayamcalldriv user-12=gifterman user-13=palco123 user-14=wwwnexidigital user-15=mrsclean user-16=wwwevmhonda user-17=bonifacegroup user-18=straightcurve user-19=wwwletsstalkfood user-20=dartsimp user-21=a2zgroup user-22=laundryboniface user-23=cochintaxi user-24=wwwkaretakers user-25=travelboniface user-26=ugotscom user-27=wwwrmswll user-28=wwwresourcehunte user-29=keralaholi user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 29 03:22:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 29 03:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 03:22:06 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 03:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 03:22:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 03:22:07 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 03:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-HynMUln44aEAdf6F.~ Dec 29 03:22:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 03:22:07 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 03:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-HynMUln44aEAdf6F.~' Dec 29 03:22:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 03:22:07 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 03:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-HynMUln44aEAdf6F.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 03:22:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 03:22:07 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 03:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 29 03:22:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 03:22:07 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 03:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 29 03:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 03:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 03:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 03:22:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 03:22:08 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 03:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 03:22:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 03:22:08 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 03:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 03:22:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 03:22:08 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 03:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 29 03:22:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 03:22:08 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 03:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 03:22:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 03:22:09 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 03:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 29 03:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 29 03:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 29 03:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 29 03:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 03:22:19 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 03:22:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 29 03:22:20 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 03:22:21 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 03:22:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 29 03:22:22 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 03:22:25 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 03:22:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 29 03:22:26 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 03:22:26 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 03:22:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 29 03:22:26 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 03:22:28 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 03:22:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 29 03:22:29 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 03:22:30 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 03:22:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 29 03:22:30 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 03:22:31 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 03:22:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 29 03:22:32 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 03:22:33 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 03:22:44 host sshd[4158]: Invalid user bamboo from 111.161.41.156 port 58048 Dec 29 03:22:44 host sshd[4158]: input_userauth_request: invalid user bamboo [preauth] Dec 29 03:22:44 host sshd[4158]: pam_unix(sshd:auth): check pass; user unknown Dec 29 03:22:44 host sshd[4158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.161.41.156 Dec 29 03:22:46 host sshd[4158]: Failed password for invalid user bamboo from 111.161.41.156 port 58048 ssh2 Dec 29 03:22:46 host sshd[4158]: Received disconnect from 111.161.41.156 port 58048:11: Bye Bye [preauth] Dec 29 03:22:46 host sshd[4158]: Disconnected from 111.161.41.156 port 58048 [preauth] Dec 29 03:23:31 host sshd[4272]: Invalid user ubuntu from 142.93.14.124 port 52608 Dec 29 03:23:31 host sshd[4272]: input_userauth_request: invalid user ubuntu [preauth] Dec 29 03:23:31 host sshd[4272]: pam_unix(sshd:auth): check pass; user unknown Dec 29 03:23:31 host sshd[4272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.14.124 Dec 29 03:23:33 host sshd[4272]: Failed password for invalid user ubuntu from 142.93.14.124 port 52608 ssh2 Dec 29 03:23:33 host sshd[4272]: Received disconnect from 142.93.14.124 port 52608:11: Bye Bye [preauth] Dec 29 03:23:33 host sshd[4272]: Disconnected from 142.93.14.124 port 52608 [preauth] Dec 29 03:24:46 host sshd[4447]: Invalid user admin from 142.93.14.124 port 50182 Dec 29 03:24:46 host sshd[4447]: input_userauth_request: invalid user admin [preauth] Dec 29 03:24:46 host sshd[4447]: pam_unix(sshd:auth): check pass; user unknown Dec 29 03:24:46 host sshd[4447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.14.124 Dec 29 03:24:48 host sshd[4447]: Failed password for invalid user admin from 142.93.14.124 port 50182 ssh2 Dec 29 03:24:48 host sshd[4447]: Received disconnect from 142.93.14.124 port 50182:11: Bye Bye [preauth] Dec 29 03:24:48 host sshd[4447]: Disconnected from 142.93.14.124 port 50182 [preauth] Dec 29 03:25:06 host sshd[4627]: User root from 202.158.139.57 not allowed because not listed in AllowUsers Dec 29 03:25:06 host sshd[4627]: input_userauth_request: invalid user root [preauth] Dec 29 03:25:06 host unix_chkpwd[4630]: password check failed for user (root) Dec 29 03:25:06 host sshd[4627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.139.57 user=root Dec 29 03:25:06 host sshd[4627]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 03:25:08 host sshd[4627]: Failed password for invalid user root from 202.158.139.57 port 54590 ssh2 Dec 29 03:25:09 host sshd[4627]: Received disconnect from 202.158.139.57 port 54590:11: Bye Bye [preauth] Dec 29 03:25:09 host sshd[4627]: Disconnected from 202.158.139.57 port 54590 [preauth] Dec 29 03:25:54 host sshd[4763]: User root from 111.161.41.156 not allowed because not listed in AllowUsers Dec 29 03:25:54 host sshd[4763]: input_userauth_request: invalid user root [preauth] Dec 29 03:25:54 host unix_chkpwd[4765]: password check failed for user (root) Dec 29 03:25:54 host sshd[4763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.161.41.156 user=root Dec 29 03:25:54 host sshd[4763]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 03:25:56 host sshd[4763]: Failed password for invalid user root from 111.161.41.156 port 46640 ssh2 Dec 29 03:25:57 host sshd[4763]: Received disconnect from 111.161.41.156 port 46640:11: Bye Bye [preauth] Dec 29 03:25:57 host sshd[4763]: Disconnected from 111.161.41.156 port 46640 [preauth] Dec 29 03:32:21 host sshd[5815]: Invalid user unix from 218.60.104.104 port 40768 Dec 29 03:32:21 host sshd[5815]: input_userauth_request: invalid user unix [preauth] Dec 29 03:32:21 host sshd[5815]: pam_unix(sshd:auth): check pass; user unknown Dec 29 03:32:21 host sshd[5815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.60.104.104 Dec 29 03:32:22 host sshd[5817]: Invalid user kbe from 142.44.211.143 port 53340 Dec 29 03:32:22 host sshd[5817]: input_userauth_request: invalid user kbe [preauth] Dec 29 03:32:22 host sshd[5817]: pam_unix(sshd:auth): check pass; user unknown Dec 29 03:32:22 host sshd[5817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.211.143 Dec 29 03:32:24 host sshd[5815]: Failed password for invalid user unix from 218.60.104.104 port 40768 ssh2 Dec 29 03:32:24 host sshd[5815]: Received disconnect from 218.60.104.104 port 40768:11: Bye Bye [preauth] Dec 29 03:32:24 host sshd[5815]: Disconnected from 218.60.104.104 port 40768 [preauth] Dec 29 03:32:25 host sshd[5817]: Failed password for invalid user kbe from 142.44.211.143 port 53340 ssh2 Dec 29 03:32:25 host sshd[5817]: Received disconnect from 142.44.211.143 port 53340:11: Bye Bye [preauth] Dec 29 03:32:25 host sshd[5817]: Disconnected from 142.44.211.143 port 53340 [preauth] Dec 29 03:35:40 host sshd[6457]: User root from 165.227.231.151 not allowed because not listed in AllowUsers Dec 29 03:35:40 host sshd[6457]: input_userauth_request: invalid user root [preauth] Dec 29 03:35:40 host unix_chkpwd[6462]: password check failed for user (root) Dec 29 03:35:40 host sshd[6457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.231.151 user=root Dec 29 03:35:40 host sshd[6457]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 03:35:42 host sshd[6457]: Failed password for invalid user root from 165.227.231.151 port 54878 ssh2 Dec 29 03:35:42 host sshd[6457]: Received disconnect from 165.227.231.151 port 54878:11: Bye Bye [preauth] Dec 29 03:35:42 host sshd[6457]: Disconnected from 165.227.231.151 port 54878 [preauth] Dec 29 03:36:00 host sshd[6533]: User root from 165.227.68.95 not allowed because not listed in AllowUsers Dec 29 03:36:00 host sshd[6533]: input_userauth_request: invalid user root [preauth] Dec 29 03:36:00 host unix_chkpwd[6538]: password check failed for user (root) Dec 29 03:36:00 host sshd[6533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.68.95 user=root Dec 29 03:36:00 host sshd[6533]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 03:36:02 host sshd[6533]: Failed password for invalid user root from 165.227.68.95 port 46510 ssh2 Dec 29 03:36:02 host sshd[6533]: Received disconnect from 165.227.68.95 port 46510:11: Bye Bye [preauth] Dec 29 03:36:02 host sshd[6533]: Disconnected from 165.227.68.95 port 46510 [preauth] Dec 29 03:36:32 host sshd[6629]: User root from 125.235.240.165 not allowed because not listed in AllowUsers Dec 29 03:36:32 host sshd[6629]: input_userauth_request: invalid user root [preauth] Dec 29 03:36:32 host unix_chkpwd[6631]: password check failed for user (root) Dec 29 03:36:32 host sshd[6629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.235.240.165 user=root Dec 29 03:36:32 host sshd[6629]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 03:36:34 host sshd[6629]: Failed password for invalid user root from 125.235.240.165 port 43456 ssh2 Dec 29 03:36:34 host sshd[6629]: Received disconnect from 125.235.240.165 port 43456:11: Bye Bye [preauth] Dec 29 03:36:34 host sshd[6629]: Disconnected from 125.235.240.165 port 43456 [preauth] Dec 29 03:37:02 host sshd[6681]: User root from 51.38.113.192 not allowed because not listed in AllowUsers Dec 29 03:37:02 host sshd[6681]: input_userauth_request: invalid user root [preauth] Dec 29 03:37:02 host unix_chkpwd[6693]: password check failed for user (root) Dec 29 03:37:02 host sshd[6681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.113.192 user=root Dec 29 03:37:02 host sshd[6681]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 03:37:04 host sshd[6681]: Failed password for invalid user root from 51.38.113.192 port 48790 ssh2 Dec 29 03:37:04 host sshd[6681]: Received disconnect from 51.38.113.192 port 48790:11: Bye Bye [preauth] Dec 29 03:37:04 host sshd[6681]: Disconnected from 51.38.113.192 port 48790 [preauth] Dec 29 03:37:52 host sshd[6790]: User root from 150.230.235.117 not allowed because not listed in AllowUsers Dec 29 03:37:52 host sshd[6790]: input_userauth_request: invalid user root [preauth] Dec 29 03:37:52 host unix_chkpwd[6795]: password check failed for user (root) Dec 29 03:37:52 host sshd[6790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.230.235.117 user=root Dec 29 03:37:52 host sshd[6790]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 03:37:55 host sshd[6790]: Failed password for invalid user root from 150.230.235.117 port 45266 ssh2 Dec 29 03:37:55 host sshd[6790]: Received disconnect from 150.230.235.117 port 45266:11: Bye Bye [preauth] Dec 29 03:37:55 host sshd[6790]: Disconnected from 150.230.235.117 port 45266 [preauth] Dec 29 03:38:21 host sshd[6846]: User root from 165.227.231.151 not allowed because not listed in AllowUsers Dec 29 03:38:21 host sshd[6846]: input_userauth_request: invalid user root [preauth] Dec 29 03:38:21 host unix_chkpwd[6850]: password check failed for user (root) Dec 29 03:38:21 host sshd[6846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.231.151 user=root Dec 29 03:38:21 host sshd[6846]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 03:38:23 host sshd[6846]: Failed password for invalid user root from 165.227.231.151 port 40672 ssh2 Dec 29 03:38:32 host sshd[6922]: User root from 84.201.135.111 not allowed because not listed in AllowUsers Dec 29 03:38:32 host sshd[6922]: input_userauth_request: invalid user root [preauth] Dec 29 03:38:32 host unix_chkpwd[6932]: password check failed for user (root) Dec 29 03:38:32 host sshd[6922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.135.111 user=root Dec 29 03:38:32 host sshd[6922]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 03:38:34 host sshd[6922]: Failed password for invalid user root from 84.201.135.111 port 45216 ssh2 Dec 29 03:38:34 host sshd[6922]: Received disconnect from 84.201.135.111 port 45216:11: Bye Bye [preauth] Dec 29 03:38:34 host sshd[6922]: Disconnected from 84.201.135.111 port 45216 [preauth] Dec 29 03:38:40 host sshd[6941]: Invalid user cumulus from 165.227.68.95 port 57572 Dec 29 03:38:40 host sshd[6941]: input_userauth_request: invalid user cumulus [preauth] Dec 29 03:38:40 host sshd[6941]: pam_unix(sshd:auth): check pass; user unknown Dec 29 03:38:40 host sshd[6941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.68.95 Dec 29 03:38:42 host sshd[6941]: Failed password for invalid user cumulus from 165.227.68.95 port 57572 ssh2 Dec 29 03:38:42 host sshd[6941]: Received disconnect from 165.227.68.95 port 57572:11: Bye Bye [preauth] Dec 29 03:38:42 host sshd[6941]: Disconnected from 165.227.68.95 port 57572 [preauth] Dec 29 03:38:51 host sshd[6998]: Invalid user vendas from 167.99.198.18 port 55084 Dec 29 03:38:51 host sshd[6998]: input_userauth_request: invalid user vendas [preauth] Dec 29 03:38:51 host sshd[6998]: pam_unix(sshd:auth): check pass; user unknown Dec 29 03:38:51 host sshd[6998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.198.18 Dec 29 03:38:53 host sshd[6998]: Failed password for invalid user vendas from 167.99.198.18 port 55084 ssh2 Dec 29 03:38:53 host sshd[6998]: Received disconnect from 167.99.198.18 port 55084:11: Bye Bye [preauth] Dec 29 03:38:53 host sshd[6998]: Disconnected from 167.99.198.18 port 55084 [preauth] Dec 29 03:39:05 host sshd[7048]: Invalid user stack from 142.44.211.143 port 49546 Dec 29 03:39:05 host sshd[7048]: input_userauth_request: invalid user stack [preauth] Dec 29 03:39:05 host sshd[7048]: pam_unix(sshd:auth): check pass; user unknown Dec 29 03:39:05 host sshd[7048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.211.143 Dec 29 03:39:07 host sshd[7048]: Failed password for invalid user stack from 142.44.211.143 port 49546 ssh2 Dec 29 03:39:07 host sshd[7048]: Received disconnect from 142.44.211.143 port 49546:11: Bye Bye [preauth] Dec 29 03:39:07 host sshd[7048]: Disconnected from 142.44.211.143 port 49546 [preauth] Dec 29 03:39:15 host sshd[7060]: Invalid user git from 51.38.113.192 port 52010 Dec 29 03:39:15 host sshd[7060]: input_userauth_request: invalid user git [preauth] Dec 29 03:39:15 host sshd[7060]: pam_unix(sshd:auth): check pass; user unknown Dec 29 03:39:15 host sshd[7060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.113.192 Dec 29 03:39:17 host sshd[7060]: Failed password for invalid user git from 51.38.113.192 port 52010 ssh2 Dec 29 03:39:17 host sshd[7060]: Received disconnect from 51.38.113.192 port 52010:11: Bye Bye [preauth] Dec 29 03:39:17 host sshd[7060]: Disconnected from 51.38.113.192 port 52010 [preauth] Dec 29 03:39:31 host sshd[7145]: Invalid user postgres from 125.235.240.165 port 34286 Dec 29 03:39:31 host sshd[7145]: input_userauth_request: invalid user postgres [preauth] Dec 29 03:39:31 host sshd[7145]: pam_unix(sshd:auth): check pass; user unknown Dec 29 03:39:31 host sshd[7145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.235.240.165 Dec 29 03:39:32 host sshd[7145]: Failed password for invalid user postgres from 125.235.240.165 port 34286 ssh2 Dec 29 03:39:32 host sshd[7145]: Received disconnect from 125.235.240.165 port 34286:11: Bye Bye [preauth] Dec 29 03:39:32 host sshd[7145]: Disconnected from 125.235.240.165 port 34286 [preauth] Dec 29 03:40:03 host sshd[7263]: Invalid user www from 167.99.198.18 port 38654 Dec 29 03:40:03 host sshd[7263]: input_userauth_request: invalid user www [preauth] Dec 29 03:40:03 host sshd[7263]: pam_unix(sshd:auth): check pass; user unknown Dec 29 03:40:03 host sshd[7263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.198.18 Dec 29 03:40:05 host sshd[7263]: Failed password for invalid user www from 167.99.198.18 port 38654 ssh2 Dec 29 03:40:06 host sshd[7263]: Received disconnect from 167.99.198.18 port 38654:11: Bye Bye [preauth] Dec 29 03:40:06 host sshd[7263]: Disconnected from 167.99.198.18 port 38654 [preauth] Dec 29 03:40:10 host sshd[7278]: Invalid user spegni from 84.201.135.111 port 42716 Dec 29 03:40:10 host sshd[7278]: input_userauth_request: invalid user spegni [preauth] Dec 29 03:40:10 host sshd[7278]: pam_unix(sshd:auth): check pass; user unknown Dec 29 03:40:10 host sshd[7278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.135.111 Dec 29 03:40:12 host sshd[7278]: Failed password for invalid user spegni from 84.201.135.111 port 42716 ssh2 Dec 29 03:40:12 host sshd[7278]: Received disconnect from 84.201.135.111 port 42716:11: Bye Bye [preauth] Dec 29 03:40:12 host sshd[7278]: Disconnected from 84.201.135.111 port 42716 [preauth] Dec 29 03:40:13 host sshd[7285]: User root from 142.44.211.143 not allowed because not listed in AllowUsers Dec 29 03:40:13 host sshd[7285]: input_userauth_request: invalid user root [preauth] Dec 29 03:40:13 host unix_chkpwd[7319]: password check failed for user (root) Dec 29 03:40:13 host sshd[7285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.211.143 user=root Dec 29 03:40:13 host sshd[7285]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 03:40:15 host sshd[7285]: Failed password for invalid user root from 142.44.211.143 port 33158 ssh2 Dec 29 03:40:15 host sshd[7285]: Received disconnect from 142.44.211.143 port 33158:11: Bye Bye [preauth] Dec 29 03:40:15 host sshd[7285]: Disconnected from 142.44.211.143 port 33158 [preauth] Dec 29 03:40:59 host sshd[7557]: User root from 167.99.198.18 not allowed because not listed in AllowUsers Dec 29 03:40:59 host sshd[7557]: input_userauth_request: invalid user root [preauth] Dec 29 03:40:59 host unix_chkpwd[7560]: password check failed for user (root) Dec 29 03:40:59 host sshd[7557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.198.18 user=root Dec 29 03:40:59 host sshd[7557]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 03:41:01 host sshd[7557]: Failed password for invalid user root from 167.99.198.18 port 43394 ssh2 Dec 29 03:41:01 host sshd[7557]: Received disconnect from 167.99.198.18 port 43394:11: Bye Bye [preauth] Dec 29 03:41:01 host sshd[7557]: Disconnected from 167.99.198.18 port 43394 [preauth] Dec 29 03:42:57 host sshd[7860]: Invalid user krishna from 150.230.235.117 port 43536 Dec 29 03:42:57 host sshd[7860]: input_userauth_request: invalid user krishna [preauth] Dec 29 03:42:57 host sshd[7860]: pam_unix(sshd:auth): check pass; user unknown Dec 29 03:42:57 host sshd[7860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.230.235.117 Dec 29 03:42:59 host sshd[7860]: Failed password for invalid user krishna from 150.230.235.117 port 43536 ssh2 Dec 29 03:42:59 host sshd[7860]: Received disconnect from 150.230.235.117 port 43536:11: Bye Bye [preauth] Dec 29 03:42:59 host sshd[7860]: Disconnected from 150.230.235.117 port 43536 [preauth] Dec 29 03:48:15 host sshd[8712]: Invalid user user from 162.218.126.136 port 56274 Dec 29 03:48:15 host sshd[8712]: input_userauth_request: invalid user user [preauth] Dec 29 03:48:15 host sshd[8712]: pam_unix(sshd:auth): check pass; user unknown Dec 29 03:48:15 host sshd[8712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 29 03:48:17 host sshd[8712]: Failed password for invalid user user from 162.218.126.136 port 56274 ssh2 Dec 29 03:48:17 host sshd[8712]: Connection closed by 162.218.126.136 port 56274 [preauth] Dec 29 03:50:30 host sshd[9048]: User root from 218.60.104.104 not allowed because not listed in AllowUsers Dec 29 03:50:30 host sshd[9048]: input_userauth_request: invalid user root [preauth] Dec 29 03:50:30 host unix_chkpwd[9053]: password check failed for user (root) Dec 29 03:50:30 host sshd[9048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.60.104.104 user=root Dec 29 03:50:30 host sshd[9048]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 03:50:32 host sshd[9048]: Failed password for invalid user root from 218.60.104.104 port 47950 ssh2 Dec 29 03:50:32 host sshd[9048]: Received disconnect from 218.60.104.104 port 47950:11: Bye Bye [preauth] Dec 29 03:50:32 host sshd[9048]: Disconnected from 218.60.104.104 port 47950 [preauth] Dec 29 04:14:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 04:14:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 04:14:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 04:14:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 04:14:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 04:14:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 04:14:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 04:14:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 04:14:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 04:14:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 29 04:14:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 04:14:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 04:14:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 29 04:14:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 04:14:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 04:14:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 29 04:14:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 04:14:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 04:14:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 29 04:14:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 04:14:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 04:20:52 host sshd[13736]: User root from 92.46.108.20 not allowed because not listed in AllowUsers Dec 29 04:20:52 host sshd[13736]: input_userauth_request: invalid user root [preauth] Dec 29 04:20:53 host unix_chkpwd[13742]: password check failed for user (root) Dec 29 04:20:53 host sshd[13736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 user=root Dec 29 04:20:53 host sshd[13736]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 04:20:55 host sshd[13736]: Failed password for invalid user root from 92.46.108.20 port 46476 ssh2 Dec 29 04:20:55 host sshd[13736]: Connection closed by 92.46.108.20 port 46476 [preauth] Dec 29 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 29 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 29 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 29 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 29 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 29 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 29 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 29 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 29 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 04:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 29 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 04:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=keralaholi user-2=wwwresourcehunte user-3=wwwrmswll user-4=ugotscom user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=a2zgroup user-9=dartsimp user-10=cochintaxi user-11=wwwkaretakers user-12=mrsclean user-13=wwwnexidigital user-14=palco123 user-15=gifterman user-16=phmetals user-17=kottayamcalldriv user-18=straightcurve user-19=wwwletsstalkfood user-20=bonifacegroup user-21=wwwevmhonda user-22=pmcresources user-23=vfmassets user-24=shalinijames user-25=wwwtestugo user-26=woodpeck user-27=wwwkapin user-28=wwwkmaorg user-29=disposeat user-30=remysagr feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 29 04:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 29 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 04:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 04:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-csWW65kHEO1d0zji.~ Dec 29 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 04:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-csWW65kHEO1d0zji.~' Dec 29 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 04:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-csWW65kHEO1d0zji.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 29 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 29 04:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 04:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 04:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 04:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 04:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 04:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 04:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 04:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 04:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 04:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 04:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 04:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 29 04:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 04:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 04:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 04:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 29 04:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 29 04:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 29 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 29 04:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 04:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 29 04:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 04:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 04:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 29 04:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 04:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 04:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 29 04:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 04:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 29 04:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 04:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 29 04:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 04:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 04:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 29 04:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 04:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 04:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 29 04:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 04:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 04:29:59 host sshd[15211]: User root from 103.13.40.2 not allowed because not listed in AllowUsers Dec 29 04:29:59 host sshd[15211]: input_userauth_request: invalid user root [preauth] Dec 29 04:29:59 host unix_chkpwd[15213]: password check failed for user (root) Dec 29 04:29:59 host sshd[15211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 user=root Dec 29 04:29:59 host sshd[15211]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 04:30:01 host sshd[15211]: Failed password for invalid user root from 103.13.40.2 port 56340 ssh2 Dec 29 04:30:01 host sshd[15211]: Connection closed by 103.13.40.2 port 56340 [preauth] Dec 29 04:36:49 host sshd[16657]: Invalid user webwasb from 106.10.122.53 port 44188 Dec 29 04:36:49 host sshd[16657]: input_userauth_request: invalid user webwasb [preauth] Dec 29 04:36:49 host sshd[16657]: pam_unix(sshd:auth): check pass; user unknown Dec 29 04:36:49 host sshd[16657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 29 04:36:51 host sshd[16657]: Failed password for invalid user webwasb from 106.10.122.53 port 44188 ssh2 Dec 29 04:36:51 host sshd[16657]: Connection closed by 106.10.122.53 port 44188 [preauth] Dec 29 04:40:38 host sshd[17200]: Invalid user pyimagesearch from 96.38.134.34 port 45985 Dec 29 04:40:38 host sshd[17200]: input_userauth_request: invalid user pyimagesearch [preauth] Dec 29 04:40:38 host sshd[17200]: pam_unix(sshd:auth): check pass; user unknown Dec 29 04:40:38 host sshd[17200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.38.134.34 Dec 29 04:40:40 host sshd[17200]: Failed password for invalid user pyimagesearch from 96.38.134.34 port 45985 ssh2 Dec 29 04:40:40 host sshd[17200]: Received disconnect from 96.38.134.34 port 45985:11: Bye Bye [preauth] Dec 29 04:40:40 host sshd[17200]: Disconnected from 96.38.134.34 port 45985 [preauth] Dec 29 04:40:42 host sshd[17208]: User root from 96.38.134.34 not allowed because not listed in AllowUsers Dec 29 04:40:42 host sshd[17208]: input_userauth_request: invalid user root [preauth] Dec 29 04:40:43 host unix_chkpwd[17212]: password check failed for user (root) Dec 29 04:40:43 host sshd[17208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.38.134.34 user=root Dec 29 04:40:43 host sshd[17208]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 04:40:45 host sshd[17208]: Failed password for invalid user root from 96.38.134.34 port 46134 ssh2 Dec 29 04:40:45 host sshd[17208]: Received disconnect from 96.38.134.34 port 46134:11: Bye Bye [preauth] Dec 29 04:40:45 host sshd[17208]: Disconnected from 96.38.134.34 port 46134 [preauth] Dec 29 04:40:47 host sshd[17217]: Invalid user admin from 96.38.134.34 port 46184 Dec 29 04:40:47 host sshd[17217]: input_userauth_request: invalid user admin [preauth] Dec 29 04:40:47 host sshd[17217]: pam_unix(sshd:auth): check pass; user unknown Dec 29 04:40:47 host sshd[17217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.38.134.34 Dec 29 04:40:50 host sshd[17217]: Failed password for invalid user admin from 96.38.134.34 port 46184 ssh2 Dec 29 04:41:39 host sshd[17384]: Did not receive identification string from 83.222.8.25 port 49774 Dec 29 04:45:16 host sshd[18145]: Invalid user admin1 from 157.245.252.34 port 37942 Dec 29 04:45:16 host sshd[18145]: input_userauth_request: invalid user admin1 [preauth] Dec 29 04:45:16 host sshd[18145]: pam_unix(sshd:auth): check pass; user unknown Dec 29 04:45:16 host sshd[18145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.252.34 Dec 29 04:45:18 host sshd[18145]: Failed password for invalid user admin1 from 157.245.252.34 port 37942 ssh2 Dec 29 04:45:18 host sshd[18145]: Received disconnect from 157.245.252.34 port 37942:11: Bye Bye [preauth] Dec 29 04:45:18 host sshd[18145]: Disconnected from 157.245.252.34 port 37942 [preauth] Dec 29 04:45:32 host sshd[18202]: User root from 104.248.163.6 not allowed because not listed in AllowUsers Dec 29 04:45:32 host sshd[18202]: input_userauth_request: invalid user root [preauth] Dec 29 04:45:32 host unix_chkpwd[18206]: password check failed for user (root) Dec 29 04:45:32 host sshd[18202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.163.6 user=root Dec 29 04:45:32 host sshd[18202]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 04:45:34 host sshd[18202]: Failed password for invalid user root from 104.248.163.6 port 51914 ssh2 Dec 29 04:45:34 host sshd[18202]: Received disconnect from 104.248.163.6 port 51914:11: Bye Bye [preauth] Dec 29 04:45:34 host sshd[18202]: Disconnected from 104.248.163.6 port 51914 [preauth] Dec 29 04:46:56 host sshd[18378]: Invalid user caspar from 167.99.12.43 port 51312 Dec 29 04:46:56 host sshd[18378]: input_userauth_request: invalid user caspar [preauth] Dec 29 04:46:56 host sshd[18378]: pam_unix(sshd:auth): check pass; user unknown Dec 29 04:46:56 host sshd[18378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.12.43 Dec 29 04:46:57 host sshd[18378]: Failed password for invalid user caspar from 167.99.12.43 port 51312 ssh2 Dec 29 04:46:58 host sshd[18378]: Received disconnect from 167.99.12.43 port 51312:11: Bye Bye [preauth] Dec 29 04:46:58 host sshd[18378]: Disconnected from 167.99.12.43 port 51312 [preauth] Dec 29 04:47:20 host sshd[18541]: Invalid user ei from 45.93.201.90 port 52872 Dec 29 04:47:20 host sshd[18541]: input_userauth_request: invalid user ei [preauth] Dec 29 04:47:20 host sshd[18541]: pam_unix(sshd:auth): check pass; user unknown Dec 29 04:47:20 host sshd[18541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 29 04:47:22 host sshd[18541]: Failed password for invalid user ei from 45.93.201.90 port 52872 ssh2 Dec 29 04:47:24 host sshd[18549]: User root from 172.105.212.69 not allowed because not listed in AllowUsers Dec 29 04:47:24 host sshd[18549]: input_userauth_request: invalid user root [preauth] Dec 29 04:47:24 host unix_chkpwd[18572]: password check failed for user (root) Dec 29 04:47:24 host sshd[18549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.105.212.69 user=root Dec 29 04:47:24 host sshd[18549]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 04:47:25 host sshd[18541]: pam_unix(sshd:auth): check pass; user unknown Dec 29 04:47:27 host sshd[18549]: Failed password for invalid user root from 172.105.212.69 port 54904 ssh2 Dec 29 04:47:27 host sshd[18549]: Received disconnect from 172.105.212.69 port 54904:11: Bye Bye [preauth] Dec 29 04:47:27 host sshd[18549]: Disconnected from 172.105.212.69 port 54904 [preauth] Dec 29 04:47:28 host sshd[18541]: Failed password for invalid user ei from 45.93.201.90 port 52872 ssh2 Dec 29 04:47:31 host sshd[18541]: pam_unix(sshd:auth): check pass; user unknown Dec 29 04:47:33 host sshd[18541]: Failed password for invalid user ei from 45.93.201.90 port 52872 ssh2 Dec 29 04:47:34 host sshd[18598]: User mysql from 167.172.90.174 not allowed because not listed in AllowUsers Dec 29 04:47:34 host sshd[18598]: input_userauth_request: invalid user mysql [preauth] Dec 29 04:47:34 host unix_chkpwd[18601]: password check failed for user (mysql) Dec 29 04:47:34 host sshd[18598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.90.174 user=mysql Dec 29 04:47:34 host sshd[18598]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql" Dec 29 04:47:35 host sshd[18598]: Failed password for invalid user mysql from 167.172.90.174 port 38570 ssh2 Dec 29 04:47:35 host sshd[18598]: Received disconnect from 167.172.90.174 port 38570:11: Bye Bye [preauth] Dec 29 04:47:35 host sshd[18598]: Disconnected from 167.172.90.174 port 38570 [preauth] Dec 29 04:47:37 host sshd[18541]: Connection closed by 45.93.201.90 port 52872 [preauth] Dec 29 04:47:37 host sshd[18541]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 29 04:47:37 host sshd[18607]: User root from 191.96.78.244 not allowed because not listed in AllowUsers Dec 29 04:47:37 host sshd[18607]: input_userauth_request: invalid user root [preauth] Dec 29 04:47:37 host unix_chkpwd[18610]: password check failed for user (root) Dec 29 04:47:37 host sshd[18607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.96.78.244 user=root Dec 29 04:47:37 host sshd[18607]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 04:47:39 host sshd[18607]: Failed password for invalid user root from 191.96.78.244 port 33604 ssh2 Dec 29 04:47:40 host sshd[18607]: Received disconnect from 191.96.78.244 port 33604:11: Bye Bye [preauth] Dec 29 04:47:40 host sshd[18607]: Disconnected from 191.96.78.244 port 33604 [preauth] Dec 29 04:48:45 host sshd[18754]: User root from 172.245.57.186 not allowed because not listed in AllowUsers Dec 29 04:48:45 host sshd[18754]: input_userauth_request: invalid user root [preauth] Dec 29 04:48:46 host unix_chkpwd[18760]: password check failed for user (root) Dec 29 04:48:46 host sshd[18754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.245.57.186 user=root Dec 29 04:48:46 host sshd[18754]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 04:48:47 host sshd[18754]: Failed password for invalid user root from 172.245.57.186 port 47590 ssh2 Dec 29 04:48:48 host sshd[18754]: Received disconnect from 172.245.57.186 port 47590:11: Bye Bye [preauth] Dec 29 04:48:48 host sshd[18754]: Disconnected from 172.245.57.186 port 47590 [preauth] Dec 29 04:49:28 host sshd[18861]: Invalid user admin from 5.185.254.97 port 54188 Dec 29 04:49:28 host sshd[18861]: input_userauth_request: invalid user admin [preauth] Dec 29 04:49:28 host sshd[18861]: pam_unix(sshd:auth): check pass; user unknown Dec 29 04:49:28 host sshd[18861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.185.254.97 Dec 29 04:49:31 host sshd[18861]: Failed password for invalid user admin from 5.185.254.97 port 54188 ssh2 Dec 29 04:49:31 host sshd[18861]: Received disconnect from 5.185.254.97 port 54188:11: Bye Bye [preauth] Dec 29 04:49:31 host sshd[18861]: Disconnected from 5.185.254.97 port 54188 [preauth] Dec 29 04:49:42 host sshd[18900]: Invalid user kafka from 157.245.252.34 port 58160 Dec 29 04:49:42 host sshd[18900]: input_userauth_request: invalid user kafka [preauth] Dec 29 04:49:42 host sshd[18900]: pam_unix(sshd:auth): check pass; user unknown Dec 29 04:49:42 host sshd[18900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.252.34 Dec 29 04:49:44 host sshd[18900]: Failed password for invalid user kafka from 157.245.252.34 port 58160 ssh2 Dec 29 04:49:44 host sshd[18900]: Received disconnect from 157.245.252.34 port 58160:11: Bye Bye [preauth] Dec 29 04:49:44 host sshd[18900]: Disconnected from 157.245.252.34 port 58160 [preauth] Dec 29 04:50:27 host sshd[19047]: Invalid user admin from 143.198.144.234 port 43252 Dec 29 04:50:27 host sshd[19047]: input_userauth_request: invalid user admin [preauth] Dec 29 04:50:27 host sshd[19047]: pam_unix(sshd:auth): check pass; user unknown Dec 29 04:50:27 host sshd[19047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.144.234 Dec 29 04:50:29 host sshd[19047]: Failed password for invalid user admin from 143.198.144.234 port 43252 ssh2 Dec 29 04:50:29 host sshd[19047]: Received disconnect from 143.198.144.234 port 43252:11: Bye Bye [preauth] Dec 29 04:50:29 host sshd[19047]: Disconnected from 143.198.144.234 port 43252 [preauth] Dec 29 04:50:31 host sshd[19053]: Invalid user invite from 167.99.12.43 port 54462 Dec 29 04:50:31 host sshd[19053]: input_userauth_request: invalid user invite [preauth] Dec 29 04:50:31 host sshd[19053]: pam_unix(sshd:auth): check pass; user unknown Dec 29 04:50:31 host sshd[19053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.12.43 Dec 29 04:50:33 host sshd[19053]: Failed password for invalid user invite from 167.99.12.43 port 54462 ssh2 Dec 29 04:50:33 host sshd[19053]: Received disconnect from 167.99.12.43 port 54462:11: Bye Bye [preauth] Dec 29 04:50:33 host sshd[19053]: Disconnected from 167.99.12.43 port 54462 [preauth] Dec 29 04:50:38 host sshd[19070]: User root from 104.248.163.6 not allowed because not listed in AllowUsers Dec 29 04:50:38 host sshd[19070]: input_userauth_request: invalid user root [preauth] Dec 29 04:50:38 host unix_chkpwd[19075]: password check failed for user (root) Dec 29 04:50:38 host sshd[19070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.163.6 user=root Dec 29 04:50:38 host sshd[19070]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 04:50:38 host sshd[19072]: User root from 157.245.252.34 not allowed because not listed in AllowUsers Dec 29 04:50:38 host sshd[19072]: input_userauth_request: invalid user root [preauth] Dec 29 04:50:38 host unix_chkpwd[19076]: password check failed for user (root) Dec 29 04:50:38 host sshd[19072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.252.34 user=root Dec 29 04:50:38 host sshd[19072]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 04:50:40 host sshd[19070]: Failed password for invalid user root from 104.248.163.6 port 46894 ssh2 Dec 29 04:50:40 host sshd[19070]: Received disconnect from 104.248.163.6 port 46894:11: Bye Bye [preauth] Dec 29 04:50:40 host sshd[19070]: Disconnected from 104.248.163.6 port 46894 [preauth] Dec 29 04:50:40 host sshd[19072]: Failed password for invalid user root from 157.245.252.34 port 45682 ssh2 Dec 29 04:50:40 host sshd[19072]: Received disconnect from 157.245.252.34 port 45682:11: Bye Bye [preauth] Dec 29 04:50:40 host sshd[19072]: Disconnected from 157.245.252.34 port 45682 [preauth] Dec 29 04:51:12 host sshd[19194]: User root from 167.172.90.174 not allowed because not listed in AllowUsers Dec 29 04:51:12 host sshd[19194]: input_userauth_request: invalid user root [preauth] Dec 29 04:51:12 host unix_chkpwd[19197]: password check failed for user (root) Dec 29 04:51:12 host sshd[19194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.90.174 user=root Dec 29 04:51:12 host sshd[19194]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 04:51:13 host sshd[19194]: Failed password for invalid user root from 167.172.90.174 port 47672 ssh2 Dec 29 04:51:13 host sshd[19194]: Received disconnect from 167.172.90.174 port 47672:11: Bye Bye [preauth] Dec 29 04:51:13 host sshd[19194]: Disconnected from 167.172.90.174 port 47672 [preauth] Dec 29 04:51:19 host sshd[19237]: Invalid user wasadmin from 172.105.212.69 port 55500 Dec 29 04:51:19 host sshd[19237]: input_userauth_request: invalid user wasadmin [preauth] Dec 29 04:51:19 host sshd[19237]: pam_unix(sshd:auth): check pass; user unknown Dec 29 04:51:19 host sshd[19237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.105.212.69 Dec 29 04:51:22 host sshd[19237]: Failed password for invalid user wasadmin from 172.105.212.69 port 55500 ssh2 Dec 29 04:51:22 host sshd[19237]: Received disconnect from 172.105.212.69 port 55500:11: Bye Bye [preauth] Dec 29 04:51:22 host sshd[19237]: Disconnected from 172.105.212.69 port 55500 [preauth] Dec 29 04:51:40 host sshd[19333]: User root from 172.245.57.186 not allowed because not listed in AllowUsers Dec 29 04:51:40 host sshd[19333]: input_userauth_request: invalid user root [preauth] Dec 29 04:51:40 host unix_chkpwd[19337]: password check failed for user (root) Dec 29 04:51:40 host sshd[19333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.245.57.186 user=root Dec 29 04:51:40 host sshd[19333]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 04:51:42 host sshd[19333]: Failed password for invalid user root from 172.245.57.186 port 45780 ssh2 Dec 29 04:51:43 host sshd[19372]: User root from 167.99.12.43 not allowed because not listed in AllowUsers Dec 29 04:51:43 host sshd[19372]: input_userauth_request: invalid user root [preauth] Dec 29 04:51:43 host unix_chkpwd[19375]: password check failed for user (root) Dec 29 04:51:43 host sshd[19372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.12.43 user=root Dec 29 04:51:43 host sshd[19372]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 04:51:44 host sshd[19372]: Failed password for invalid user root from 167.99.12.43 port 40858 ssh2 Dec 29 04:51:45 host sshd[19372]: Received disconnect from 167.99.12.43 port 40858:11: Bye Bye [preauth] Dec 29 04:51:45 host sshd[19372]: Disconnected from 167.99.12.43 port 40858 [preauth] Dec 29 04:51:52 host sshd[19417]: Invalid user hadoop from 143.198.144.234 port 43362 Dec 29 04:51:52 host sshd[19417]: input_userauth_request: invalid user hadoop [preauth] Dec 29 04:51:52 host sshd[19417]: pam_unix(sshd:auth): check pass; user unknown Dec 29 04:51:52 host sshd[19417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.144.234 Dec 29 04:51:52 host sshd[19415]: Invalid user user from 191.96.78.244 port 36278 Dec 29 04:51:52 host sshd[19415]: input_userauth_request: invalid user user [preauth] Dec 29 04:51:52 host sshd[19415]: pam_unix(sshd:auth): check pass; user unknown Dec 29 04:51:52 host sshd[19415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.96.78.244 Dec 29 04:51:54 host sshd[19417]: Failed password for invalid user hadoop from 143.198.144.234 port 43362 ssh2 Dec 29 04:51:55 host sshd[19415]: Failed password for invalid user user from 191.96.78.244 port 36278 ssh2 Dec 29 04:51:55 host sshd[19417]: Received disconnect from 143.198.144.234 port 43362:11: Bye Bye [preauth] Dec 29 04:51:55 host sshd[19417]: Disconnected from 143.198.144.234 port 43362 [preauth] Dec 29 04:51:55 host sshd[19415]: Received disconnect from 191.96.78.244 port 36278:11: Bye Bye [preauth] Dec 29 04:51:55 host sshd[19415]: Disconnected from 191.96.78.244 port 36278 [preauth] Dec 29 04:52:58 host sshd[19668]: Invalid user ftptest from 5.185.254.97 port 59542 Dec 29 04:52:58 host sshd[19668]: input_userauth_request: invalid user ftptest [preauth] Dec 29 04:52:58 host sshd[19668]: pam_unix(sshd:auth): check pass; user unknown Dec 29 04:52:58 host sshd[19668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.185.254.97 Dec 29 04:52:58 host sshd[19670]: Invalid user anaconda from 143.198.144.234 port 43464 Dec 29 04:52:58 host sshd[19670]: input_userauth_request: invalid user anaconda [preauth] Dec 29 04:52:58 host sshd[19670]: pam_unix(sshd:auth): check pass; user unknown Dec 29 04:52:58 host sshd[19670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.144.234 Dec 29 04:53:01 host sshd[19668]: Failed password for invalid user ftptest from 5.185.254.97 port 59542 ssh2 Dec 29 04:53:01 host sshd[19668]: Received disconnect from 5.185.254.97 port 59542:11: Bye Bye [preauth] Dec 29 04:53:01 host sshd[19668]: Disconnected from 5.185.254.97 port 59542 [preauth] Dec 29 04:53:01 host sshd[19670]: Failed password for invalid user anaconda from 143.198.144.234 port 43464 ssh2 Dec 29 04:54:00 host sshd[19836]: User root from 5.185.254.97 not allowed because not listed in AllowUsers Dec 29 04:54:00 host sshd[19836]: input_userauth_request: invalid user root [preauth] Dec 29 04:54:00 host unix_chkpwd[19840]: password check failed for user (root) Dec 29 04:54:00 host sshd[19836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.185.254.97 user=root Dec 29 04:54:00 host sshd[19836]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 04:54:02 host sshd[19836]: Failed password for invalid user root from 5.185.254.97 port 51928 ssh2 Dec 29 04:54:02 host sshd[19836]: Received disconnect from 5.185.254.97 port 51928:11: Bye Bye [preauth] Dec 29 04:54:02 host sshd[19836]: Disconnected from 5.185.254.97 port 51928 [preauth] Dec 29 04:59:35 host sshd[20725]: User root from 80.94.92.241 not allowed because not listed in AllowUsers Dec 29 04:59:35 host sshd[20725]: input_userauth_request: invalid user root [preauth] Dec 29 04:59:36 host unix_chkpwd[20733]: password check failed for user (root) Dec 29 04:59:36 host sshd[20725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.94.92.241 user=root Dec 29 04:59:36 host sshd[20725]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 04:59:36 host sshd[20728]: User root from 80.94.92.241 not allowed because not listed in AllowUsers Dec 29 04:59:36 host sshd[20728]: input_userauth_request: invalid user root [preauth] Dec 29 04:59:37 host unix_chkpwd[20737]: password check failed for user (root) Dec 29 04:59:37 host sshd[20728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.94.92.241 user=root Dec 29 04:59:37 host sshd[20728]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 04:59:37 host sshd[20725]: Failed password for invalid user root from 80.94.92.241 port 45048 ssh2 Dec 29 04:59:37 host sshd[20725]: Connection closed by 80.94.92.241 port 45048 [preauth] Dec 29 04:59:39 host sshd[20728]: Failed password for invalid user root from 80.94.92.241 port 45078 ssh2 Dec 29 04:59:39 host sshd[20728]: Connection closed by 80.94.92.241 port 45078 [preauth] Dec 29 05:01:10 host sshd[21010]: Invalid user usuario from 162.218.126.136 port 58270 Dec 29 05:01:10 host sshd[21010]: input_userauth_request: invalid user usuario [preauth] Dec 29 05:01:10 host sshd[21010]: pam_unix(sshd:auth): check pass; user unknown Dec 29 05:01:10 host sshd[21010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 29 05:01:12 host sshd[21010]: Failed password for invalid user usuario from 162.218.126.136 port 58270 ssh2 Dec 29 05:01:12 host sshd[21010]: Connection closed by 162.218.126.136 port 58270 [preauth] Dec 29 05:11:47 host sshd[22786]: Invalid user jenkins from 41.197.31.178 port 50634 Dec 29 05:11:47 host sshd[22786]: input_userauth_request: invalid user jenkins [preauth] Dec 29 05:11:47 host sshd[22786]: pam_unix(sshd:auth): check pass; user unknown Dec 29 05:11:47 host sshd[22786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 29 05:11:49 host sshd[22786]: Failed password for invalid user jenkins from 41.197.31.178 port 50634 ssh2 Dec 29 05:11:50 host sshd[22786]: Connection closed by 41.197.31.178 port 50634 [preauth] Dec 29 05:21:32 host sshd[24663]: Did not receive identification string from 92.255.85.115 port 16187 Dec 29 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 29 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 29 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 29 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 29 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 29 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 29 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 29 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 29 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 05:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 29 05:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwevmhonda user-2=bonifacegroup user-3=wwwletsstalkfood user-4=straightcurve user-5=phmetals user-6=kottayamcalldriv user-7=gifterman user-8=palco123 user-9=mrsclean user-10=wwwnexidigital user-11=disposeat user-12=wwwkmaorg user-13=remysagr user-14=wwwkapin user-15=woodpeck user-16=wwwtestugo user-17=shalinijames user-18=vfmassets user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=ugotscom user-23=wwwrmswll user-24=wwwresourcehunte user-25=keralaholi user-26=cochintaxi user-27=wwwkaretakers user-28=dartsimp user-29=a2zgroup user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 29 05:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 29 05:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 29 05:21:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 05:21:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=evmhonda.com --output=json Dec 29 05:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/test -e /home/wwwevmhonda/wordpress-backups Dec 29 05:21:48 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 29 05:21:48 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 29 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && find -H /home/wwwevmhonda/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 29 05:21:48 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 29 05:21:48 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 29 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=letsstalkfood.com --output=json Dec 29 05:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/wordpress-backups Dec 29 05:21:48 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 05:21:48 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && find -H /home/wwwletsstalkfood/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 29 05:21:48 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 05:21:48 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=mrsclean.co.in --output=json Dec 29 05:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 29 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 29 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 29 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 29 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=shalinijames.com --output=json Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/wordpress-backups Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && find -H /home/shalinijames/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=testugo.in --output=json Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=ugotechnologies.com --output=json Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 05:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=woodpeckerindia.com --output=json Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/wordpress-backups Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 29 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && find -H /home/woodpeck/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 29 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=panlys.com --output=json Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/wordpress-backups Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 29 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && find -H /home/palco123/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 29 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=resourcehunters.com --output=json Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/wordpress-backups Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && find -H /home/wwwresourcehunte/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /var/cpanel/licenseid_credentials.json Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/cat /home/wwwevmhonda/.wp-toolkit-identifier Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 29 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=bonifacegroup ; COMMAND=/bin/cat /home/bonifacegroup/.wp-toolkit-identifier Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session opened for user bonifacegroup by (uid=0) Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session closed for user bonifacegroup Dec 29 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/cat /home/wwwletsstalkfood/.wp-toolkit-identifier Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=straightcurve ; COMMAND=/bin/cat /home/straightcurve/.wp-toolkit-identifier Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session opened for user straightcurve by (uid=0) Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session closed for user straightcurve Dec 29 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=phmetals ; COMMAND=/bin/cat /home/phmetals/.wp-toolkit-identifier Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session opened for user phmetals by (uid=0) Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session closed for user phmetals Dec 29 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=kottayamcalldriv ; COMMAND=/bin/cat /home/kottayamcalldriv/.wp-toolkit-identifier Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session opened for user kottayamcalldriv by (uid=0) Dec 29 05:21:50 host sudo: pam_unix(sudo:session): session closed for user kottayamcalldriv Dec 29 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=gifterman ; COMMAND=/bin/cat /home/gifterman/.wp-toolkit-identifier Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session opened for user gifterman by (uid=0) Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session closed for user gifterman Dec 29 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/cat /home/palco123/.wp-toolkit-identifier Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 29 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/.wp-toolkit-identifier Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 29 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwnexidigital ; COMMAND=/bin/cat /home/wwwnexidigital/.wp-toolkit-identifier Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwnexidigital by (uid=0) Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwnexidigital Dec 29 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=disposeat ; COMMAND=/bin/cat /home/disposeat/.wp-toolkit-identifier Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session opened for user disposeat by (uid=0) Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session closed for user disposeat Dec 29 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkmaorg ; COMMAND=/bin/cat /home/wwwkmaorg/.wp-toolkit-identifier Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwkmaorg by (uid=0) Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwkmaorg Dec 29 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=remysagr ; COMMAND=/bin/cat /home/remysagr/.wp-toolkit-identifier Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session opened for user remysagr by (uid=0) Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session closed for user remysagr Dec 29 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkapin ; COMMAND=/bin/cat /home/wwwkapin/.wp-toolkit-identifier Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwkapin by (uid=0) Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwkapin Dec 29 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/cat /home/woodpeck/.wp-toolkit-identifier Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 29 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/cat /home/wwwtestugo/.wp-toolkit-identifier Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/cat /home/shalinijames/.wp-toolkit-identifier Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=vfmassets ; COMMAND=/bin/cat /home/vfmassets/.wp-toolkit-identifier Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session opened for user vfmassets by (uid=0) Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session closed for user vfmassets Dec 29 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=pmcresources ; COMMAND=/bin/cat /home/pmcresources/.wp-toolkit-identifier Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session opened for user pmcresources by (uid=0) Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session closed for user pmcresources Dec 29 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwpmcresource ; COMMAND=/bin/cat /home/wwwpmcresource/.wp-toolkit-identifier Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwpmcresource by (uid=0) Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwpmcresource Dec 29 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=travelboniface ; COMMAND=/bin/cat /home/travelboniface/.wp-toolkit-identifier Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session opened for user travelboniface by (uid=0) Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session closed for user travelboniface Dec 29 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwrmswll ; COMMAND=/bin/cat /home/wwwrmswll/.wp-toolkit-identifier Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwrmswll by (uid=0) Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwrmswll Dec 29 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/cat /home/wwwresourcehunte/.wp-toolkit-identifier Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 29 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 29 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-rnc8wWdBDT6pAlU9.wp-toolkit-identifier Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 29 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-rnc8wWdBDT6pAlU9.wp-toolkit-identifier Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 29 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=cochintaxi ; COMMAND=/bin/cat /home/cochintaxi/.wp-toolkit-identifier Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session opened for user cochintaxi by (uid=0) Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session closed for user cochintaxi Dec 29 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkaretakers ; COMMAND=/bin/cat /home/wwwkaretakers/.wp-toolkit-identifier Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwkaretakers by (uid=0) Dec 29 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwkaretakers Dec 29 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=dartsimp ; COMMAND=/bin/cat /home/dartsimp/.wp-toolkit-identifier Dec 29 05:21:52 host sudo: pam_unix(sudo:session): session opened for user dartsimp by (uid=0) Dec 29 05:21:52 host sudo: pam_unix(sudo:session): session closed for user dartsimp Dec 29 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=a2zgroup ; COMMAND=/bin/cat /home/a2zgroup/.wp-toolkit-identifier Dec 29 05:21:52 host sudo: pam_unix(sudo:session): session opened for user a2zgroup by (uid=0) Dec 29 05:21:52 host sudo: pam_unix(sudo:session): session closed for user a2zgroup Dec 29 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=laundryboniface ; COMMAND=/bin/cat /home/laundryboniface/.wp-toolkit-identifier Dec 29 05:21:52 host sudo: pam_unix(sudo:session): session opened for user laundryboniface by (uid=0) Dec 29 05:21:52 host sudo: pam_unix(sudo:session): session closed for user laundryboniface Dec 29 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Dec 29 05:21:52 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 29 05:21:52 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 29 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Dec 29 05:21:52 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 29 05:21:52 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 29 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-wXzlgaVatTWzNlW0.wp-toolkit-identifier Dec 29 05:21:52 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 29 05:21:52 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 29 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-wXzlgaVatTWzNlW0.wp-toolkit-identifier Dec 29 05:21:52 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 29 05:21:52 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 29 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_shared_ip --output=json Dec 29 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_public_ip ip=167.71.234.10 --output=json Dec 29 05:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-DdIbRfzr9qgO0eBf.~ Dec 29 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-DdIbRfzr9qgO0eBf.~' Dec 29 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-DdIbRfzr9qgO0eBf.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 29 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 29 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 05:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 05:22:00 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 29 05:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 29 05:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 29 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 29 05:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 05:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 29 05:22:03 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 05:22:05 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 29 05:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 05:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 29 05:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 05:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 05:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 29 05:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 05:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 05:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 29 05:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 05:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 05:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 29 05:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 05:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 05:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 29 05:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 05:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 05:33:35 host sshd[26969]: Invalid user bzrx1098ui from 92.255.85.115 port 8282 Dec 29 05:33:35 host sshd[26969]: input_userauth_request: invalid user bzrx1098ui [preauth] Dec 29 05:33:36 host sshd[26969]: pam_unix(sshd:auth): check pass; user unknown Dec 29 05:33:36 host sshd[26969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115 Dec 29 05:33:37 host sshd[26969]: Failed password for invalid user bzrx1098ui from 92.255.85.115 port 8282 ssh2 Dec 29 05:33:37 host sshd[26969]: Connection reset by 92.255.85.115 port 8282 [preauth] Dec 29 05:40:20 host sshd[28144]: Invalid user telecomadmin from 92.255.85.115 port 53147 Dec 29 05:40:20 host sshd[28144]: input_userauth_request: invalid user telecomadmin [preauth] Dec 29 05:40:20 host sshd[28144]: pam_unix(sshd:auth): check pass; user unknown Dec 29 05:40:20 host sshd[28144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115 Dec 29 05:40:22 host sshd[28144]: Failed password for invalid user telecomadmin from 92.255.85.115 port 53147 ssh2 Dec 29 05:40:22 host sshd[28144]: Connection reset by 92.255.85.115 port 53147 [preauth] Dec 29 05:57:21 host sshd[30963]: Invalid user odoo from 103.13.40.2 port 56340 Dec 29 05:57:21 host sshd[30963]: input_userauth_request: invalid user odoo [preauth] Dec 29 05:57:21 host sshd[30963]: pam_unix(sshd:auth): check pass; user unknown Dec 29 05:57:21 host sshd[30963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 29 05:57:23 host sshd[30963]: Failed password for invalid user odoo from 103.13.40.2 port 56340 ssh2 Dec 29 05:57:23 host sshd[30963]: Connection closed by 103.13.40.2 port 56340 [preauth] Dec 29 06:03:59 host sshd[31834]: Invalid user zjc from 106.10.122.53 port 42412 Dec 29 06:03:59 host sshd[31834]: input_userauth_request: invalid user zjc [preauth] Dec 29 06:03:59 host sshd[31834]: pam_unix(sshd:auth): check pass; user unknown Dec 29 06:03:59 host sshd[31834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 29 06:04:01 host sshd[31834]: Failed password for invalid user zjc from 106.10.122.53 port 42412 ssh2 Dec 29 06:04:01 host sshd[31834]: Connection closed by 106.10.122.53 port 42412 [preauth] Dec 29 06:04:56 host sshd[31984]: User root from 50.225.176.238 not allowed because not listed in AllowUsers Dec 29 06:04:56 host sshd[31984]: input_userauth_request: invalid user root [preauth] Dec 29 06:04:56 host unix_chkpwd[31990]: password check failed for user (root) Dec 29 06:04:56 host sshd[31984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.225.176.238 user=root Dec 29 06:04:56 host sshd[31984]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 06:04:58 host sshd[31984]: Failed password for invalid user root from 50.225.176.238 port 54926 ssh2 Dec 29 06:04:58 host sshd[31984]: Received disconnect from 50.225.176.238 port 54926:11: Bye Bye [preauth] Dec 29 06:04:58 host sshd[31984]: Disconnected from 50.225.176.238 port 54926 [preauth] Dec 29 06:05:22 host sshd[32044]: User root from 167.99.89.165 not allowed because not listed in AllowUsers Dec 29 06:05:22 host sshd[32044]: input_userauth_request: invalid user root [preauth] Dec 29 06:05:22 host unix_chkpwd[32047]: password check failed for user (root) Dec 29 06:05:22 host sshd[32044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.89.165 user=root Dec 29 06:05:22 host sshd[32044]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 06:05:24 host sshd[32044]: Failed password for invalid user root from 167.99.89.165 port 60752 ssh2 Dec 29 06:05:24 host sshd[32044]: Received disconnect from 167.99.89.165 port 60752:11: Bye Bye [preauth] Dec 29 06:05:24 host sshd[32044]: Disconnected from 167.99.89.165 port 60752 [preauth] Dec 29 06:06:39 host sshd[32308]: Invalid user john from 64.227.120.10 port 60186 Dec 29 06:06:39 host sshd[32308]: input_userauth_request: invalid user john [preauth] Dec 29 06:06:39 host sshd[32308]: pam_unix(sshd:auth): check pass; user unknown Dec 29 06:06:39 host sshd[32308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.120.10 Dec 29 06:06:41 host sshd[32308]: Failed password for invalid user john from 64.227.120.10 port 60186 ssh2 Dec 29 06:06:41 host sshd[32308]: Received disconnect from 64.227.120.10 port 60186:11: Bye Bye [preauth] Dec 29 06:06:41 host sshd[32308]: Disconnected from 64.227.120.10 port 60186 [preauth] Dec 29 06:07:51 host sshd[32476]: Invalid user marcos from 143.244.190.90 port 33256 Dec 29 06:07:51 host sshd[32476]: input_userauth_request: invalid user marcos [preauth] Dec 29 06:07:51 host sshd[32476]: pam_unix(sshd:auth): check pass; user unknown Dec 29 06:07:51 host sshd[32476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.244.190.90 Dec 29 06:07:53 host sshd[32476]: Failed password for invalid user marcos from 143.244.190.90 port 33256 ssh2 Dec 29 06:07:53 host sshd[32476]: Received disconnect from 143.244.190.90 port 33256:11: Bye Bye [preauth] Dec 29 06:07:53 host sshd[32476]: Disconnected from 143.244.190.90 port 33256 [preauth] Dec 29 06:10:07 host sshd[358]: Invalid user ts3 from 162.218.126.136 port 53466 Dec 29 06:10:07 host sshd[358]: input_userauth_request: invalid user ts3 [preauth] Dec 29 06:10:08 host sshd[358]: pam_unix(sshd:auth): check pass; user unknown Dec 29 06:10:08 host sshd[358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 29 06:10:10 host sshd[358]: Failed password for invalid user ts3 from 162.218.126.136 port 53466 ssh2 Dec 29 06:10:10 host sshd[358]: Connection closed by 162.218.126.136 port 53466 [preauth] Dec 29 06:10:39 host sshd[535]: User root from 222.252.25.169 not allowed because not listed in AllowUsers Dec 29 06:10:39 host sshd[535]: input_userauth_request: invalid user root [preauth] Dec 29 06:10:39 host unix_chkpwd[538]: password check failed for user (root) Dec 29 06:10:39 host sshd[535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.252.25.169 user=root Dec 29 06:10:39 host sshd[535]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 06:10:40 host sshd[535]: Failed password for invalid user root from 222.252.25.169 port 38188 ssh2 Dec 29 06:10:40 host sshd[535]: Received disconnect from 222.252.25.169 port 38188:11: Bye Bye [preauth] Dec 29 06:10:40 host sshd[535]: Disconnected from 222.252.25.169 port 38188 [preauth] Dec 29 06:10:48 host sshd[552]: User root from 52.231.137.64 not allowed because not listed in AllowUsers Dec 29 06:10:48 host sshd[552]: input_userauth_request: invalid user root [preauth] Dec 29 06:10:48 host unix_chkpwd[556]: password check failed for user (root) Dec 29 06:10:48 host sshd[552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.231.137.64 user=root Dec 29 06:10:48 host sshd[552]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 06:10:50 host sshd[552]: Failed password for invalid user root from 52.231.137.64 port 25160 ssh2 Dec 29 06:10:50 host sshd[552]: Received disconnect from 52.231.137.64 port 25160:11: Bye Bye [preauth] Dec 29 06:10:50 host sshd[552]: Disconnected from 52.231.137.64 port 25160 [preauth] Dec 29 06:10:55 host sshd[563]: Invalid user manager from 64.227.120.10 port 53122 Dec 29 06:10:55 host sshd[563]: input_userauth_request: invalid user manager [preauth] Dec 29 06:10:55 host sshd[563]: pam_unix(sshd:auth): check pass; user unknown Dec 29 06:10:55 host sshd[563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.120.10 Dec 29 06:10:57 host sshd[563]: Failed password for invalid user manager from 64.227.120.10 port 53122 ssh2 Dec 29 06:10:58 host sshd[563]: Received disconnect from 64.227.120.10 port 53122:11: Bye Bye [preauth] Dec 29 06:10:58 host sshd[563]: Disconnected from 64.227.120.10 port 53122 [preauth] Dec 29 06:11:22 host sshd[624]: Invalid user ubuntu from 167.99.89.165 port 53374 Dec 29 06:11:22 host sshd[624]: input_userauth_request: invalid user ubuntu [preauth] Dec 29 06:11:22 host sshd[624]: pam_unix(sshd:auth): check pass; user unknown Dec 29 06:11:22 host sshd[624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.89.165 Dec 29 06:11:23 host sshd[624]: Failed password for invalid user ubuntu from 167.99.89.165 port 53374 ssh2 Dec 29 06:11:24 host sshd[624]: Received disconnect from 167.99.89.165 port 53374:11: Bye Bye [preauth] Dec 29 06:11:24 host sshd[624]: Disconnected from 167.99.89.165 port 53374 [preauth] Dec 29 06:11:28 host sshd[669]: Invalid user discord from 50.225.176.238 port 39226 Dec 29 06:11:28 host sshd[669]: input_userauth_request: invalid user discord [preauth] Dec 29 06:11:28 host sshd[669]: pam_unix(sshd:auth): check pass; user unknown Dec 29 06:11:28 host sshd[669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.225.176.238 Dec 29 06:11:30 host sshd[696]: Invalid user d from 143.244.190.90 port 53212 Dec 29 06:11:30 host sshd[696]: input_userauth_request: invalid user d [preauth] Dec 29 06:11:30 host sshd[696]: pam_unix(sshd:auth): check pass; user unknown Dec 29 06:11:30 host sshd[696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.244.190.90 Dec 29 06:11:30 host sshd[669]: Failed password for invalid user discord from 50.225.176.238 port 39226 ssh2 Dec 29 06:11:31 host sshd[669]: Received disconnect from 50.225.176.238 port 39226:11: Bye Bye [preauth] Dec 29 06:11:31 host sshd[669]: Disconnected from 50.225.176.238 port 39226 [preauth] Dec 29 06:11:32 host sshd[696]: Failed password for invalid user d from 143.244.190.90 port 53212 ssh2 Dec 29 06:11:33 host sshd[696]: Received disconnect from 143.244.190.90 port 53212:11: Bye Bye [preauth] Dec 29 06:11:33 host sshd[696]: Disconnected from 143.244.190.90 port 53212 [preauth] Dec 29 06:12:03 host sshd[797]: Invalid user info from 64.227.120.10 port 53450 Dec 29 06:12:03 host sshd[797]: input_userauth_request: invalid user info [preauth] Dec 29 06:12:03 host sshd[797]: pam_unix(sshd:auth): check pass; user unknown Dec 29 06:12:03 host sshd[797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.120.10 Dec 29 06:12:05 host sshd[797]: Failed password for invalid user info from 64.227.120.10 port 53450 ssh2 Dec 29 06:12:17 host sshd[849]: User root from 52.231.137.64 not allowed because not listed in AllowUsers Dec 29 06:12:17 host sshd[849]: input_userauth_request: invalid user root [preauth] Dec 29 06:12:17 host unix_chkpwd[853]: password check failed for user (root) Dec 29 06:12:17 host sshd[849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.231.137.64 user=root Dec 29 06:12:17 host sshd[849]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 06:12:19 host sshd[849]: Failed password for invalid user root from 52.231.137.64 port 55558 ssh2 Dec 29 06:12:41 host sshd[943]: Invalid user admin from 143.244.190.90 port 52382 Dec 29 06:12:41 host sshd[943]: input_userauth_request: invalid user admin [preauth] Dec 29 06:12:41 host sshd[943]: pam_unix(sshd:auth): check pass; user unknown Dec 29 06:12:41 host sshd[943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.244.190.90 Dec 29 06:12:43 host sshd[943]: Failed password for invalid user admin from 143.244.190.90 port 52382 ssh2 Dec 29 06:12:43 host sshd[943]: Received disconnect from 143.244.190.90 port 52382:11: Bye Bye [preauth] Dec 29 06:12:43 host sshd[943]: Disconnected from 143.244.190.90 port 52382 [preauth] Dec 29 06:13:12 host sshd[1031]: User root from 222.252.25.169 not allowed because not listed in AllowUsers Dec 29 06:13:12 host sshd[1031]: input_userauth_request: invalid user root [preauth] Dec 29 06:13:12 host unix_chkpwd[1034]: password check failed for user (root) Dec 29 06:13:12 host sshd[1031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.252.25.169 user=root Dec 29 06:13:12 host sshd[1031]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 06:13:15 host sshd[1031]: Failed password for invalid user root from 222.252.25.169 port 47718 ssh2 Dec 29 06:14:25 host sshd[1264]: Connection closed by 45.79.181.104 port 27642 [preauth] Dec 29 06:14:28 host sshd[1294]: Connection closed by 45.79.181.104 port 27646 [preauth] Dec 29 06:14:30 host sshd[1302]: Connection closed by 45.79.181.104 port 10422 [preauth] Dec 29 06:21:02 host sshd[2393]: User root from 107.173.159.193 not allowed because not listed in AllowUsers Dec 29 06:21:02 host sshd[2393]: input_userauth_request: invalid user root [preauth] Dec 29 06:21:02 host unix_chkpwd[2407]: password check failed for user (root) Dec 29 06:21:02 host sshd[2393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.173.159.193 user=root Dec 29 06:21:02 host sshd[2393]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 06:21:04 host sshd[2393]: Failed password for invalid user root from 107.173.159.193 port 36102 ssh2 Dec 29 06:21:04 host sshd[2393]: Received disconnect from 107.173.159.193 port 36102:11: Bye Bye [preauth] Dec 29 06:21:04 host sshd[2393]: Disconnected from 107.173.159.193 port 36102 [preauth] Dec 29 06:21:04 host sshd[2411]: Invalid user www from 211.244.45.196 port 50730 Dec 29 06:21:04 host sshd[2411]: input_userauth_request: invalid user www [preauth] Dec 29 06:21:04 host sshd[2411]: pam_unix(sshd:auth): check pass; user unknown Dec 29 06:21:04 host sshd[2411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.244.45.196 Dec 29 06:21:06 host sshd[2411]: Failed password for invalid user www from 211.244.45.196 port 50730 ssh2 Dec 29 06:21:06 host sshd[2411]: Received disconnect from 211.244.45.196 port 50730:11: Bye Bye [preauth] Dec 29 06:21:06 host sshd[2411]: Disconnected from 211.244.45.196 port 50730 [preauth] Dec 29 06:21:22 host sshd[2446]: User root from 188.128.82.178 not allowed because not listed in AllowUsers Dec 29 06:21:22 host sshd[2446]: input_userauth_request: invalid user root [preauth] Dec 29 06:21:22 host unix_chkpwd[2449]: password check failed for user (root) Dec 29 06:21:22 host sshd[2446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.128.82.178 user=root Dec 29 06:21:22 host sshd[2446]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 06:21:25 host sshd[2446]: Failed password for invalid user root from 188.128.82.178 port 48087 ssh2 Dec 29 06:21:25 host sshd[2446]: Received disconnect from 188.128.82.178 port 48087:11: Bye Bye [preauth] Dec 29 06:21:25 host sshd[2446]: Disconnected from 188.128.82.178 port 48087 [preauth] Dec 29 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 29 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 29 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 29 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 29 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 29 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 29 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 29 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 29 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 29 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=wwwtestugo user-3=shalinijames user-4=vfmassets user-5=woodpeck user-6=wwwkapin user-7=disposeat user-8=wwwkmaorg user-9=remysagr user-10=mrsclean user-11=wwwnexidigital user-12=kottayamcalldriv user-13=phmetals user-14=gifterman user-15=palco123 user-16=wwwletsstalkfood user-17=straightcurve user-18=wwwevmhonda user-19=bonifacegroup user-20=laundryboniface user-21=dartsimp user-22=a2zgroup user-23=cochintaxi user-24=wwwkaretakers user-25=ugotscom user-26=wwwrmswll user-27=keralaholi user-28=wwwresourcehunte user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 29 06:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 29 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-0dtsWsjPsdbt7rnx.~ Dec 29 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-0dtsWsjPsdbt7rnx.~' Dec 29 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-0dtsWsjPsdbt7rnx.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 29 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 29 06:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 06:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 06:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 06:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 06:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 06:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 06:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 06:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 06:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 06:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 06:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 06:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 29 06:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 06:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 29 06:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 29 06:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 29 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 29 06:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 06:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 06:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 29 06:21:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 06:21:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 06:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 29 06:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 06:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 06:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 29 06:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 06:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 06:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 29 06:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 06:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 06:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 29 06:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 06:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 06:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 29 06:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 06:22:07 host sshd[2729]: Invalid user paula from 103.146.202.146 port 42254 Dec 29 06:22:07 host sshd[2729]: input_userauth_request: invalid user paula [preauth] Dec 29 06:22:07 host sshd[2729]: pam_unix(sshd:auth): check pass; user unknown Dec 29 06:22:07 host sshd[2729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.146.202.146 Dec 29 06:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 06:22:09 host sshd[2729]: Failed password for invalid user paula from 103.146.202.146 port 42254 ssh2 Dec 29 06:22:09 host sshd[2729]: Received disconnect from 103.146.202.146 port 42254:11: Bye Bye [preauth] Dec 29 06:22:09 host sshd[2729]: Disconnected from 103.146.202.146 port 42254 [preauth] Dec 29 06:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 29 06:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 06:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 06:22:51 host sshd[2833]: User root from 201.76.115.102 not allowed because not listed in AllowUsers Dec 29 06:22:51 host sshd[2833]: input_userauth_request: invalid user root [preauth] Dec 29 06:22:51 host unix_chkpwd[2838]: password check failed for user (root) Dec 29 06:22:51 host sshd[2833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.76.115.102 user=root Dec 29 06:22:51 host sshd[2833]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 06:22:53 host sshd[2833]: Failed password for invalid user root from 201.76.115.102 port 45350 ssh2 Dec 29 06:22:54 host sshd[2833]: Received disconnect from 201.76.115.102 port 45350:11: Bye Bye [preauth] Dec 29 06:22:54 host sshd[2833]: Disconnected from 201.76.115.102 port 45350 [preauth] Dec 29 06:23:56 host sshd[2964]: User root from 45.240.88.36 not allowed because not listed in AllowUsers Dec 29 06:23:56 host sshd[2964]: input_userauth_request: invalid user root [preauth] Dec 29 06:23:56 host unix_chkpwd[2967]: password check failed for user (root) Dec 29 06:23:56 host sshd[2964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.240.88.36 user=root Dec 29 06:23:56 host sshd[2964]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 06:23:56 host sshd[2962]: Invalid user root123 from 35.202.200.207 port 1338 Dec 29 06:23:56 host sshd[2962]: input_userauth_request: invalid user root123 [preauth] Dec 29 06:23:56 host sshd[2962]: pam_unix(sshd:auth): check pass; user unknown Dec 29 06:23:56 host sshd[2962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.202.200.207 Dec 29 06:23:58 host sshd[2964]: Failed password for invalid user root from 45.240.88.36 port 45296 ssh2 Dec 29 06:23:58 host sshd[2962]: Failed password for invalid user root123 from 35.202.200.207 port 1338 ssh2 Dec 29 06:23:58 host sshd[2964]: Received disconnect from 45.240.88.36 port 45296:11: Bye Bye [preauth] Dec 29 06:23:58 host sshd[2964]: Disconnected from 45.240.88.36 port 45296 [preauth] Dec 29 06:23:58 host sshd[2962]: Received disconnect from 35.202.200.207 port 1338:11: Bye Bye [preauth] Dec 29 06:23:58 host sshd[2962]: Disconnected from 35.202.200.207 port 1338 [preauth] Dec 29 06:24:59 host sshd[3110]: Invalid user postgres from 139.59.70.64 port 58546 Dec 29 06:24:59 host sshd[3110]: input_userauth_request: invalid user postgres [preauth] Dec 29 06:24:59 host sshd[3110]: pam_unix(sshd:auth): check pass; user unknown Dec 29 06:24:59 host sshd[3110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.70.64 Dec 29 06:25:01 host sshd[3110]: Failed password for invalid user postgres from 139.59.70.64 port 58546 ssh2 Dec 29 06:25:01 host sshd[3110]: Received disconnect from 139.59.70.64 port 58546:11: Bye Bye [preauth] Dec 29 06:25:01 host sshd[3110]: Disconnected from 139.59.70.64 port 58546 [preauth] Dec 29 06:25:05 host sshd[3139]: Invalid user luke from 13.74.46.65 port 6781 Dec 29 06:25:05 host sshd[3139]: input_userauth_request: invalid user luke [preauth] Dec 29 06:25:05 host sshd[3139]: pam_unix(sshd:auth): check pass; user unknown Dec 29 06:25:05 host sshd[3139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.74.46.65 Dec 29 06:25:07 host sshd[3139]: Failed password for invalid user luke from 13.74.46.65 port 6781 ssh2 Dec 29 06:25:07 host sshd[3139]: Received disconnect from 13.74.46.65 port 6781:11: Bye Bye [preauth] Dec 29 06:25:07 host sshd[3139]: Disconnected from 13.74.46.65 port 6781 [preauth] Dec 29 06:26:10 host sshd[3346]: Invalid user admin from 112.29.79.195 port 41740 Dec 29 06:26:10 host sshd[3346]: input_userauth_request: invalid user admin [preauth] Dec 29 06:26:10 host sshd[3346]: pam_unix(sshd:auth): check pass; user unknown Dec 29 06:26:10 host sshd[3346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.29.79.195 Dec 29 06:26:11 host sshd[3346]: Failed password for invalid user admin from 112.29.79.195 port 41740 ssh2 Dec 29 06:26:12 host sshd[3346]: Received disconnect from 112.29.79.195 port 41740:11: Bye Bye [preauth] Dec 29 06:26:12 host sshd[3346]: Disconnected from 112.29.79.195 port 41740 [preauth] Dec 29 06:26:40 host sshd[3399]: User root from 211.244.45.196 not allowed because not listed in AllowUsers Dec 29 06:26:40 host sshd[3399]: input_userauth_request: invalid user root [preauth] Dec 29 06:26:40 host unix_chkpwd[3406]: password check failed for user (root) Dec 29 06:26:40 host sshd[3399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.244.45.196 user=root Dec 29 06:26:40 host sshd[3399]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 06:26:42 host sshd[3399]: Failed password for invalid user root from 211.244.45.196 port 50410 ssh2 Dec 29 06:26:42 host sshd[3399]: Received disconnect from 211.244.45.196 port 50410:11: Bye Bye [preauth] Dec 29 06:26:42 host sshd[3399]: Disconnected from 211.244.45.196 port 50410 [preauth] Dec 29 06:27:05 host sshd[3482]: Invalid user user from 45.240.88.36 port 57854 Dec 29 06:27:05 host sshd[3482]: input_userauth_request: invalid user user [preauth] Dec 29 06:27:05 host sshd[3482]: pam_unix(sshd:auth): check pass; user unknown Dec 29 06:27:05 host sshd[3482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.240.88.36 Dec 29 06:27:07 host sshd[3482]: Failed password for invalid user user from 45.240.88.36 port 57854 ssh2 Dec 29 06:27:07 host sshd[3482]: Received disconnect from 45.240.88.36 port 57854:11: Bye Bye [preauth] Dec 29 06:27:07 host sshd[3482]: Disconnected from 45.240.88.36 port 57854 [preauth] Dec 29 06:27:36 host sshd[3575]: Invalid user eugene from 107.173.159.193 port 37862 Dec 29 06:27:36 host sshd[3575]: input_userauth_request: invalid user eugene [preauth] Dec 29 06:27:36 host sshd[3575]: pam_unix(sshd:auth): check pass; user unknown Dec 29 06:27:36 host sshd[3575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.173.159.193 Dec 29 06:27:38 host sshd[3575]: Failed password for invalid user eugene from 107.173.159.193 port 37862 ssh2 Dec 29 06:27:38 host sshd[3575]: Received disconnect from 107.173.159.193 port 37862:11: Bye Bye [preauth] Dec 29 06:27:38 host sshd[3575]: Disconnected from 107.173.159.193 port 37862 [preauth] Dec 29 06:27:47 host sshd[3617]: Invalid user james from 201.76.115.102 port 41641 Dec 29 06:27:47 host sshd[3617]: input_userauth_request: invalid user james [preauth] Dec 29 06:27:47 host sshd[3617]: pam_unix(sshd:auth): check pass; user unknown Dec 29 06:27:47 host sshd[3617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.76.115.102 Dec 29 06:27:49 host sshd[3617]: Failed password for invalid user james from 201.76.115.102 port 41641 ssh2 Dec 29 06:27:50 host sshd[3617]: Received disconnect from 201.76.115.102 port 41641:11: Bye Bye [preauth] Dec 29 06:27:50 host sshd[3617]: Disconnected from 201.76.115.102 port 41641 [preauth] Dec 29 06:28:20 host sshd[3702]: Invalid user redis2 from 139.59.70.64 port 38602 Dec 29 06:28:20 host sshd[3702]: input_userauth_request: invalid user redis2 [preauth] Dec 29 06:28:20 host sshd[3702]: pam_unix(sshd:auth): check pass; user unknown Dec 29 06:28:20 host sshd[3702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.70.64 Dec 29 06:28:22 host sshd[3702]: Failed password for invalid user redis2 from 139.59.70.64 port 38602 ssh2 Dec 29 06:28:22 host sshd[3702]: Received disconnect from 139.59.70.64 port 38602:11: Bye Bye [preauth] Dec 29 06:28:22 host sshd[3702]: Disconnected from 139.59.70.64 port 38602 [preauth] Dec 29 06:28:29 host sshd[3742]: User root from 35.202.200.207 not allowed because not listed in AllowUsers Dec 29 06:28:29 host sshd[3742]: input_userauth_request: invalid user root [preauth] Dec 29 06:28:29 host unix_chkpwd[3751]: password check failed for user (root) Dec 29 06:28:29 host sshd[3742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.202.200.207 user=root Dec 29 06:28:29 host sshd[3742]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 06:28:30 host sshd[3753]: Invalid user deploy from 103.146.202.146 port 39026 Dec 29 06:28:30 host sshd[3753]: input_userauth_request: invalid user deploy [preauth] Dec 29 06:28:30 host sshd[3753]: pam_unix(sshd:auth): check pass; user unknown Dec 29 06:28:30 host sshd[3753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.146.202.146 Dec 29 06:28:32 host sshd[3755]: Invalid user webapp from 188.128.82.178 port 36943 Dec 29 06:28:32 host sshd[3755]: input_userauth_request: invalid user webapp [preauth] Dec 29 06:28:32 host sshd[3755]: pam_unix(sshd:auth): check pass; user unknown Dec 29 06:28:32 host sshd[3755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.128.82.178 Dec 29 06:28:32 host sshd[3742]: Failed password for invalid user root from 35.202.200.207 port 1313 ssh2 Dec 29 06:28:32 host sshd[3753]: Failed password for invalid user deploy from 103.146.202.146 port 39026 ssh2 Dec 29 06:28:32 host sshd[3742]: Received disconnect from 35.202.200.207 port 1313:11: Bye Bye [preauth] Dec 29 06:28:32 host sshd[3742]: Disconnected from 35.202.200.207 port 1313 [preauth] Dec 29 06:28:32 host sshd[3753]: Received disconnect from 103.146.202.146 port 39026:11: Bye Bye [preauth] Dec 29 06:28:32 host sshd[3753]: Disconnected from 103.146.202.146 port 39026 [preauth] Dec 29 06:28:33 host sshd[3755]: Failed password for invalid user webapp from 188.128.82.178 port 36943 ssh2 Dec 29 06:28:34 host sshd[3755]: Received disconnect from 188.128.82.178 port 36943:11: Bye Bye [preauth] Dec 29 06:28:34 host sshd[3755]: Disconnected from 188.128.82.178 port 36943 [preauth] Dec 29 06:29:25 host sshd[3915]: Invalid user admin from 13.74.46.65 port 51879 Dec 29 06:29:25 host sshd[3915]: input_userauth_request: invalid user admin [preauth] Dec 29 06:29:25 host sshd[3915]: pam_unix(sshd:auth): check pass; user unknown Dec 29 06:29:25 host sshd[3915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.74.46.65 Dec 29 06:29:27 host sshd[3915]: Failed password for invalid user admin from 13.74.46.65 port 51879 ssh2 Dec 29 06:29:27 host sshd[3915]: Received disconnect from 13.74.46.65 port 51879:11: Bye Bye [preauth] Dec 29 06:29:27 host sshd[3915]: Disconnected from 13.74.46.65 port 51879 [preauth] Dec 29 06:29:44 host sshd[3947]: User root from 139.59.70.64 not allowed because not listed in AllowUsers Dec 29 06:29:44 host sshd[3947]: input_userauth_request: invalid user root [preauth] Dec 29 06:29:44 host unix_chkpwd[3949]: password check failed for user (root) Dec 29 06:29:44 host sshd[3947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.70.64 user=root Dec 29 06:29:44 host sshd[3947]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 06:29:45 host sshd[3947]: Failed password for invalid user root from 139.59.70.64 port 33896 ssh2 Dec 29 06:30:01 host sshd[3999]: User root from 103.146.202.146 not allowed because not listed in AllowUsers Dec 29 06:30:01 host sshd[3999]: input_userauth_request: invalid user root [preauth] Dec 29 06:30:01 host unix_chkpwd[4022]: password check failed for user (root) Dec 29 06:30:01 host sshd[3999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.146.202.146 user=root Dec 29 06:30:01 host sshd[3999]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 06:30:03 host sshd[3999]: Failed password for invalid user root from 103.146.202.146 port 34722 ssh2 Dec 29 06:30:03 host sshd[3999]: Received disconnect from 103.146.202.146 port 34722:11: Bye Bye [preauth] Dec 29 06:30:03 host sshd[3999]: Disconnected from 103.146.202.146 port 34722 [preauth] Dec 29 06:30:33 host sshd[4125]: Invalid user user from 13.74.46.65 port 11879 Dec 29 06:30:33 host sshd[4125]: input_userauth_request: invalid user user [preauth] Dec 29 06:30:33 host sshd[4125]: pam_unix(sshd:auth): check pass; user unknown Dec 29 06:30:33 host sshd[4125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.74.46.65 Dec 29 06:30:35 host sshd[4125]: Failed password for invalid user user from 13.74.46.65 port 11879 ssh2 Dec 29 06:31:52 host sshd[4312]: Invalid user ej from 45.93.201.90 port 46654 Dec 29 06:31:52 host sshd[4312]: input_userauth_request: invalid user ej [preauth] Dec 29 06:31:52 host sshd[4312]: pam_unix(sshd:auth): check pass; user unknown Dec 29 06:31:52 host sshd[4312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 29 06:31:53 host sshd[4312]: Failed password for invalid user ej from 45.93.201.90 port 46654 ssh2 Dec 29 06:31:56 host sshd[4312]: pam_unix(sshd:auth): check pass; user unknown Dec 29 06:31:58 host sshd[4312]: Failed password for invalid user ej from 45.93.201.90 port 46654 ssh2 Dec 29 06:32:01 host sshd[4312]: pam_unix(sshd:auth): check pass; user unknown Dec 29 06:32:03 host sshd[4312]: Failed password for invalid user ej from 45.93.201.90 port 46654 ssh2 Dec 29 06:32:06 host sshd[4312]: Connection closed by 45.93.201.90 port 46654 [preauth] Dec 29 06:32:06 host sshd[4312]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 29 06:37:58 host sshd[5635]: User root from 92.46.108.20 not allowed because not listed in AllowUsers Dec 29 06:37:58 host sshd[5635]: input_userauth_request: invalid user root [preauth] Dec 29 06:37:59 host unix_chkpwd[5647]: password check failed for user (root) Dec 29 06:37:59 host sshd[5635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 user=root Dec 29 06:37:59 host sshd[5635]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 06:38:02 host sshd[5635]: Failed password for invalid user root from 92.46.108.20 port 60168 ssh2 Dec 29 06:38:02 host sshd[5635]: Connection closed by 92.46.108.20 port 60168 [preauth] Dec 29 06:39:00 host sshd[6066]: Invalid user test_user from 112.29.79.195 port 43356 Dec 29 06:39:00 host sshd[6066]: input_userauth_request: invalid user test_user [preauth] Dec 29 06:39:00 host sshd[6066]: pam_unix(sshd:auth): check pass; user unknown Dec 29 06:39:00 host sshd[6066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.29.79.195 Dec 29 06:39:03 host sshd[6066]: Failed password for invalid user test_user from 112.29.79.195 port 43356 ssh2 Dec 29 06:39:03 host sshd[6066]: Received disconnect from 112.29.79.195 port 43356:11: Bye Bye [preauth] Dec 29 06:39:03 host sshd[6066]: Disconnected from 112.29.79.195 port 43356 [preauth] Dec 29 06:40:06 host sshd[6228]: User root from 112.29.79.195 not allowed because not listed in AllowUsers Dec 29 06:40:06 host sshd[6228]: input_userauth_request: invalid user root [preauth] Dec 29 06:40:06 host unix_chkpwd[6244]: password check failed for user (root) Dec 29 06:40:06 host sshd[6228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.29.79.195 user=root Dec 29 06:40:06 host sshd[6228]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 06:40:09 host sshd[6228]: Failed password for invalid user root from 112.29.79.195 port 57232 ssh2 Dec 29 06:40:09 host sshd[6228]: Received disconnect from 112.29.79.195 port 57232:11: Bye Bye [preauth] Dec 29 06:40:09 host sshd[6228]: Disconnected from 112.29.79.195 port 57232 [preauth] Dec 29 07:00:53 host sshd[9205]: Invalid user oracle from 41.197.31.178 port 35420 Dec 29 07:00:53 host sshd[9205]: input_userauth_request: invalid user oracle [preauth] Dec 29 07:00:53 host sshd[9205]: pam_unix(sshd:auth): check pass; user unknown Dec 29 07:00:53 host sshd[9205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 29 07:00:56 host sshd[9205]: Failed password for invalid user oracle from 41.197.31.178 port 35420 ssh2 Dec 29 07:00:56 host sshd[9205]: Connection closed by 41.197.31.178 port 35420 [preauth] Dec 29 07:08:15 host sshd[10306]: Invalid user auditor from 104.244.74.6 port 45746 Dec 29 07:08:15 host sshd[10306]: input_userauth_request: invalid user auditor [preauth] Dec 29 07:08:15 host sshd[10306]: pam_unix(sshd:auth): check pass; user unknown Dec 29 07:08:15 host sshd[10306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Dec 29 07:08:17 host sshd[10306]: Failed password for invalid user auditor from 104.244.74.6 port 45746 ssh2 Dec 29 07:08:18 host sshd[10306]: Connection closed by 104.244.74.6 port 45746 [preauth] Dec 29 07:14:41 host sshd[11349]: Did not receive identification string from 165.22.223.108 port 40558 Dec 29 07:15:22 host sshd[11421]: User root from 165.22.223.108 not allowed because not listed in AllowUsers Dec 29 07:15:22 host sshd[11421]: input_userauth_request: invalid user root [preauth] Dec 29 07:15:22 host unix_chkpwd[11423]: password check failed for user (root) Dec 29 07:15:22 host sshd[11421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.223.108 user=root Dec 29 07:15:22 host sshd[11421]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 07:15:23 host sshd[11421]: Failed password for invalid user root from 165.22.223.108 port 53820 ssh2 Dec 29 07:15:23 host sshd[11421]: Connection closed by 165.22.223.108 port 53820 [preauth] Dec 29 07:15:57 host sshd[11509]: Invalid user admin from 165.22.223.108 port 55318 Dec 29 07:15:57 host sshd[11509]: input_userauth_request: invalid user admin [preauth] Dec 29 07:15:57 host sshd[11509]: pam_unix(sshd:auth): check pass; user unknown Dec 29 07:15:57 host sshd[11509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.223.108 Dec 29 07:15:58 host sshd[11509]: Failed password for invalid user admin from 165.22.223.108 port 55318 ssh2 Dec 29 07:15:58 host sshd[11509]: Connection closed by 165.22.223.108 port 55318 [preauth] Dec 29 07:17:00 host sshd[11915]: Invalid user edward from 107.189.30.59 port 49004 Dec 29 07:17:00 host sshd[11915]: input_userauth_request: invalid user edward [preauth] Dec 29 07:17:00 host sshd[11915]: pam_unix(sshd:auth): check pass; user unknown Dec 29 07:17:00 host sshd[11915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Dec 29 07:17:03 host sshd[11915]: Failed password for invalid user edward from 107.189.30.59 port 49004 ssh2 Dec 29 07:17:04 host sshd[11915]: Connection closed by 107.189.30.59 port 49004 [preauth] Dec 29 07:19:06 host sshd[12273]: Invalid user user1 from 162.218.126.136 port 53424 Dec 29 07:19:06 host sshd[12273]: input_userauth_request: invalid user user1 [preauth] Dec 29 07:19:06 host sshd[12273]: pam_unix(sshd:auth): check pass; user unknown Dec 29 07:19:06 host sshd[12273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 29 07:19:09 host sshd[12273]: Failed password for invalid user user1 from 162.218.126.136 port 53424 ssh2 Dec 29 07:19:09 host sshd[12273]: Connection closed by 162.218.126.136 port 53424 [preauth] Dec 29 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 29 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 29 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 29 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 29 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 29 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 29 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 29 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 29 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 07:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 07:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 07:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 07:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 29 07:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 07:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 07:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=shalinijames user-3=wwwtestugo user-4=vfmassets user-5=wwwkapin user-6=woodpeck user-7=disposeat user-8=wwwkmaorg user-9=remysagr user-10=wwwnexidigital user-11=mrsclean user-12=kottayamcalldriv user-13=phmetals user-14=palco123 user-15=gifterman user-16=wwwletsstalkfood user-17=straightcurve user-18=wwwevmhonda user-19=bonifacegroup user-20=laundryboniface user-21=a2zgroup user-22=dartsimp user-23=wwwkaretakers user-24=cochintaxi user-25=ugotscom user-26=wwwresourcehunte user-27=keralaholi user-28=wwwrmswll user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 29 07:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 29 07:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 07:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-x0fIKP2Stc4t64vk.~ Dec 29 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-x0fIKP2Stc4t64vk.~' Dec 29 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-x0fIKP2Stc4t64vk.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 29 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 29 07:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 07:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 29 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 07:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 07:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 29 07:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 29 07:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 29 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 29 07:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 07:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 29 07:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 07:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 07:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 29 07:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 07:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 07:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 29 07:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 07:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 29 07:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 07:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 29 07:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 07:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 07:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 29 07:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 07:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 07:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 29 07:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 07:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 07:22:47 host sshd[12947]: Invalid user auditor from 104.244.74.6 port 42140 Dec 29 07:22:47 host sshd[12947]: input_userauth_request: invalid user auditor [preauth] Dec 29 07:22:47 host sshd[12947]: pam_unix(sshd:auth): check pass; user unknown Dec 29 07:22:47 host sshd[12947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Dec 29 07:22:49 host sshd[12950]: User root from 189.3.21.226 not allowed because not listed in AllowUsers Dec 29 07:22:49 host sshd[12950]: input_userauth_request: invalid user root [preauth] Dec 29 07:22:49 host unix_chkpwd[12953]: password check failed for user (root) Dec 29 07:22:49 host sshd[12950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.3.21.226 user=root Dec 29 07:22:49 host sshd[12950]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 07:22:49 host sshd[12947]: Failed password for invalid user auditor from 104.244.74.6 port 42140 ssh2 Dec 29 07:22:49 host sshd[12947]: Connection closed by 104.244.74.6 port 42140 [preauth] Dec 29 07:22:51 host sshd[12950]: Failed password for invalid user root from 189.3.21.226 port 52457 ssh2 Dec 29 07:22:51 host sshd[12950]: Received disconnect from 189.3.21.226 port 52457:11: Bye Bye [preauth] Dec 29 07:22:51 host sshd[12950]: Disconnected from 189.3.21.226 port 52457 [preauth] Dec 29 07:24:29 host sshd[13271]: Invalid user test from 103.13.40.2 port 39580 Dec 29 07:24:29 host sshd[13271]: input_userauth_request: invalid user test [preauth] Dec 29 07:24:29 host sshd[13271]: pam_unix(sshd:auth): check pass; user unknown Dec 29 07:24:29 host sshd[13271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 29 07:24:31 host sshd[13271]: Failed password for invalid user test from 103.13.40.2 port 39580 ssh2 Dec 29 07:24:31 host sshd[13271]: Connection closed by 103.13.40.2 port 39580 [preauth] Dec 29 07:25:16 host sshd[13367]: User root from 45.240.88.98 not allowed because not listed in AllowUsers Dec 29 07:25:16 host sshd[13367]: input_userauth_request: invalid user root [preauth] Dec 29 07:25:16 host unix_chkpwd[13371]: password check failed for user (root) Dec 29 07:25:16 host sshd[13367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.240.88.98 user=root Dec 29 07:25:16 host sshd[13367]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 07:25:18 host sshd[13367]: Failed password for invalid user root from 45.240.88.98 port 56058 ssh2 Dec 29 07:25:18 host sshd[13367]: Received disconnect from 45.240.88.98 port 56058:11: Bye Bye [preauth] Dec 29 07:25:18 host sshd[13367]: Disconnected from 45.240.88.98 port 56058 [preauth] Dec 29 07:25:46 host sshd[13477]: Invalid user ftpuser from 84.201.172.108 port 53564 Dec 29 07:25:46 host sshd[13477]: input_userauth_request: invalid user ftpuser [preauth] Dec 29 07:25:46 host sshd[13477]: pam_unix(sshd:auth): check pass; user unknown Dec 29 07:25:46 host sshd[13477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.172.108 Dec 29 07:25:49 host sshd[13477]: Failed password for invalid user ftpuser from 84.201.172.108 port 53564 ssh2 Dec 29 07:25:49 host sshd[13477]: Received disconnect from 84.201.172.108 port 53564:11: Bye Bye [preauth] Dec 29 07:25:49 host sshd[13477]: Disconnected from 84.201.172.108 port 53564 [preauth] Dec 29 07:27:41 host sshd[13811]: Invalid user otrs from 189.3.21.226 port 25532 Dec 29 07:27:41 host sshd[13811]: input_userauth_request: invalid user otrs [preauth] Dec 29 07:27:41 host sshd[13811]: pam_unix(sshd:auth): check pass; user unknown Dec 29 07:27:41 host sshd[13811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.3.21.226 Dec 29 07:27:43 host sshd[13811]: Failed password for invalid user otrs from 189.3.21.226 port 25532 ssh2 Dec 29 07:27:44 host sshd[13811]: Received disconnect from 189.3.21.226 port 25532:11: Bye Bye [preauth] Dec 29 07:27:44 host sshd[13811]: Disconnected from 189.3.21.226 port 25532 [preauth] Dec 29 07:27:57 host sshd[13893]: Invalid user antoine from 45.240.88.98 port 37032 Dec 29 07:27:57 host sshd[13893]: input_userauth_request: invalid user antoine [preauth] Dec 29 07:27:57 host sshd[13893]: pam_unix(sshd:auth): check pass; user unknown Dec 29 07:27:57 host sshd[13893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.240.88.98 Dec 29 07:27:59 host sshd[13893]: Failed password for invalid user antoine from 45.240.88.98 port 37032 ssh2 Dec 29 07:27:59 host sshd[13898]: Invalid user umcapasocanoas from 84.201.172.108 port 59054 Dec 29 07:27:59 host sshd[13898]: input_userauth_request: invalid user umcapasocanoas [preauth] Dec 29 07:27:59 host sshd[13898]: pam_unix(sshd:auth): check pass; user unknown Dec 29 07:27:59 host sshd[13898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.172.108 Dec 29 07:27:59 host sshd[13893]: Received disconnect from 45.240.88.98 port 37032:11: Bye Bye [preauth] Dec 29 07:27:59 host sshd[13893]: Disconnected from 45.240.88.98 port 37032 [preauth] Dec 29 07:28:01 host sshd[13898]: Failed password for invalid user umcapasocanoas from 84.201.172.108 port 59054 ssh2 Dec 29 07:28:02 host sshd[13898]: Received disconnect from 84.201.172.108 port 59054:11: Bye Bye [preauth] Dec 29 07:28:02 host sshd[13898]: Disconnected from 84.201.172.108 port 59054 [preauth] Dec 29 07:29:22 host sshd[14199]: Invalid user tor from 84.201.172.108 port 59380 Dec 29 07:29:22 host sshd[14199]: input_userauth_request: invalid user tor [preauth] Dec 29 07:29:22 host sshd[14199]: pam_unix(sshd:auth): check pass; user unknown Dec 29 07:29:22 host sshd[14199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.172.108 Dec 29 07:29:24 host sshd[14199]: Failed password for invalid user tor from 84.201.172.108 port 59380 ssh2 Dec 29 07:29:24 host sshd[14199]: Received disconnect from 84.201.172.108 port 59380:11: Bye Bye [preauth] Dec 29 07:29:24 host sshd[14199]: Disconnected from 84.201.172.108 port 59380 [preauth] Dec 29 07:31:12 host sshd[14469]: Invalid user user6 from 106.10.122.53 port 39266 Dec 29 07:31:12 host sshd[14469]: input_userauth_request: invalid user user6 [preauth] Dec 29 07:31:12 host sshd[14469]: pam_unix(sshd:auth): check pass; user unknown Dec 29 07:31:12 host sshd[14469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 29 07:31:14 host sshd[14469]: Failed password for invalid user user6 from 106.10.122.53 port 39266 ssh2 Dec 29 07:31:14 host sshd[14469]: Connection closed by 106.10.122.53 port 39266 [preauth] Dec 29 07:47:47 host sshd[17022]: Invalid user miner from 176.157.199.86 port 47934 Dec 29 07:47:47 host sshd[17022]: input_userauth_request: invalid user miner [preauth] Dec 29 07:47:47 host sshd[17022]: pam_unix(sshd:auth): check pass; user unknown Dec 29 07:47:47 host sshd[17022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.157.199.86 Dec 29 07:47:50 host sshd[17022]: Failed password for invalid user miner from 176.157.199.86 port 47934 ssh2 Dec 29 07:47:50 host sshd[17022]: Received disconnect from 176.157.199.86 port 47934:11: Bye Bye [preauth] Dec 29 07:47:50 host sshd[17022]: Disconnected from 176.157.199.86 port 47934 [preauth] Dec 29 07:48:34 host sshd[17118]: Did not receive identification string from 200.118.57.190 port 54806 Dec 29 07:48:35 host sshd[17115]: Invalid user nfs from 180.250.115.121 port 45873 Dec 29 07:48:35 host sshd[17115]: input_userauth_request: invalid user nfs [preauth] Dec 29 07:48:35 host sshd[17115]: pam_unix(sshd:auth): check pass; user unknown Dec 29 07:48:35 host sshd[17115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.115.121 Dec 29 07:48:37 host sshd[17115]: Failed password for invalid user nfs from 180.250.115.121 port 45873 ssh2 Dec 29 07:48:37 host sshd[17115]: Received disconnect from 180.250.115.121 port 45873:11: Bye Bye [preauth] Dec 29 07:48:37 host sshd[17115]: Disconnected from 180.250.115.121 port 45873 [preauth] Dec 29 07:49:26 host sshd[17174]: Invalid user tomek from 194.67.11.226 port 38584 Dec 29 07:49:26 host sshd[17174]: input_userauth_request: invalid user tomek [preauth] Dec 29 07:49:26 host sshd[17174]: pam_unix(sshd:auth): check pass; user unknown Dec 29 07:49:26 host sshd[17174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.67.11.226 Dec 29 07:49:27 host sshd[17174]: Failed password for invalid user tomek from 194.67.11.226 port 38584 ssh2 Dec 29 07:49:27 host sshd[17174]: Received disconnect from 194.67.11.226 port 38584:11: Bye Bye [preauth] Dec 29 07:49:27 host sshd[17174]: Disconnected from 194.67.11.226 port 38584 [preauth] Dec 29 07:49:36 host sshd[17213]: User root from 35.237.244.47 not allowed because not listed in AllowUsers Dec 29 07:49:36 host sshd[17213]: input_userauth_request: invalid user root [preauth] Dec 29 07:49:36 host unix_chkpwd[17216]: password check failed for user (root) Dec 29 07:49:36 host sshd[17213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.237.244.47 user=root Dec 29 07:49:36 host sshd[17213]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 07:49:39 host sshd[17213]: Failed password for invalid user root from 35.237.244.47 port 37422 ssh2 Dec 29 07:49:39 host sshd[17213]: Received disconnect from 35.237.244.47 port 37422:11: Bye Bye [preauth] Dec 29 07:49:39 host sshd[17213]: Disconnected from 35.237.244.47 port 37422 [preauth] Dec 29 07:50:00 host sshd[17248]: User centos from 180.250.115.121 not allowed because not listed in AllowUsers Dec 29 07:50:00 host sshd[17248]: input_userauth_request: invalid user centos [preauth] Dec 29 07:50:00 host unix_chkpwd[17251]: password check failed for user (centos) Dec 29 07:50:00 host sshd[17248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.115.121 user=centos Dec 29 07:50:02 host sshd[17248]: Failed password for invalid user centos from 180.250.115.121 port 51560 ssh2 Dec 29 07:50:02 host sshd[17248]: Received disconnect from 180.250.115.121 port 51560:11: Bye Bye [preauth] Dec 29 07:50:02 host sshd[17248]: Disconnected from 180.250.115.121 port 51560 [preauth] Dec 29 07:50:06 host sshd[17357]: Invalid user lukas from 128.199.7.94 port 39034 Dec 29 07:50:06 host sshd[17357]: input_userauth_request: invalid user lukas [preauth] Dec 29 07:50:06 host sshd[17357]: pam_unix(sshd:auth): check pass; user unknown Dec 29 07:50:06 host sshd[17357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.7.94 Dec 29 07:50:08 host sshd[17357]: Failed password for invalid user lukas from 128.199.7.94 port 39034 ssh2 Dec 29 07:50:08 host sshd[17357]: Received disconnect from 128.199.7.94 port 39034:11: Bye Bye [preauth] Dec 29 07:50:08 host sshd[17357]: Disconnected from 128.199.7.94 port 39034 [preauth] Dec 29 07:50:11 host sshd[17435]: User root from 123.63.70.105 not allowed because not listed in AllowUsers Dec 29 07:50:11 host sshd[17435]: input_userauth_request: invalid user root [preauth] Dec 29 07:50:11 host unix_chkpwd[17437]: password check failed for user (root) Dec 29 07:50:11 host sshd[17435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.63.70.105 user=root Dec 29 07:50:11 host sshd[17435]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 07:50:13 host sshd[17435]: Failed password for invalid user root from 123.63.70.105 port 2229 ssh2 Dec 29 07:50:13 host sshd[17435]: Received disconnect from 123.63.70.105 port 2229:11: Bye Bye [preauth] Dec 29 07:50:13 host sshd[17435]: Disconnected from 123.63.70.105 port 2229 [preauth] Dec 29 07:51:40 host sshd[17609]: User root from 69.221.145.153 not allowed because not listed in AllowUsers Dec 29 07:51:40 host sshd[17609]: input_userauth_request: invalid user root [preauth] Dec 29 07:51:40 host unix_chkpwd[17612]: password check failed for user (root) Dec 29 07:51:40 host sshd[17609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.221.145.153 user=root Dec 29 07:51:40 host sshd[17609]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 07:51:42 host sshd[17609]: Failed password for invalid user root from 69.221.145.153 port 22159 ssh2 Dec 29 07:51:43 host sshd[17609]: Received disconnect from 69.221.145.153 port 22159:11: Bye Bye [preauth] Dec 29 07:51:43 host sshd[17609]: Disconnected from 69.221.145.153 port 22159 [preauth] Dec 29 07:52:48 host sshd[17730]: User root from 104.248.252.80 not allowed because not listed in AllowUsers Dec 29 07:52:48 host sshd[17730]: input_userauth_request: invalid user root [preauth] Dec 29 07:52:48 host unix_chkpwd[17733]: password check failed for user (root) Dec 29 07:52:48 host sshd[17730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.252.80 user=root Dec 29 07:52:48 host sshd[17730]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 07:52:50 host sshd[17730]: Failed password for invalid user root from 104.248.252.80 port 55206 ssh2 Dec 29 07:52:50 host sshd[17730]: Received disconnect from 104.248.252.80 port 55206:11: Bye Bye [preauth] Dec 29 07:52:50 host sshd[17730]: Disconnected from 104.248.252.80 port 55206 [preauth] Dec 29 07:53:03 host sshd[17763]: Invalid user maintainer from 176.157.199.86 port 38984 Dec 29 07:53:03 host sshd[17763]: input_userauth_request: invalid user maintainer [preauth] Dec 29 07:53:03 host sshd[17763]: pam_unix(sshd:auth): check pass; user unknown Dec 29 07:53:03 host sshd[17763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.157.199.86 Dec 29 07:53:05 host sshd[17763]: Failed password for invalid user maintainer from 176.157.199.86 port 38984 ssh2 Dec 29 07:53:06 host sshd[17763]: Received disconnect from 176.157.199.86 port 38984:11: Bye Bye [preauth] Dec 29 07:53:06 host sshd[17763]: Disconnected from 176.157.199.86 port 38984 [preauth] Dec 29 07:53:34 host sshd[17849]: Invalid user miner from 69.221.145.153 port 61815 Dec 29 07:53:34 host sshd[17849]: input_userauth_request: invalid user miner [preauth] Dec 29 07:53:34 host sshd[17849]: pam_unix(sshd:auth): check pass; user unknown Dec 29 07:53:34 host sshd[17849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.221.145.153 Dec 29 07:53:35 host sshd[17849]: Failed password for invalid user miner from 69.221.145.153 port 61815 ssh2 Dec 29 07:53:36 host sshd[17849]: Received disconnect from 69.221.145.153 port 61815:11: Bye Bye [preauth] Dec 29 07:53:36 host sshd[17849]: Disconnected from 69.221.145.153 port 61815 [preauth] Dec 29 07:53:58 host sshd[17919]: Invalid user ftptest from 35.237.244.47 port 54270 Dec 29 07:53:58 host sshd[17919]: input_userauth_request: invalid user ftptest [preauth] Dec 29 07:53:58 host sshd[17919]: pam_unix(sshd:auth): check pass; user unknown Dec 29 07:53:58 host sshd[17919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.237.244.47 Dec 29 07:54:00 host sshd[17919]: Failed password for invalid user ftptest from 35.237.244.47 port 54270 ssh2 Dec 29 07:54:00 host sshd[17919]: Received disconnect from 35.237.244.47 port 54270:11: Bye Bye [preauth] Dec 29 07:54:00 host sshd[17919]: Disconnected from 35.237.244.47 port 54270 [preauth] Dec 29 07:54:00 host sshd[17934]: Invalid user ospite from 194.67.11.226 port 56302 Dec 29 07:54:00 host sshd[17934]: input_userauth_request: invalid user ospite [preauth] Dec 29 07:54:00 host sshd[17934]: pam_unix(sshd:auth): check pass; user unknown Dec 29 07:54:00 host sshd[17934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.67.11.226 Dec 29 07:54:02 host sshd[17934]: Failed password for invalid user ospite from 194.67.11.226 port 56302 ssh2 Dec 29 07:54:03 host sshd[17934]: Received disconnect from 194.67.11.226 port 56302:11: Bye Bye [preauth] Dec 29 07:54:03 host sshd[17934]: Disconnected from 194.67.11.226 port 56302 [preauth] Dec 29 07:54:20 host sshd[18009]: Invalid user sshvpn from 104.248.252.80 port 50558 Dec 29 07:54:20 host sshd[18009]: input_userauth_request: invalid user sshvpn [preauth] Dec 29 07:54:20 host sshd[18009]: pam_unix(sshd:auth): check pass; user unknown Dec 29 07:54:20 host sshd[18009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.252.80 Dec 29 07:54:22 host sshd[18009]: Failed password for invalid user sshvpn from 104.248.252.80 port 50558 ssh2 Dec 29 07:54:22 host sshd[18009]: Received disconnect from 104.248.252.80 port 50558:11: Bye Bye [preauth] Dec 29 07:54:22 host sshd[18009]: Disconnected from 104.248.252.80 port 50558 [preauth] Dec 29 07:54:25 host sshd[18015]: Invalid user opc from 128.199.7.94 port 42948 Dec 29 07:54:25 host sshd[18015]: input_userauth_request: invalid user opc [preauth] Dec 29 07:54:25 host sshd[18015]: pam_unix(sshd:auth): check pass; user unknown Dec 29 07:54:25 host sshd[18015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.7.94 Dec 29 07:54:27 host sshd[18015]: Failed password for invalid user opc from 128.199.7.94 port 42948 ssh2 Dec 29 07:54:27 host sshd[18015]: Received disconnect from 128.199.7.94 port 42948:11: Bye Bye [preauth] Dec 29 07:54:27 host sshd[18015]: Disconnected from 128.199.7.94 port 42948 [preauth] Dec 29 07:55:05 host sshd[18145]: User root from 176.157.199.86 not allowed because not listed in AllowUsers Dec 29 07:55:05 host sshd[18145]: input_userauth_request: invalid user root [preauth] Dec 29 07:55:05 host unix_chkpwd[18201]: password check failed for user (root) Dec 29 07:55:05 host sshd[18145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.157.199.86 user=root Dec 29 07:55:05 host sshd[18145]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 07:55:07 host sshd[18145]: Failed password for invalid user root from 176.157.199.86 port 59646 ssh2 Dec 29 07:55:07 host sshd[18145]: Received disconnect from 176.157.199.86 port 59646:11: Bye Bye [preauth] Dec 29 07:55:07 host sshd[18145]: Disconnected from 176.157.199.86 port 59646 [preauth] Dec 29 07:55:09 host sshd[18267]: Invalid user maintainer from 194.67.11.226 port 51900 Dec 29 07:55:09 host sshd[18267]: input_userauth_request: invalid user maintainer [preauth] Dec 29 07:55:09 host sshd[18267]: pam_unix(sshd:auth): check pass; user unknown Dec 29 07:55:09 host sshd[18267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.67.11.226 Dec 29 07:55:11 host sshd[18267]: Failed password for invalid user maintainer from 194.67.11.226 port 51900 ssh2 Dec 29 07:55:12 host sshd[18267]: Received disconnect from 194.67.11.226 port 51900:11: Bye Bye [preauth] Dec 29 07:55:12 host sshd[18267]: Disconnected from 194.67.11.226 port 51900 [preauth] Dec 29 07:55:35 host sshd[18409]: User root from 128.199.7.94 not allowed because not listed in AllowUsers Dec 29 07:55:35 host sshd[18409]: input_userauth_request: invalid user root [preauth] Dec 29 07:55:35 host unix_chkpwd[18413]: password check failed for user (root) Dec 29 07:55:35 host sshd[18409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.7.94 user=root Dec 29 07:55:35 host sshd[18409]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 07:55:37 host sshd[18409]: Failed password for invalid user root from 128.199.7.94 port 32780 ssh2 Dec 29 07:55:37 host sshd[18409]: Received disconnect from 128.199.7.94 port 32780:11: Bye Bye [preauth] Dec 29 07:55:37 host sshd[18409]: Disconnected from 128.199.7.94 port 32780 [preauth] Dec 29 07:55:53 host sshd[18477]: User root from 123.63.70.105 not allowed because not listed in AllowUsers Dec 29 07:55:53 host sshd[18477]: input_userauth_request: invalid user root [preauth] Dec 29 07:55:53 host unix_chkpwd[18479]: password check failed for user (root) Dec 29 07:55:53 host sshd[18477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.63.70.105 user=root Dec 29 07:55:53 host sshd[18477]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 07:55:55 host sshd[18477]: Failed password for invalid user root from 123.63.70.105 port 7627 ssh2 Dec 29 07:55:55 host sshd[18477]: Received disconnect from 123.63.70.105 port 7627:11: Bye Bye [preauth] Dec 29 07:55:55 host sshd[18477]: Disconnected from 123.63.70.105 port 7627 [preauth] Dec 29 08:04:17 host sshd[19665]: Invalid user princess from 194.9.71.15 port 48488 Dec 29 08:04:17 host sshd[19665]: input_userauth_request: invalid user princess [preauth] Dec 29 08:04:17 host sshd[19665]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:04:17 host sshd[19665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.9.71.15 Dec 29 08:04:19 host sshd[19665]: Failed password for invalid user princess from 194.9.71.15 port 48488 ssh2 Dec 29 08:04:20 host sshd[19665]: Received disconnect from 194.9.71.15 port 48488:11: Bye Bye [preauth] Dec 29 08:04:20 host sshd[19665]: Disconnected from 194.9.71.15 port 48488 [preauth] Dec 29 08:05:56 host sshd[20036]: Invalid user james from 222.232.29.235 port 42272 Dec 29 08:05:56 host sshd[20036]: input_userauth_request: invalid user james [preauth] Dec 29 08:05:56 host sshd[20036]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:05:56 host sshd[20036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.232.29.235 Dec 29 08:05:58 host sshd[20036]: Failed password for invalid user james from 222.232.29.235 port 42272 ssh2 Dec 29 08:05:59 host sshd[20036]: Received disconnect from 222.232.29.235 port 42272:11: Bye Bye [preauth] Dec 29 08:05:59 host sshd[20036]: Disconnected from 222.232.29.235 port 42272 [preauth] Dec 29 08:06:19 host sshd[20092]: Invalid user asdf from 139.59.186.183 port 41110 Dec 29 08:06:19 host sshd[20092]: input_userauth_request: invalid user asdf [preauth] Dec 29 08:06:19 host sshd[20092]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:06:19 host sshd[20092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.186.183 Dec 29 08:06:21 host sshd[20092]: Failed password for invalid user asdf from 139.59.186.183 port 41110 ssh2 Dec 29 08:06:21 host sshd[20092]: Received disconnect from 139.59.186.183 port 41110:11: Bye Bye [preauth] Dec 29 08:06:21 host sshd[20092]: Disconnected from 139.59.186.183 port 41110 [preauth] Dec 29 08:06:55 host sshd[20157]: Invalid user sysadmin from 37.59.195.128 port 58954 Dec 29 08:06:55 host sshd[20157]: input_userauth_request: invalid user sysadmin [preauth] Dec 29 08:06:55 host sshd[20157]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:06:55 host sshd[20157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.195.128 Dec 29 08:06:57 host sshd[20157]: Failed password for invalid user sysadmin from 37.59.195.128 port 58954 ssh2 Dec 29 08:06:57 host sshd[20157]: Received disconnect from 37.59.195.128 port 58954:11: Bye Bye [preauth] Dec 29 08:06:57 host sshd[20157]: Disconnected from 37.59.195.128 port 58954 [preauth] Dec 29 08:07:35 host sshd[20255]: User root from 115.68.249.165 not allowed because not listed in AllowUsers Dec 29 08:07:35 host sshd[20255]: input_userauth_request: invalid user root [preauth] Dec 29 08:07:35 host unix_chkpwd[20259]: password check failed for user (root) Dec 29 08:07:35 host sshd[20255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.68.249.165 user=root Dec 29 08:07:35 host sshd[20255]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 08:07:37 host sshd[20255]: Failed password for invalid user root from 115.68.249.165 port 55600 ssh2 Dec 29 08:07:37 host sshd[20255]: Received disconnect from 115.68.249.165 port 55600:11: Bye Bye [preauth] Dec 29 08:07:37 host sshd[20255]: Disconnected from 115.68.249.165 port 55600 [preauth] Dec 29 08:08:07 host sshd[20303]: Invalid user bbs from 104.248.1.96 port 43876 Dec 29 08:08:07 host sshd[20303]: input_userauth_request: invalid user bbs [preauth] Dec 29 08:08:07 host sshd[20303]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:08:07 host sshd[20303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.1.96 Dec 29 08:08:09 host sshd[20303]: Failed password for invalid user bbs from 104.248.1.96 port 43876 ssh2 Dec 29 08:08:10 host sshd[20303]: Received disconnect from 104.248.1.96 port 43876:11: Bye Bye [preauth] Dec 29 08:08:10 host sshd[20303]: Disconnected from 104.248.1.96 port 43876 [preauth] Dec 29 08:08:46 host sshd[20386]: User root from 194.9.71.15 not allowed because not listed in AllowUsers Dec 29 08:08:46 host sshd[20386]: input_userauth_request: invalid user root [preauth] Dec 29 08:08:47 host unix_chkpwd[20389]: password check failed for user (root) Dec 29 08:08:47 host sshd[20386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.9.71.15 user=root Dec 29 08:08:47 host sshd[20386]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 08:08:49 host sshd[20386]: Failed password for invalid user root from 194.9.71.15 port 42644 ssh2 Dec 29 08:08:49 host sshd[20386]: Received disconnect from 194.9.71.15 port 42644:11: Bye Bye [preauth] Dec 29 08:08:49 host sshd[20386]: Disconnected from 194.9.71.15 port 42644 [preauth] Dec 29 08:09:07 host sshd[20457]: User root from 139.59.186.183 not allowed because not listed in AllowUsers Dec 29 08:09:07 host sshd[20457]: input_userauth_request: invalid user root [preauth] Dec 29 08:09:07 host unix_chkpwd[20461]: password check failed for user (root) Dec 29 08:09:07 host sshd[20457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.186.183 user=root Dec 29 08:09:07 host sshd[20457]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 08:09:09 host sshd[20457]: Failed password for invalid user root from 139.59.186.183 port 52718 ssh2 Dec 29 08:09:09 host sshd[20457]: Received disconnect from 139.59.186.183 port 52718:11: Bye Bye [preauth] Dec 29 08:09:09 host sshd[20457]: Disconnected from 139.59.186.183 port 52718 [preauth] Dec 29 08:09:16 host sshd[20508]: Invalid user simon from 190.64.137.174 port 50698 Dec 29 08:09:16 host sshd[20508]: input_userauth_request: invalid user simon [preauth] Dec 29 08:09:16 host sshd[20508]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:09:16 host sshd[20508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.137.174 Dec 29 08:09:18 host sshd[20508]: Failed password for invalid user simon from 190.64.137.174 port 50698 ssh2 Dec 29 08:09:18 host sshd[20508]: Received disconnect from 190.64.137.174 port 50698:11: Bye Bye [preauth] Dec 29 08:09:18 host sshd[20508]: Disconnected from 190.64.137.174 port 50698 [preauth] Dec 29 08:10:31 host sshd[20698]: Invalid user geoserver from 37.59.195.128 port 40682 Dec 29 08:10:31 host sshd[20698]: input_userauth_request: invalid user geoserver [preauth] Dec 29 08:10:31 host sshd[20698]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:10:31 host sshd[20698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.195.128 Dec 29 08:10:33 host sshd[20698]: Failed password for invalid user geoserver from 37.59.195.128 port 40682 ssh2 Dec 29 08:10:33 host sshd[20698]: Received disconnect from 37.59.195.128 port 40682:11: Bye Bye [preauth] Dec 29 08:10:33 host sshd[20698]: Disconnected from 37.59.195.128 port 40682 [preauth] Dec 29 08:10:42 host sshd[20732]: User root from 104.248.1.96 not allowed because not listed in AllowUsers Dec 29 08:10:42 host sshd[20732]: input_userauth_request: invalid user root [preauth] Dec 29 08:10:42 host unix_chkpwd[20737]: password check failed for user (root) Dec 29 08:10:42 host sshd[20732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.1.96 user=root Dec 29 08:10:42 host sshd[20732]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 08:10:44 host sshd[20732]: Failed password for invalid user root from 104.248.1.96 port 47774 ssh2 Dec 29 08:10:45 host sshd[20732]: Received disconnect from 104.248.1.96 port 47774:11: Bye Bye [preauth] Dec 29 08:10:45 host sshd[20732]: Disconnected from 104.248.1.96 port 47774 [preauth] Dec 29 08:10:59 host sshd[20886]: Invalid user ts3 from 186.228.198.0 port 57860 Dec 29 08:10:59 host sshd[20886]: input_userauth_request: invalid user ts3 [preauth] Dec 29 08:10:59 host sshd[20886]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:10:59 host sshd[20886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.228.198.0 Dec 29 08:11:00 host sshd[20889]: User root from 222.232.29.235 not allowed because not listed in AllowUsers Dec 29 08:11:00 host sshd[20889]: input_userauth_request: invalid user root [preauth] Dec 29 08:11:00 host unix_chkpwd[20892]: password check failed for user (root) Dec 29 08:11:00 host sshd[20889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.232.29.235 user=root Dec 29 08:11:00 host sshd[20889]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 08:11:01 host sshd[20886]: Failed password for invalid user ts3 from 186.228.198.0 port 57860 ssh2 Dec 29 08:11:02 host sshd[20886]: Received disconnect from 186.228.198.0 port 57860:11: Bye Bye [preauth] Dec 29 08:11:02 host sshd[20886]: Disconnected from 186.228.198.0 port 57860 [preauth] Dec 29 08:11:02 host sshd[20889]: Failed password for invalid user root from 222.232.29.235 port 33646 ssh2 Dec 29 08:11:03 host sshd[20889]: Received disconnect from 222.232.29.235 port 33646:11: Bye Bye [preauth] Dec 29 08:11:03 host sshd[20889]: Disconnected from 222.232.29.235 port 33646 [preauth] Dec 29 08:11:06 host sshd[20907]: User root from 190.64.137.174 not allowed because not listed in AllowUsers Dec 29 08:11:06 host sshd[20907]: input_userauth_request: invalid user root [preauth] Dec 29 08:11:06 host unix_chkpwd[20910]: password check failed for user (root) Dec 29 08:11:06 host sshd[20907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.137.174 user=root Dec 29 08:11:06 host sshd[20907]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 08:11:08 host sshd[20907]: Failed password for invalid user root from 190.64.137.174 port 51366 ssh2 Dec 29 08:11:08 host sshd[20907]: Received disconnect from 190.64.137.174 port 51366:11: Bye Bye [preauth] Dec 29 08:11:08 host sshd[20907]: Disconnected from 190.64.137.174 port 51366 [preauth] Dec 29 08:11:18 host sshd[20982]: Invalid user sc from 115.68.249.165 port 38670 Dec 29 08:11:18 host sshd[20982]: input_userauth_request: invalid user sc [preauth] Dec 29 08:11:18 host sshd[20982]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:11:18 host sshd[20982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.68.249.165 Dec 29 08:11:20 host sshd[20982]: Failed password for invalid user sc from 115.68.249.165 port 38670 ssh2 Dec 29 08:11:20 host sshd[20982]: Received disconnect from 115.68.249.165 port 38670:11: Bye Bye [preauth] Dec 29 08:11:20 host sshd[20982]: Disconnected from 115.68.249.165 port 38670 [preauth] Dec 29 08:11:44 host sshd[21065]: Invalid user mosquitto from 37.59.195.128 port 34890 Dec 29 08:11:44 host sshd[21065]: input_userauth_request: invalid user mosquitto [preauth] Dec 29 08:11:44 host sshd[21065]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:11:44 host sshd[21065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.195.128 Dec 29 08:11:45 host sshd[21065]: Failed password for invalid user mosquitto from 37.59.195.128 port 34890 ssh2 Dec 29 08:11:45 host sshd[21065]: Received disconnect from 37.59.195.128 port 34890:11: Bye Bye [preauth] Dec 29 08:11:45 host sshd[21065]: Disconnected from 37.59.195.128 port 34890 [preauth] Dec 29 08:17:18 host sshd[21830]: Invalid user ek from 45.93.201.90 port 37944 Dec 29 08:17:18 host sshd[21830]: input_userauth_request: invalid user ek [preauth] Dec 29 08:17:18 host sshd[21830]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:17:18 host sshd[21830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 29 08:17:20 host sshd[21830]: Failed password for invalid user ek from 45.93.201.90 port 37944 ssh2 Dec 29 08:17:23 host sshd[21830]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:17:25 host sshd[21830]: Failed password for invalid user ek from 45.93.201.90 port 37944 ssh2 Dec 29 08:17:28 host sshd[21830]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:17:30 host sshd[21830]: Failed password for invalid user ek from 45.93.201.90 port 37944 ssh2 Dec 29 08:17:33 host sshd[21830]: Connection closed by 45.93.201.90 port 37944 [preauth] Dec 29 08:17:33 host sshd[21830]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 29 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 29 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 29 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 29 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 29 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 29 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 08:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 29 08:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 08:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 08:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 29 08:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 08:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 08:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 29 08:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 08:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 08:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 08:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 08:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 08:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 29 08:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 08:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 08:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwresourcehunte user-2=keralaholi user-3=wwwrmswll user-4=ugotscom user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=a2zgroup user-9=dartsimp user-10=wwwkaretakers user-11=cochintaxi user-12=mrsclean user-13=wwwnexidigital user-14=palco123 user-15=gifterman user-16=kottayamcalldriv user-17=phmetals user-18=straightcurve user-19=wwwletsstalkfood user-20=bonifacegroup user-21=wwwevmhonda user-22=pmcresources user-23=vfmassets user-24=shalinijames user-25=wwwtestugo user-26=wwwkapin user-27=woodpeck user-28=disposeat user-29=wwwkmaorg user-30=remysagr feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 29 08:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 29 08:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 08:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 08:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 08:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 08:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 08:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-G1crfQ6HaHm3lhZ3.~ Dec 29 08:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 08:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 08:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-G1crfQ6HaHm3lhZ3.~' Dec 29 08:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 08:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 08:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-G1crfQ6HaHm3lhZ3.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 08:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 08:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 08:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 29 08:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 08:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 29 08:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 08:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 29 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 08:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 08:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 08:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 08:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 08:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 29 08:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 29 08:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 29 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 29 08:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 08:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 29 08:21:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 08:21:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 29 08:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 08:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 08:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 29 08:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 08:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 08:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 29 08:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 08:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 29 08:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 08:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 08:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 29 08:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 08:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 08:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 29 08:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 08:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 08:22:37 host sshd[22958]: User root from 152.32.129.246 not allowed because not listed in AllowUsers Dec 29 08:22:37 host sshd[22958]: input_userauth_request: invalid user root [preauth] Dec 29 08:22:37 host unix_chkpwd[22960]: password check failed for user (root) Dec 29 08:22:37 host sshd[22958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.129.246 user=root Dec 29 08:22:37 host sshd[22958]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 08:22:39 host sshd[22958]: Failed password for invalid user root from 152.32.129.246 port 49294 ssh2 Dec 29 08:22:39 host sshd[22958]: Received disconnect from 152.32.129.246 port 49294:11: Bye Bye [preauth] Dec 29 08:22:39 host sshd[22958]: Disconnected from 152.32.129.246 port 49294 [preauth] Dec 29 08:23:24 host sshd[23032]: User root from 175.126.146.152 not allowed because not listed in AllowUsers Dec 29 08:23:24 host sshd[23032]: input_userauth_request: invalid user root [preauth] Dec 29 08:23:24 host unix_chkpwd[23055]: password check failed for user (root) Dec 29 08:23:24 host sshd[23032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.126.146.152 user=root Dec 29 08:23:24 host sshd[23032]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 08:23:26 host sshd[23032]: Failed password for invalid user root from 175.126.146.152 port 54974 ssh2 Dec 29 08:23:26 host sshd[23032]: Received disconnect from 175.126.146.152 port 54974:11: Bye Bye [preauth] Dec 29 08:23:26 host sshd[23032]: Disconnected from 175.126.146.152 port 54974 [preauth] Dec 29 08:23:50 host sshd[23086]: Invalid user arif from 130.162.42.103 port 26044 Dec 29 08:23:50 host sshd[23086]: input_userauth_request: invalid user arif [preauth] Dec 29 08:23:50 host sshd[23086]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:23:50 host sshd[23086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.162.42.103 Dec 29 08:23:51 host sshd[23086]: Failed password for invalid user arif from 130.162.42.103 port 26044 ssh2 Dec 29 08:23:51 host sshd[23086]: Received disconnect from 130.162.42.103 port 26044:11: Bye Bye [preauth] Dec 29 08:23:51 host sshd[23086]: Disconnected from 130.162.42.103 port 26044 [preauth] Dec 29 08:23:54 host sshd[23091]: Invalid user user1 from 182.48.73.228 port 36506 Dec 29 08:23:54 host sshd[23091]: input_userauth_request: invalid user user1 [preauth] Dec 29 08:23:54 host sshd[23091]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:23:54 host sshd[23091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.48.73.228 Dec 29 08:23:55 host sshd[23091]: Failed password for invalid user user1 from 182.48.73.228 port 36506 ssh2 Dec 29 08:23:56 host sshd[23091]: Received disconnect from 182.48.73.228 port 36506:11: Bye Bye [preauth] Dec 29 08:23:56 host sshd[23091]: Disconnected from 182.48.73.228 port 36506 [preauth] Dec 29 08:24:15 host sshd[23126]: User root from 38.88.67.218 not allowed because not listed in AllowUsers Dec 29 08:24:15 host sshd[23126]: input_userauth_request: invalid user root [preauth] Dec 29 08:24:15 host unix_chkpwd[23129]: password check failed for user (root) Dec 29 08:24:15 host sshd[23126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.88.67.218 user=root Dec 29 08:24:15 host sshd[23126]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 08:24:18 host sshd[23126]: Failed password for invalid user root from 38.88.67.218 port 22737 ssh2 Dec 29 08:24:18 host sshd[23126]: Received disconnect from 38.88.67.218 port 22737:11: Bye Bye [preauth] Dec 29 08:24:18 host sshd[23126]: Disconnected from 38.88.67.218 port 22737 [preauth] Dec 29 08:24:40 host sshd[23208]: Invalid user backend from 138.197.176.228 port 58110 Dec 29 08:24:40 host sshd[23208]: input_userauth_request: invalid user backend [preauth] Dec 29 08:24:40 host sshd[23208]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:24:40 host sshd[23208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.176.228 Dec 29 08:24:43 host sshd[23208]: Failed password for invalid user backend from 138.197.176.228 port 58110 ssh2 Dec 29 08:24:43 host sshd[23208]: Received disconnect from 138.197.176.228 port 58110:11: Bye Bye [preauth] Dec 29 08:24:43 host sshd[23208]: Disconnected from 138.197.176.228 port 58110 [preauth] Dec 29 08:25:25 host sshd[23293]: Invalid user infa from 51.38.38.239 port 33792 Dec 29 08:25:25 host sshd[23293]: input_userauth_request: invalid user infa [preauth] Dec 29 08:25:25 host sshd[23293]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:25:25 host sshd[23293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.38.239 Dec 29 08:25:27 host sshd[23293]: Failed password for invalid user infa from 51.38.38.239 port 33792 ssh2 Dec 29 08:25:28 host sshd[23293]: Received disconnect from 51.38.38.239 port 33792:11: Bye Bye [preauth] Dec 29 08:25:28 host sshd[23293]: Disconnected from 51.38.38.239 port 33792 [preauth] Dec 29 08:26:08 host sshd[23386]: Invalid user Admin from 211.110.1.12 port 33478 Dec 29 08:26:08 host sshd[23386]: input_userauth_request: invalid user Admin [preauth] Dec 29 08:26:08 host sshd[23386]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:26:08 host sshd[23386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.110.1.12 Dec 29 08:26:10 host sshd[23386]: Failed password for invalid user Admin from 211.110.1.12 port 33478 ssh2 Dec 29 08:26:10 host sshd[23386]: Received disconnect from 211.110.1.12 port 33478:11: Bye Bye [preauth] Dec 29 08:26:10 host sshd[23386]: Disconnected from 211.110.1.12 port 33478 [preauth] Dec 29 08:26:26 host sshd[23431]: User root from 85.237.46.4 not allowed because not listed in AllowUsers Dec 29 08:26:26 host sshd[23431]: input_userauth_request: invalid user root [preauth] Dec 29 08:26:26 host unix_chkpwd[23438]: password check failed for user (root) Dec 29 08:26:26 host sshd[23431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.237.46.4 user=root Dec 29 08:26:26 host sshd[23431]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 08:26:28 host sshd[23431]: Failed password for invalid user root from 85.237.46.4 port 42373 ssh2 Dec 29 08:26:29 host sshd[23431]: Received disconnect from 85.237.46.4 port 42373:11: Bye Bye [preauth] Dec 29 08:26:29 host sshd[23431]: Disconnected from 85.237.46.4 port 42373 [preauth] Dec 29 08:27:33 host sshd[23699]: Invalid user demo from 138.197.176.228 port 52270 Dec 29 08:27:33 host sshd[23699]: input_userauth_request: invalid user demo [preauth] Dec 29 08:27:33 host sshd[23699]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:27:33 host sshd[23699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.176.228 Dec 29 08:27:35 host sshd[23699]: Failed password for invalid user demo from 138.197.176.228 port 52270 ssh2 Dec 29 08:27:35 host sshd[23699]: Received disconnect from 138.197.176.228 port 52270:11: Bye Bye [preauth] Dec 29 08:27:35 host sshd[23699]: Disconnected from 138.197.176.228 port 52270 [preauth] Dec 29 08:28:05 host sshd[23768]: User root from 51.38.38.239 not allowed because not listed in AllowUsers Dec 29 08:28:05 host sshd[23768]: input_userauth_request: invalid user root [preauth] Dec 29 08:28:05 host unix_chkpwd[23771]: password check failed for user (root) Dec 29 08:28:05 host sshd[23768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.38.239 user=root Dec 29 08:28:05 host sshd[23768]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 08:28:08 host sshd[23768]: Failed password for invalid user root from 51.38.38.239 port 44140 ssh2 Dec 29 08:28:08 host sshd[23768]: Received disconnect from 51.38.38.239 port 44140:11: Bye Bye [preauth] Dec 29 08:28:08 host sshd[23768]: Disconnected from 51.38.38.239 port 44140 [preauth] Dec 29 08:28:13 host sshd[23822]: Invalid user sun from 130.162.42.103 port 15706 Dec 29 08:28:13 host sshd[23822]: input_userauth_request: invalid user sun [preauth] Dec 29 08:28:13 host sshd[23822]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:28:13 host sshd[23822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.162.42.103 Dec 29 08:28:14 host sshd[23822]: Failed password for invalid user sun from 130.162.42.103 port 15706 ssh2 Dec 29 08:28:15 host sshd[23822]: Received disconnect from 130.162.42.103 port 15706:11: Bye Bye [preauth] Dec 29 08:28:15 host sshd[23822]: Disconnected from 130.162.42.103 port 15706 [preauth] Dec 29 08:28:46 host sshd[23892]: Invalid user test001 from 138.197.176.228 port 34234 Dec 29 08:28:46 host sshd[23892]: input_userauth_request: invalid user test001 [preauth] Dec 29 08:28:46 host sshd[23892]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:28:46 host sshd[23892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.176.228 Dec 29 08:28:48 host sshd[23895]: Invalid user user from 85.237.46.4 port 57892 Dec 29 08:28:48 host sshd[23895]: input_userauth_request: invalid user user [preauth] Dec 29 08:28:48 host sshd[23895]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:28:48 host sshd[23895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.237.46.4 Dec 29 08:28:48 host sshd[23892]: Failed password for invalid user test001 from 138.197.176.228 port 34234 ssh2 Dec 29 08:28:48 host sshd[23892]: Received disconnect from 138.197.176.228 port 34234:11: Bye Bye [preauth] Dec 29 08:28:48 host sshd[23892]: Disconnected from 138.197.176.228 port 34234 [preauth] Dec 29 08:28:50 host sshd[23895]: Failed password for invalid user user from 85.237.46.4 port 57892 ssh2 Dec 29 08:28:51 host sshd[23895]: Received disconnect from 85.237.46.4 port 57892:11: Bye Bye [preauth] Dec 29 08:28:51 host sshd[23895]: Disconnected from 85.237.46.4 port 57892 [preauth] Dec 29 08:28:58 host sshd[23932]: Invalid user db from 152.32.129.246 port 49404 Dec 29 08:28:58 host sshd[23932]: input_userauth_request: invalid user db [preauth] Dec 29 08:28:58 host sshd[23932]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:28:58 host sshd[23932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.129.246 Dec 29 08:28:59 host sshd[23932]: Failed password for invalid user db from 152.32.129.246 port 49404 ssh2 Dec 29 08:29:00 host sshd[23932]: Received disconnect from 152.32.129.246 port 49404:11: Bye Bye [preauth] Dec 29 08:29:00 host sshd[23932]: Disconnected from 152.32.129.246 port 49404 [preauth] Dec 29 08:29:05 host sshd[24024]: Invalid user topgui from 175.126.146.152 port 51978 Dec 29 08:29:05 host sshd[24024]: input_userauth_request: invalid user topgui [preauth] Dec 29 08:29:05 host sshd[24024]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:29:05 host sshd[24024]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.126.146.152 Dec 29 08:29:06 host sshd[24027]: Invalid user user from 162.218.126.136 port 38002 Dec 29 08:29:06 host sshd[24027]: input_userauth_request: invalid user user [preauth] Dec 29 08:29:06 host sshd[24027]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:29:06 host sshd[24027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 29 08:29:07 host sshd[24024]: Failed password for invalid user topgui from 175.126.146.152 port 51978 ssh2 Dec 29 08:29:07 host sshd[24024]: Received disconnect from 175.126.146.152 port 51978:11: Bye Bye [preauth] Dec 29 08:29:07 host sshd[24024]: Disconnected from 175.126.146.152 port 51978 [preauth] Dec 29 08:29:08 host sshd[24027]: Failed password for invalid user user from 162.218.126.136 port 38002 ssh2 Dec 29 08:29:08 host sshd[24027]: Connection closed by 162.218.126.136 port 38002 [preauth] Dec 29 08:29:16 host sshd[24067]: User root from 130.162.42.103 not allowed because not listed in AllowUsers Dec 29 08:29:16 host sshd[24067]: input_userauth_request: invalid user root [preauth] Dec 29 08:29:16 host unix_chkpwd[24070]: password check failed for user (root) Dec 29 08:29:16 host sshd[24067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.162.42.103 user=root Dec 29 08:29:16 host sshd[24067]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 08:29:18 host sshd[24067]: Failed password for invalid user root from 130.162.42.103 port 38974 ssh2 Dec 29 08:29:18 host sshd[24067]: Received disconnect from 130.162.42.103 port 38974:11: Bye Bye [preauth] Dec 29 08:29:18 host sshd[24067]: Disconnected from 130.162.42.103 port 38974 [preauth] Dec 29 08:29:26 host sshd[24143]: Invalid user student from 182.48.73.228 port 59578 Dec 29 08:29:26 host sshd[24143]: input_userauth_request: invalid user student [preauth] Dec 29 08:29:26 host sshd[24143]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:29:26 host sshd[24143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.48.73.228 Dec 29 08:29:27 host sshd[24145]: Invalid user web from 211.110.1.12 port 33624 Dec 29 08:29:27 host sshd[24145]: input_userauth_request: invalid user web [preauth] Dec 29 08:29:27 host sshd[24145]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:29:27 host sshd[24145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.110.1.12 Dec 29 08:29:28 host sshd[24143]: Failed password for invalid user student from 182.48.73.228 port 59578 ssh2 Dec 29 08:29:28 host sshd[24143]: Received disconnect from 182.48.73.228 port 59578:11: Bye Bye [preauth] Dec 29 08:29:28 host sshd[24143]: Disconnected from 182.48.73.228 port 59578 [preauth] Dec 29 08:29:29 host sshd[24145]: Failed password for invalid user web from 211.110.1.12 port 33624 ssh2 Dec 29 08:29:29 host sshd[24145]: Received disconnect from 211.110.1.12 port 33624:11: Bye Bye [preauth] Dec 29 08:29:29 host sshd[24145]: Disconnected from 211.110.1.12 port 33624 [preauth] Dec 29 08:30:43 host sshd[24296]: User root from 38.88.67.218 not allowed because not listed in AllowUsers Dec 29 08:30:43 host sshd[24296]: input_userauth_request: invalid user root [preauth] Dec 29 08:30:43 host unix_chkpwd[24299]: password check failed for user (root) Dec 29 08:30:43 host sshd[24296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.88.67.218 user=root Dec 29 08:30:43 host sshd[24296]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 08:30:45 host sshd[24296]: Failed password for invalid user root from 38.88.67.218 port 16945 ssh2 Dec 29 08:30:51 host sshd[24343]: User tomcat from 211.110.1.12 not allowed because not listed in AllowUsers Dec 29 08:30:51 host sshd[24343]: input_userauth_request: invalid user tomcat [preauth] Dec 29 08:30:51 host unix_chkpwd[24346]: password check failed for user (tomcat) Dec 29 08:30:51 host sshd[24343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.110.1.12 user=tomcat Dec 29 08:30:51 host sshd[24343]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "tomcat" Dec 29 08:30:53 host sshd[24343]: Failed password for invalid user tomcat from 211.110.1.12 port 33722 ssh2 Dec 29 08:30:53 host sshd[24343]: Received disconnect from 211.110.1.12 port 33722:11: Bye Bye [preauth] Dec 29 08:30:53 host sshd[24343]: Disconnected from 211.110.1.12 port 33722 [preauth] Dec 29 08:30:59 host sshd[24396]: Invalid user lingan from 182.48.73.228 port 55660 Dec 29 08:30:59 host sshd[24396]: input_userauth_request: invalid user lingan [preauth] Dec 29 08:30:59 host sshd[24396]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:30:59 host sshd[24396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.48.73.228 Dec 29 08:31:02 host sshd[24396]: Failed password for invalid user lingan from 182.48.73.228 port 55660 ssh2 Dec 29 08:31:02 host sshd[24396]: Received disconnect from 182.48.73.228 port 55660:11: Bye Bye [preauth] Dec 29 08:31:02 host sshd[24396]: Disconnected from 182.48.73.228 port 55660 [preauth] Dec 29 08:31:46 host sshd[24529]: Invalid user pych from 102.216.205.21 port 55851 Dec 29 08:31:46 host sshd[24529]: input_userauth_request: invalid user pych [preauth] Dec 29 08:31:46 host sshd[24529]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:31:46 host sshd[24529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.216.205.21 Dec 29 08:31:48 host sshd[24529]: Failed password for invalid user pych from 102.216.205.21 port 55851 ssh2 Dec 29 08:31:48 host sshd[24529]: Received disconnect from 102.216.205.21 port 55851:11: Bye Bye [preauth] Dec 29 08:31:48 host sshd[24529]: Disconnected from 102.216.205.21 port 55851 [preauth] Dec 29 08:32:59 host sshd[24645]: User root from 200.71.187.92 not allowed because not listed in AllowUsers Dec 29 08:32:59 host sshd[24645]: input_userauth_request: invalid user root [preauth] Dec 29 08:32:59 host unix_chkpwd[24654]: password check failed for user (root) Dec 29 08:32:59 host sshd[24645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.71.187.92 user=root Dec 29 08:32:59 host sshd[24645]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 08:33:01 host sshd[24645]: Failed password for invalid user root from 200.71.187.92 port 41629 ssh2 Dec 29 08:33:02 host sshd[24645]: Received disconnect from 200.71.187.92 port 41629:11: Bye Bye [preauth] Dec 29 08:33:02 host sshd[24645]: Disconnected from 200.71.187.92 port 41629 [preauth] Dec 29 08:38:11 host sshd[25353]: Connection closed by 200.71.187.92 port 33158 [preauth] Dec 29 08:38:28 host sshd[25400]: Did not receive identification string from 1.116.46.30 port 45050 Dec 29 08:38:33 host sshd[25429]: Invalid user discordbot from 1.116.46.30 port 58592 Dec 29 08:38:33 host sshd[25429]: input_userauth_request: invalid user discordbot [preauth] Dec 29 08:38:34 host sshd[25429]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:38:34 host sshd[25429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.116.46.30 Dec 29 08:38:36 host sshd[25429]: Failed password for invalid user discordbot from 1.116.46.30 port 58592 ssh2 Dec 29 08:38:38 host sshd[25427]: User centos from 1.116.46.30 not allowed because not listed in AllowUsers Dec 29 08:38:38 host sshd[25427]: input_userauth_request: invalid user centos [preauth] Dec 29 08:38:39 host sshd[25402]: Invalid user mc from 1.116.46.30 port 58588 Dec 29 08:38:39 host sshd[25402]: input_userauth_request: invalid user mc [preauth] Dec 29 08:38:40 host sshd[25429]: Connection closed by 1.116.46.30 port 58592 [preauth] Dec 29 08:38:41 host sshd[25414]: Invalid user ubuntu from 1.116.46.30 port 58568 Dec 29 08:38:41 host sshd[25414]: input_userauth_request: invalid user ubuntu [preauth] Dec 29 08:38:41 host sshd[25420]: Invalid user elastic from 1.116.46.30 port 58586 Dec 29 08:38:41 host sshd[25420]: input_userauth_request: invalid user elastic [preauth] Dec 29 08:38:41 host sshd[25414]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:38:41 host sshd[25414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.116.46.30 Dec 29 08:38:43 host unix_chkpwd[25461]: password check failed for user (centos) Dec 29 08:38:43 host sshd[25427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.116.46.30 user=centos Dec 29 08:38:44 host sshd[25414]: Failed password for invalid user ubuntu from 1.116.46.30 port 58568 ssh2 Dec 29 08:38:44 host sshd[25420]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:38:44 host sshd[25420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.116.46.30 Dec 29 08:38:44 host sshd[25427]: Failed password for invalid user centos from 1.116.46.30 port 58620 ssh2 Dec 29 08:38:46 host sshd[25420]: Failed password for invalid user elastic from 1.116.46.30 port 58586 ssh2 Dec 29 08:42:01 host sshd[25983]: Connection closed by 200.71.187.92 port 45201 [preauth] Dec 29 08:43:38 host sshd[26223]: Invalid user jose from 43.153.20.100 port 38274 Dec 29 08:43:38 host sshd[26223]: input_userauth_request: invalid user jose [preauth] Dec 29 08:43:38 host sshd[26223]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:43:38 host sshd[26223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.20.100 Dec 29 08:43:39 host sshd[26230]: Invalid user css from 102.216.205.21 port 54187 Dec 29 08:43:39 host sshd[26230]: input_userauth_request: invalid user css [preauth] Dec 29 08:43:39 host sshd[26230]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:43:39 host sshd[26230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.216.205.21 Dec 29 08:43:40 host sshd[26223]: Failed password for invalid user jose from 43.153.20.100 port 38274 ssh2 Dec 29 08:43:40 host sshd[26223]: Received disconnect from 43.153.20.100 port 38274:11: Bye Bye [preauth] Dec 29 08:43:40 host sshd[26223]: Disconnected from 43.153.20.100 port 38274 [preauth] Dec 29 08:43:41 host sshd[26230]: Failed password for invalid user css from 102.216.205.21 port 54187 ssh2 Dec 29 08:43:41 host sshd[26230]: Received disconnect from 102.216.205.21 port 54187:11: Bye Bye [preauth] Dec 29 08:43:41 host sshd[26230]: Disconnected from 102.216.205.21 port 54187 [preauth] Dec 29 08:44:52 host sshd[26526]: Invalid user git from 89.22.67.66 port 37856 Dec 29 08:44:52 host sshd[26526]: input_userauth_request: invalid user git [preauth] Dec 29 08:44:52 host sshd[26526]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:44:52 host sshd[26526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.22.67.66 Dec 29 08:44:53 host sshd[26526]: Failed password for invalid user git from 89.22.67.66 port 37856 ssh2 Dec 29 08:44:53 host sshd[26526]: Received disconnect from 89.22.67.66 port 37856:11: Bye Bye [preauth] Dec 29 08:44:53 host sshd[26526]: Disconnected from 89.22.67.66 port 37856 [preauth] Dec 29 08:45:47 host sshd[26650]: Connection closed by 200.71.187.92 port 57245 [preauth] Dec 29 08:45:58 host sshd[26668]: Invalid user tyler from 89.252.131.62 port 54022 Dec 29 08:45:58 host sshd[26668]: input_userauth_request: invalid user tyler [preauth] Dec 29 08:45:58 host sshd[26668]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:45:58 host sshd[26668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.252.131.62 Dec 29 08:45:59 host sshd[26668]: Failed password for invalid user tyler from 89.252.131.62 port 54022 ssh2 Dec 29 08:46:00 host sshd[26668]: Received disconnect from 89.252.131.62 port 54022:11: Bye Bye [preauth] Dec 29 08:46:00 host sshd[26668]: Disconnected from 89.252.131.62 port 54022 [preauth] Dec 29 08:46:47 host sshd[26799]: Invalid user tester from 102.216.205.21 port 40538 Dec 29 08:46:47 host sshd[26799]: input_userauth_request: invalid user tester [preauth] Dec 29 08:46:47 host sshd[26799]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:46:47 host sshd[26799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.216.205.21 Dec 29 08:46:48 host sshd[26799]: Failed password for invalid user tester from 102.216.205.21 port 40538 ssh2 Dec 29 08:46:49 host sshd[26799]: Received disconnect from 102.216.205.21 port 40538:11: Bye Bye [preauth] Dec 29 08:46:49 host sshd[26799]: Disconnected from 102.216.205.21 port 40538 [preauth] Dec 29 08:47:45 host sshd[26946]: Invalid user test from 43.153.20.100 port 58848 Dec 29 08:47:45 host sshd[26946]: input_userauth_request: invalid user test [preauth] Dec 29 08:47:45 host sshd[26946]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:47:45 host sshd[26946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.20.100 Dec 29 08:47:47 host sshd[26946]: Failed password for invalid user test from 43.153.20.100 port 58848 ssh2 Dec 29 08:47:48 host sshd[26946]: Received disconnect from 43.153.20.100 port 58848:11: Bye Bye [preauth] Dec 29 08:47:48 host sshd[26946]: Disconnected from 43.153.20.100 port 58848 [preauth] Dec 29 08:48:34 host sshd[27049]: Invalid user guest from 89.22.67.66 port 50220 Dec 29 08:48:34 host sshd[27049]: input_userauth_request: invalid user guest [preauth] Dec 29 08:48:34 host sshd[27049]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:48:34 host sshd[27049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.22.67.66 Dec 29 08:48:36 host sshd[27049]: Failed password for invalid user guest from 89.22.67.66 port 50220 ssh2 Dec 29 08:48:36 host sshd[27049]: Received disconnect from 89.22.67.66 port 50220:11: Bye Bye [preauth] Dec 29 08:48:36 host sshd[27049]: Disconnected from 89.22.67.66 port 50220 [preauth] Dec 29 08:48:47 host sshd[27073]: User root from 89.252.131.62 not allowed because not listed in AllowUsers Dec 29 08:48:47 host sshd[27073]: input_userauth_request: invalid user root [preauth] Dec 29 08:48:47 host unix_chkpwd[27076]: password check failed for user (root) Dec 29 08:48:47 host sshd[27073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.252.131.62 user=root Dec 29 08:48:47 host sshd[27073]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 08:48:49 host sshd[27073]: Failed password for invalid user root from 89.252.131.62 port 60142 ssh2 Dec 29 08:48:49 host sshd[27073]: Received disconnect from 89.252.131.62 port 60142:11: Bye Bye [preauth] Dec 29 08:48:49 host sshd[27073]: Disconnected from 89.252.131.62 port 60142 [preauth] Dec 29 08:49:00 host sshd[27182]: User root from 43.153.20.100 not allowed because not listed in AllowUsers Dec 29 08:49:00 host sshd[27182]: input_userauth_request: invalid user root [preauth] Dec 29 08:49:00 host unix_chkpwd[27223]: password check failed for user (root) Dec 29 08:49:00 host sshd[27182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.20.100 user=root Dec 29 08:49:00 host sshd[27182]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 08:49:02 host sshd[27182]: Failed password for invalid user root from 43.153.20.100 port 59218 ssh2 Dec 29 08:49:02 host sshd[27182]: Received disconnect from 43.153.20.100 port 59218:11: Bye Bye [preauth] Dec 29 08:49:02 host sshd[27182]: Disconnected from 43.153.20.100 port 59218 [preauth] Dec 29 08:49:05 host sshd[27247]: Invalid user xhl from 41.197.31.178 port 56454 Dec 29 08:49:05 host sshd[27247]: input_userauth_request: invalid user xhl [preauth] Dec 29 08:49:05 host sshd[27247]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:49:05 host sshd[27247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 29 08:49:08 host sshd[27247]: Failed password for invalid user xhl from 41.197.31.178 port 56454 ssh2 Dec 29 08:49:08 host sshd[27247]: Connection closed by 41.197.31.178 port 56454 [preauth] Dec 29 08:49:32 host sshd[27320]: Connection closed by 200.71.187.92 port 41062 [preauth] Dec 29 08:49:48 host sshd[27351]: User root from 89.22.67.66 not allowed because not listed in AllowUsers Dec 29 08:49:48 host sshd[27351]: input_userauth_request: invalid user root [preauth] Dec 29 08:49:48 host unix_chkpwd[27354]: password check failed for user (root) Dec 29 08:49:48 host sshd[27351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.22.67.66 user=root Dec 29 08:49:48 host sshd[27351]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 08:49:51 host sshd[27351]: Failed password for invalid user root from 89.22.67.66 port 45964 ssh2 Dec 29 08:51:42 host sshd[27617]: Invalid user user1 from 103.13.40.2 port 44118 Dec 29 08:51:42 host sshd[27617]: input_userauth_request: invalid user user1 [preauth] Dec 29 08:51:42 host sshd[27617]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:51:42 host sshd[27617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 29 08:51:44 host sshd[27617]: Failed password for invalid user user1 from 103.13.40.2 port 44118 ssh2 Dec 29 08:51:44 host sshd[27617]: Connection closed by 103.13.40.2 port 44118 [preauth] Dec 29 08:53:15 host sshd[27766]: User root from 200.71.187.92 not allowed because not listed in AllowUsers Dec 29 08:53:15 host sshd[27766]: input_userauth_request: invalid user root [preauth] Dec 29 08:53:15 host unix_chkpwd[27772]: password check failed for user (root) Dec 29 08:53:15 host sshd[27766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.71.187.92 user=root Dec 29 08:53:15 host sshd[27766]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 08:53:17 host sshd[27766]: Failed password for invalid user root from 200.71.187.92 port 53106 ssh2 Dec 29 08:53:18 host sshd[27766]: Received disconnect from 200.71.187.92 port 53106:11: Bye Bye [preauth] Dec 29 08:53:18 host sshd[27766]: Disconnected from 200.71.187.92 port 53106 [preauth] Dec 29 08:55:40 host sshd[28245]: User root from 92.46.108.20 not allowed because not listed in AllowUsers Dec 29 08:55:40 host sshd[28245]: input_userauth_request: invalid user root [preauth] Dec 29 08:55:41 host unix_chkpwd[28252]: password check failed for user (root) Dec 29 08:55:41 host sshd[28245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 user=root Dec 29 08:55:41 host sshd[28245]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 08:55:43 host sshd[28245]: Failed password for invalid user root from 92.46.108.20 port 46598 ssh2 Dec 29 08:55:43 host sshd[28245]: Connection closed by 92.46.108.20 port 46598 [preauth] Dec 29 08:58:17 host sshd[28679]: Invalid user test from 106.10.122.53 port 36360 Dec 29 08:58:17 host sshd[28679]: input_userauth_request: invalid user test [preauth] Dec 29 08:58:18 host sshd[28679]: pam_unix(sshd:auth): check pass; user unknown Dec 29 08:58:18 host sshd[28679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 29 08:58:19 host sshd[28679]: Failed password for invalid user test from 106.10.122.53 port 36360 ssh2 Dec 29 08:58:20 host sshd[28679]: Connection closed by 106.10.122.53 port 36360 [preauth] Dec 29 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 29 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 29 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 29 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 29 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 09:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 29 09:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 09:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 09:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 29 09:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 09:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 09:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 29 09:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 09:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 09:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 29 09:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 09:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 09:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 09:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 09:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 09:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 29 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=a2zgroup user-3=dartsimp user-4=wwwkaretakers user-5=cochintaxi user-6=ugotscom user-7=keralaholi user-8=wwwresourcehunte user-9=wwwrmswll user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=shalinijames user-14=wwwtestugo user-15=vfmassets user-16=woodpeck user-17=wwwkapin user-18=disposeat user-19=wwwkmaorg user-20=remysagr user-21=mrsclean user-22=wwwnexidigital user-23=kottayamcalldriv user-24=phmetals user-25=palco123 user-26=gifterman user-27=straightcurve user-28=wwwletsstalkfood user-29=wwwevmhonda user-30=bonifacegroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 29 09:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 29 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-borb1WXPe6O4SD01.~ Dec 29 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-borb1WXPe6O4SD01.~' Dec 29 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-borb1WXPe6O4SD01.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 29 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 29 09:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 09:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 09:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 09:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 09:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 09:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 09:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 09:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 09:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 09:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 09:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 09:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 29 09:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 09:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 09:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 09:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 29 09:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 29 09:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 29 09:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 29 09:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 09:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 09:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 29 09:21:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 09:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 09:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 29 09:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 09:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 29 09:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 09:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 29 09:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 09:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 09:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 29 09:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 09:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 09:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 29 09:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 09:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 09:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 29 09:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 09:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 09:28:19 host sshd[2127]: User root from 2.45.191.223 not allowed because not listed in AllowUsers Dec 29 09:28:19 host sshd[2127]: input_userauth_request: invalid user root [preauth] Dec 29 09:28:19 host unix_chkpwd[2130]: password check failed for user (root) Dec 29 09:28:19 host sshd[2127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.45.191.223 user=root Dec 29 09:28:19 host sshd[2127]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 09:28:22 host sshd[2127]: Failed password for invalid user root from 2.45.191.223 port 39760 ssh2 Dec 29 09:28:22 host sshd[2127]: Received disconnect from 2.45.191.223 port 39760:11: Bye Bye [preauth] Dec 29 09:28:22 host sshd[2127]: Disconnected from 2.45.191.223 port 39760 [preauth] Dec 29 09:33:36 host sshd[2897]: User root from 2.45.191.223 not allowed because not listed in AllowUsers Dec 29 09:33:36 host sshd[2897]: input_userauth_request: invalid user root [preauth] Dec 29 09:33:36 host unix_chkpwd[2905]: password check failed for user (root) Dec 29 09:33:36 host sshd[2897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.45.191.223 user=root Dec 29 09:33:36 host sshd[2897]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 09:33:38 host sshd[2897]: Failed password for invalid user root from 2.45.191.223 port 36857 ssh2 Dec 29 09:33:38 host sshd[2897]: Received disconnect from 2.45.191.223 port 36857:11: Bye Bye [preauth] Dec 29 09:33:38 host sshd[2897]: Disconnected from 2.45.191.223 port 36857 [preauth] Dec 29 09:37:48 host sshd[3578]: Invalid user user1 from 162.218.126.136 port 40224 Dec 29 09:37:48 host sshd[3578]: input_userauth_request: invalid user user1 [preauth] Dec 29 09:37:48 host sshd[3578]: pam_unix(sshd:auth): check pass; user unknown Dec 29 09:37:48 host sshd[3578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 29 09:37:50 host sshd[3578]: Failed password for invalid user user1 from 162.218.126.136 port 40224 ssh2 Dec 29 09:37:50 host sshd[3578]: Connection closed by 162.218.126.136 port 40224 [preauth] Dec 29 09:40:03 host sshd[3959]: Invalid user developer from 93.104.60.6 port 20750 Dec 29 09:40:03 host sshd[3959]: input_userauth_request: invalid user developer [preauth] Dec 29 09:40:03 host sshd[3959]: pam_unix(sshd:auth): check pass; user unknown Dec 29 09:40:03 host sshd[3959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.104.60.6 Dec 29 09:40:05 host sshd[3959]: Failed password for invalid user developer from 93.104.60.6 port 20750 ssh2 Dec 29 09:40:05 host sshd[3959]: Received disconnect from 93.104.60.6 port 20750:11: Bye Bye [preauth] Dec 29 09:40:05 host sshd[3959]: Disconnected from 93.104.60.6 port 20750 [preauth] Dec 29 09:43:15 host sshd[4333]: Invalid user avahi from 104.244.74.6 port 57406 Dec 29 09:43:15 host sshd[4333]: input_userauth_request: invalid user avahi [preauth] Dec 29 09:43:15 host sshd[4333]: pam_unix(sshd:auth): check pass; user unknown Dec 29 09:43:15 host sshd[4333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Dec 29 09:43:17 host sshd[4333]: Failed password for invalid user avahi from 104.244.74.6 port 57406 ssh2 Dec 29 09:43:17 host sshd[4333]: Connection closed by 104.244.74.6 port 57406 [preauth] Dec 29 09:43:41 host sshd[4403]: Invalid user test from 93.104.60.6 port 15077 Dec 29 09:43:41 host sshd[4403]: input_userauth_request: invalid user test [preauth] Dec 29 09:43:41 host sshd[4403]: pam_unix(sshd:auth): check pass; user unknown Dec 29 09:43:41 host sshd[4403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.104.60.6 Dec 29 09:43:43 host sshd[4403]: Failed password for invalid user test from 93.104.60.6 port 15077 ssh2 Dec 29 09:43:43 host sshd[4403]: Received disconnect from 93.104.60.6 port 15077:11: Bye Bye [preauth] Dec 29 09:43:43 host sshd[4403]: Disconnected from 93.104.60.6 port 15077 [preauth] Dec 29 09:46:07 host sshd[4836]: User root from 93.104.60.6 not allowed because not listed in AllowUsers Dec 29 09:46:07 host sshd[4836]: input_userauth_request: invalid user root [preauth] Dec 29 09:46:07 host unix_chkpwd[4839]: password check failed for user (root) Dec 29 09:46:07 host sshd[4836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.104.60.6 user=root Dec 29 09:46:07 host sshd[4836]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 09:46:09 host sshd[4836]: Failed password for invalid user root from 93.104.60.6 port 61491 ssh2 Dec 29 09:46:09 host sshd[4836]: Received disconnect from 93.104.60.6 port 61491:11: Bye Bye [preauth] Dec 29 09:46:09 host sshd[4836]: Disconnected from 93.104.60.6 port 61491 [preauth] Dec 29 10:00:07 host sshd[6879]: Invalid user el from 45.93.201.90 port 58560 Dec 29 10:00:07 host sshd[6879]: input_userauth_request: invalid user el [preauth] Dec 29 10:00:07 host sshd[6879]: pam_unix(sshd:auth): check pass; user unknown Dec 29 10:00:07 host sshd[6879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 29 10:00:09 host sshd[6879]: Failed password for invalid user el from 45.93.201.90 port 58560 ssh2 Dec 29 10:00:12 host sshd[6879]: pam_unix(sshd:auth): check pass; user unknown Dec 29 10:00:15 host sshd[6879]: Failed password for invalid user el from 45.93.201.90 port 58560 ssh2 Dec 29 10:00:18 host sshd[6879]: pam_unix(sshd:auth): check pass; user unknown Dec 29 10:00:20 host sshd[6879]: Failed password for invalid user el from 45.93.201.90 port 58560 ssh2 Dec 29 10:00:23 host sshd[6879]: Connection closed by 45.93.201.90 port 58560 [preauth] Dec 29 10:00:23 host sshd[6879]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 29 10:02:21 host sshd[7285]: User root from 41.72.219.102 not allowed because not listed in AllowUsers Dec 29 10:02:21 host sshd[7285]: input_userauth_request: invalid user root [preauth] Dec 29 10:02:21 host unix_chkpwd[7288]: password check failed for user (root) Dec 29 10:02:21 host sshd[7285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.72.219.102 user=root Dec 29 10:02:21 host sshd[7285]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 10:02:23 host sshd[7285]: Failed password for invalid user root from 41.72.219.102 port 58756 ssh2 Dec 29 10:02:23 host sshd[7285]: Received disconnect from 41.72.219.102 port 58756:11: Bye Bye [preauth] Dec 29 10:02:23 host sshd[7285]: Disconnected from 41.72.219.102 port 58756 [preauth] Dec 29 10:03:52 host sshd[7452]: Invalid user postgres from 43.156.38.83 port 59904 Dec 29 10:03:52 host sshd[7452]: input_userauth_request: invalid user postgres [preauth] Dec 29 10:03:52 host sshd[7452]: pam_unix(sshd:auth): check pass; user unknown Dec 29 10:03:52 host sshd[7452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.38.83 Dec 29 10:03:54 host sshd[7452]: Failed password for invalid user postgres from 43.156.38.83 port 59904 ssh2 Dec 29 10:03:54 host sshd[7452]: Received disconnect from 43.156.38.83 port 59904:11: Bye Bye [preauth] Dec 29 10:03:54 host sshd[7452]: Disconnected from 43.156.38.83 port 59904 [preauth] Dec 29 10:05:36 host sshd[7680]: Invalid user lxy from 43.156.38.83 port 57906 Dec 29 10:05:36 host sshd[7680]: input_userauth_request: invalid user lxy [preauth] Dec 29 10:05:36 host sshd[7680]: pam_unix(sshd:auth): check pass; user unknown Dec 29 10:05:36 host sshd[7680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.38.83 Dec 29 10:05:38 host sshd[7680]: Failed password for invalid user lxy from 43.156.38.83 port 57906 ssh2 Dec 29 10:05:38 host sshd[7680]: Received disconnect from 43.156.38.83 port 57906:11: Bye Bye [preauth] Dec 29 10:05:38 host sshd[7680]: Disconnected from 43.156.38.83 port 57906 [preauth] Dec 29 10:06:15 host sshd[7760]: User root from 41.72.219.102 not allowed because not listed in AllowUsers Dec 29 10:06:15 host sshd[7760]: input_userauth_request: invalid user root [preauth] Dec 29 10:06:15 host unix_chkpwd[7773]: password check failed for user (root) Dec 29 10:06:15 host sshd[7760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.72.219.102 user=root Dec 29 10:06:15 host sshd[7760]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 10:06:17 host sshd[7760]: Failed password for invalid user root from 41.72.219.102 port 40670 ssh2 Dec 29 10:06:17 host sshd[7760]: Received disconnect from 41.72.219.102 port 40670:11: Bye Bye [preauth] Dec 29 10:06:17 host sshd[7760]: Disconnected from 41.72.219.102 port 40670 [preauth] Dec 29 10:06:53 host sshd[7958]: User root from 43.156.38.83 not allowed because not listed in AllowUsers Dec 29 10:06:53 host sshd[7958]: input_userauth_request: invalid user root [preauth] Dec 29 10:06:53 host unix_chkpwd[7960]: password check failed for user (root) Dec 29 10:06:53 host sshd[7958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.38.83 user=root Dec 29 10:06:53 host sshd[7958]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 10:06:55 host sshd[7958]: Failed password for invalid user root from 43.156.38.83 port 53428 ssh2 Dec 29 10:06:55 host sshd[7958]: Received disconnect from 43.156.38.83 port 53428:11: Bye Bye [preauth] Dec 29 10:06:55 host sshd[7958]: Disconnected from 43.156.38.83 port 53428 [preauth] Dec 29 10:18:48 host sshd[9646]: Invalid user user1 from 103.13.40.2 port 37002 Dec 29 10:18:48 host sshd[9646]: input_userauth_request: invalid user user1 [preauth] Dec 29 10:18:48 host sshd[9646]: pam_unix(sshd:auth): check pass; user unknown Dec 29 10:18:48 host sshd[9646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 29 10:18:50 host sshd[9646]: Failed password for invalid user user1 from 103.13.40.2 port 37002 ssh2 Dec 29 10:18:50 host sshd[9646]: Connection closed by 103.13.40.2 port 37002 [preauth] Dec 29 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 10:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 10:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 10:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 29 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 10:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 29 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 10:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 29 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 10:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 10:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 29 10:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 10:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 10:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 29 10:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 10:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 10:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 29 10:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 10:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 10:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 29 10:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 10:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 10:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 29 10:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 10:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 29 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwnexidigital user-2=mrsclean user-3=palco123 user-4=gifterman user-5=phmetals user-6=kottayamcalldriv user-7=straightcurve user-8=wwwletsstalkfood user-9=bonifacegroup user-10=wwwevmhonda user-11=pmcresources user-12=vfmassets user-13=shalinijames user-14=wwwtestugo user-15=wwwkapin user-16=woodpeck user-17=disposeat user-18=wwwkmaorg user-19=remysagr user-20=keralaholi user-21=wwwresourcehunte user-22=wwwrmswll user-23=ugotscom user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=a2zgroup user-28=dartsimp user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 29 10:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 29 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-5HQCoPcfGW7RqQhW.~ Dec 29 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-5HQCoPcfGW7RqQhW.~' Dec 29 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-5HQCoPcfGW7RqQhW.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 29 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 29 10:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 10:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 10:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 10:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 10:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 10:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 10:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 10:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 10:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 10:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 10:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 10:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 29 10:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 10:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 10:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 10:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 10:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 10:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 29 10:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 29 10:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 29 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 29 10:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 10:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 29 10:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 10:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 10:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 29 10:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 10:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 29 10:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 10:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 29 10:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 10:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 10:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 29 10:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 10:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 10:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 29 10:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 10:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 10:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 29 10:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 10:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 10:24:58 host sshd[10745]: Invalid user user from 106.10.122.53 port 44253 Dec 29 10:24:58 host sshd[10745]: input_userauth_request: invalid user user [preauth] Dec 29 10:24:58 host sshd[10745]: pam_unix(sshd:auth): check pass; user unknown Dec 29 10:24:58 host sshd[10745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 29 10:25:00 host sshd[10745]: Failed password for invalid user user from 106.10.122.53 port 44253 ssh2 Dec 29 10:25:00 host sshd[10745]: Connection closed by 106.10.122.53 port 44253 [preauth] Dec 29 10:36:14 host sshd[12446]: Invalid user user from 41.197.31.178 port 53772 Dec 29 10:36:14 host sshd[12446]: input_userauth_request: invalid user user [preauth] Dec 29 10:36:15 host sshd[12446]: pam_unix(sshd:auth): check pass; user unknown Dec 29 10:36:15 host sshd[12446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 29 10:36:16 host sshd[12446]: Failed password for invalid user user from 41.197.31.178 port 53772 ssh2 Dec 29 10:36:17 host sshd[12446]: Connection closed by 41.197.31.178 port 53772 [preauth] Dec 29 10:38:44 host sshd[12832]: Did not receive identification string from 178.88.161.82 port 37906 Dec 29 10:38:45 host sshd[12833]: Invalid user test from 178.88.161.82 port 38254 Dec 29 10:38:45 host sshd[12833]: input_userauth_request: invalid user test [preauth] Dec 29 10:38:45 host sshd[12834]: Invalid user web from 178.88.161.82 port 38052 Dec 29 10:38:45 host sshd[12834]: input_userauth_request: invalid user web [preauth] Dec 29 10:38:45 host sshd[12836]: Invalid user ansadmin from 178.88.161.82 port 37988 Dec 29 10:38:45 host sshd[12836]: input_userauth_request: invalid user ansadmin [preauth] Dec 29 10:38:45 host sshd[12835]: User mysql from 178.88.161.82 not allowed because not listed in AllowUsers Dec 29 10:38:45 host sshd[12835]: input_userauth_request: invalid user mysql [preauth] Dec 29 10:38:45 host sshd[12841]: Invalid user steam from 178.88.161.82 port 38224 Dec 29 10:38:45 host sshd[12841]: input_userauth_request: invalid user steam [preauth] Dec 29 10:38:45 host sshd[12839]: Invalid user guest from 178.88.161.82 port 38172 Dec 29 10:38:45 host sshd[12839]: input_userauth_request: invalid user guest [preauth] Dec 29 10:38:45 host sshd[12837]: Invalid user postgres from 178.88.161.82 port 38066 Dec 29 10:38:45 host sshd[12843]: Invalid user steam from 178.88.161.82 port 38012 Dec 29 10:38:45 host sshd[12837]: input_userauth_request: invalid user postgres [preauth] Dec 29 10:38:45 host sshd[12838]: Invalid user moxa from 178.88.161.82 port 38252 Dec 29 10:38:45 host sshd[12843]: input_userauth_request: invalid user steam [preauth] Dec 29 10:38:45 host sshd[12838]: input_userauth_request: invalid user moxa [preauth] Dec 29 10:38:45 host sshd[12846]: Invalid user ftpuser from 178.88.161.82 port 38210 Dec 29 10:38:45 host sshd[12845]: Invalid user posiflex from 178.88.161.82 port 38230 Dec 29 10:38:45 host sshd[12846]: input_userauth_request: invalid user ftpuser [preauth] Dec 29 10:38:45 host sshd[12845]: input_userauth_request: invalid user posiflex [preauth] Dec 29 10:38:45 host sshd[12840]: Invalid user test from 178.88.161.82 port 38190 Dec 29 10:38:45 host sshd[12840]: input_userauth_request: invalid user test [preauth] Dec 29 10:38:45 host sshd[12847]: Invalid user ftpuser from 178.88.161.82 port 37996 Dec 29 10:38:45 host sshd[12847]: input_userauth_request: invalid user ftpuser [preauth] Dec 29 10:38:45 host sshd[12848]: Invalid user ec2-user from 178.88.161.82 port 38228 Dec 29 10:38:45 host sshd[12853]: Invalid user ec2-user from 178.88.161.82 port 38196 Dec 29 10:38:45 host sshd[12853]: input_userauth_request: invalid user ec2-user [preauth] Dec 29 10:38:45 host sshd[12844]: Invalid user ftpuser from 178.88.161.82 port 38188 Dec 29 10:38:45 host sshd[12856]: Invalid user devops from 178.88.161.82 port 38150 Dec 29 10:38:45 host sshd[12844]: input_userauth_request: invalid user ftpuser [preauth] Dec 29 10:38:45 host sshd[12856]: input_userauth_request: invalid user devops [preauth] Dec 29 10:38:45 host sshd[12848]: input_userauth_request: invalid user ec2-user [preauth] Dec 29 10:38:45 host sshd[12857]: Invalid user posiflex from 178.88.161.82 port 38004 Dec 29 10:38:45 host sshd[12857]: input_userauth_request: invalid user posiflex [preauth] Dec 29 10:38:45 host sshd[12860]: User centos from 178.88.161.82 not allowed because not listed in AllowUsers Dec 29 10:38:45 host sshd[12860]: input_userauth_request: invalid user centos [preauth] Dec 29 10:38:45 host sshd[12854]: Invalid user hadoop from 178.88.161.82 port 38186 Dec 29 10:38:45 host sshd[12849]: Invalid user tester from 178.88.161.82 port 38102 Dec 29 10:38:45 host sshd[12849]: input_userauth_request: invalid user tester [preauth] Dec 29 10:38:45 host sshd[12854]: input_userauth_request: invalid user hadoop [preauth] Dec 29 10:38:45 host sshd[12861]: Invalid user oracle from 178.88.161.82 port 38010 Dec 29 10:38:45 host sshd[12861]: input_userauth_request: invalid user oracle [preauth] Dec 29 10:38:45 host sshd[12852]: Invalid user linux from 178.88.161.82 port 37920 Dec 29 10:38:45 host sshd[12852]: input_userauth_request: invalid user linux [preauth] Dec 29 10:38:45 host sshd[12855]: Invalid user ftpuser from 178.88.161.82 port 38166 Dec 29 10:38:45 host sshd[12855]: input_userauth_request: invalid user ftpuser [preauth] Dec 29 10:38:45 host sshd[12859]: Invalid user guest from 178.88.161.82 port 37992 Dec 29 10:38:45 host sshd[12859]: input_userauth_request: invalid user guest [preauth] Dec 29 10:38:45 host sshd[12858]: Invalid user dockeradmin from 178.88.161.82 port 37944 Dec 29 10:38:45 host sshd[12858]: input_userauth_request: invalid user dockeradmin [preauth] Dec 29 10:38:45 host sshd[12864]: Invalid user ubuntu from 178.88.161.82 port 38204 Dec 29 10:38:45 host sshd[12864]: input_userauth_request: invalid user ubuntu [preauth] Dec 29 10:38:45 host sshd[12862]: User mysql from 178.88.161.82 not allowed because not listed in AllowUsers Dec 29 10:38:45 host sshd[12862]: input_userauth_request: invalid user mysql [preauth] Dec 29 10:38:45 host sshd[12863]: Invalid user bot from 178.88.161.82 port 38094 Dec 29 10:38:45 host sshd[12863]: input_userauth_request: invalid user bot [preauth] Dec 29 10:38:45 host sshd[12833]: pam_unix(sshd:auth): check pass; user unknown Dec 29 10:38:45 host sshd[12833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 29 10:38:45 host sshd[12836]: pam_unix(sshd:auth): check pass; user unknown Dec 29 10:38:45 host sshd[12836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 29 10:38:45 host sshd[12841]: pam_unix(sshd:auth): check pass; user unknown Dec 29 10:38:45 host sshd[12841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 29 10:38:45 host sshd[12834]: pam_unix(sshd:auth): check pass; user unknown Dec 29 10:38:45 host sshd[12834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 29 10:38:45 host sshd[12837]: pam_unix(sshd:auth): check pass; user unknown Dec 29 10:38:45 host sshd[12837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 29 10:38:45 host unix_chkpwd[12892]: password check failed for user (mysql) Dec 29 10:38:45 host sshd[12835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 user=mysql Dec 29 10:38:45 host sshd[12835]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql" Dec 29 10:38:45 host sshd[12839]: pam_unix(sshd:auth): check pass; user unknown Dec 29 10:38:45 host sshd[12839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 29 10:38:45 host sshd[12846]: pam_unix(sshd:auth): check pass; user unknown Dec 29 10:38:45 host sshd[12846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 29 10:38:45 host sshd[12838]: pam_unix(sshd:auth): check pass; user unknown Dec 29 10:38:45 host sshd[12838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 29 10:38:45 host sshd[12843]: pam_unix(sshd:auth): check pass; user unknown Dec 29 10:38:45 host sshd[12843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 29 10:38:45 host sshd[12844]: pam_unix(sshd:auth): check pass; user unknown Dec 29 10:38:45 host sshd[12844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 29 10:38:45 host sshd[12840]: pam_unix(sshd:auth): check pass; user unknown Dec 29 10:38:45 host sshd[12840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 29 10:38:45 host sshd[12854]: pam_unix(sshd:auth): check pass; user unknown Dec 29 10:38:45 host sshd[12854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 29 10:38:45 host sshd[12845]: pam_unix(sshd:auth): check pass; user unknown Dec 29 10:38:45 host sshd[12845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 29 10:38:45 host sshd[12847]: pam_unix(sshd:auth): check pass; user unknown Dec 29 10:38:45 host sshd[12849]: pam_unix(sshd:auth): check pass; user unknown Dec 29 10:38:45 host sshd[12847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 29 10:38:45 host sshd[12849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 29 10:38:45 host unix_chkpwd[12893]: password check failed for user (centos) Dec 29 10:38:45 host sshd[12860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 user=centos Dec 29 10:38:45 host sshd[12848]: pam_unix(sshd:auth): check pass; user unknown Dec 29 10:38:45 host sshd[12848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 29 10:38:45 host sshd[12853]: pam_unix(sshd:auth): check pass; user unknown Dec 29 10:38:45 host sshd[12853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 29 10:38:45 host sshd[12856]: pam_unix(sshd:auth): check pass; user unknown Dec 29 10:38:45 host sshd[12856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 29 10:38:45 host sshd[12857]: pam_unix(sshd:auth): check pass; user unknown Dec 29 10:38:45 host sshd[12857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 29 10:38:45 host sshd[12852]: pam_unix(sshd:auth): check pass; user unknown Dec 29 10:38:45 host sshd[12852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 29 10:38:45 host sshd[12861]: pam_unix(sshd:auth): check pass; user unknown Dec 29 10:38:45 host sshd[12861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 29 10:38:45 host sshd[12855]: pam_unix(sshd:auth): check pass; user unknown Dec 29 10:38:45 host sshd[12855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 29 10:38:45 host sshd[12858]: pam_unix(sshd:auth): check pass; user unknown Dec 29 10:38:45 host sshd[12858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 29 10:38:45 host sshd[12864]: pam_unix(sshd:auth): check pass; user unknown Dec 29 10:38:45 host sshd[12864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 29 10:38:45 host sshd[12859]: pam_unix(sshd:auth): check pass; user unknown Dec 29 10:38:45 host sshd[12859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 29 10:38:45 host unix_chkpwd[12894]: password check failed for user (mysql) Dec 29 10:38:45 host sshd[12862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 user=mysql Dec 29 10:38:45 host sshd[12862]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql" Dec 29 10:38:45 host sshd[12863]: pam_unix(sshd:auth): check pass; user unknown Dec 29 10:38:45 host sshd[12863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Dec 29 10:38:47 host sshd[12833]: Failed password for invalid user test from 178.88.161.82 port 38254 ssh2 Dec 29 10:38:47 host sshd[12836]: Failed password for invalid user ansadmin from 178.88.161.82 port 37988 ssh2 Dec 29 10:38:47 host sshd[12841]: Failed password for invalid user steam from 178.88.161.82 port 38224 ssh2 Dec 29 10:38:47 host sshd[12834]: Failed password for invalid user web from 178.88.161.82 port 38052 ssh2 Dec 29 10:38:47 host sshd[12837]: Failed password for invalid user postgres from 178.88.161.82 port 38066 ssh2 Dec 29 10:38:47 host sshd[12835]: Failed password for invalid user mysql from 178.88.161.82 port 38178 ssh2 Dec 29 10:38:47 host sshd[12839]: Failed password for invalid user guest from 178.88.161.82 port 38172 ssh2 Dec 29 10:38:47 host sshd[12846]: Failed password for invalid user ftpuser from 178.88.161.82 port 38210 ssh2 Dec 29 10:38:47 host sshd[12838]: Failed password for invalid user moxa from 178.88.161.82 port 38252 ssh2 Dec 29 10:38:47 host sshd[12844]: Failed password for invalid user ftpuser from 178.88.161.82 port 38188 ssh2 Dec 29 10:38:47 host sshd[12843]: Failed password for invalid user steam from 178.88.161.82 port 38012 ssh2 Dec 29 10:38:47 host sshd[12840]: Failed password for invalid user test from 178.88.161.82 port 38190 ssh2 Dec 29 10:38:47 host sshd[12854]: Failed password for invalid user hadoop from 178.88.161.82 port 38186 ssh2 Dec 29 10:38:47 host sshd[12845]: Failed password for invalid user posiflex from 178.88.161.82 port 38230 ssh2 Dec 29 10:38:47 host sshd[12849]: Failed password for invalid user tester from 178.88.161.82 port 38102 ssh2 Dec 29 10:38:47 host sshd[12847]: Failed password for invalid user ftpuser from 178.88.161.82 port 37996 ssh2 Dec 29 10:38:47 host sshd[12860]: Failed password for invalid user centos from 178.88.161.82 port 38136 ssh2 Dec 29 10:38:47 host sshd[12848]: Failed password for invalid user ec2-user from 178.88.161.82 port 38228 ssh2 Dec 29 10:38:47 host sshd[12853]: Failed password for invalid user ec2-user from 178.88.161.82 port 38196 ssh2 Dec 29 10:38:47 host sshd[12856]: Failed password for invalid user devops from 178.88.161.82 port 38150 ssh2 Dec 29 10:38:47 host sshd[12857]: Failed password for invalid user posiflex from 178.88.161.82 port 38004 ssh2 Dec 29 10:38:47 host sshd[12852]: Failed password for invalid user linux from 178.88.161.82 port 37920 ssh2 Dec 29 10:38:47 host sshd[12861]: Failed password for invalid user oracle from 178.88.161.82 port 38010 ssh2 Dec 29 10:38:47 host sshd[12855]: Failed password for invalid user ftpuser from 178.88.161.82 port 38166 ssh2 Dec 29 10:38:47 host sshd[12858]: Failed password for invalid user dockeradmin from 178.88.161.82 port 37944 ssh2 Dec 29 10:38:47 host sshd[12864]: Failed password for invalid user ubuntu from 178.88.161.82 port 38204 ssh2 Dec 29 10:38:47 host sshd[12859]: Failed password for invalid user guest from 178.88.161.82 port 37992 ssh2 Dec 29 10:38:47 host sshd[12862]: Failed password for invalid user mysql from 178.88.161.82 port 38082 ssh2 Dec 29 10:38:47 host sshd[12863]: Failed password for invalid user bot from 178.88.161.82 port 38094 ssh2 Dec 29 10:38:47 host sshd[12833]: Connection closed by 178.88.161.82 port 38254 [preauth] Dec 29 10:38:47 host sshd[12841]: Connection closed by 178.88.161.82 port 38224 [preauth] Dec 29 10:38:47 host sshd[12836]: Connection closed by 178.88.161.82 port 37988 [preauth] Dec 29 10:38:47 host sshd[12834]: Connection closed by 178.88.161.82 port 38052 [preauth] Dec 29 10:38:47 host sshd[12837]: Connection closed by 178.88.161.82 port 38066 [preauth] Dec 29 10:38:47 host sshd[12835]: Connection closed by 178.88.161.82 port 38178 [preauth] Dec 29 10:38:47 host sshd[12839]: Connection closed by 178.88.161.82 port 38172 [preauth] Dec 29 10:38:47 host sshd[12840]: Connection closed by 178.88.161.82 port 38190 [preauth] Dec 29 10:38:47 host sshd[12838]: Connection closed by 178.88.161.82 port 38252 [preauth] Dec 29 10:38:47 host sshd[12843]: Connection closed by 178.88.161.82 port 38012 [preauth] Dec 29 10:38:47 host sshd[12845]: Connection closed by 178.88.161.82 port 38230 [preauth] Dec 29 10:38:47 host sshd[12846]: Connection closed by 178.88.161.82 port 38210 [preauth] Dec 29 10:38:47 host sshd[12847]: Connection closed by 178.88.161.82 port 37996 [preauth] Dec 29 10:38:47 host sshd[12844]: Connection closed by 178.88.161.82 port 38188 [preauth] Dec 29 10:38:47 host sshd[12854]: Connection closed by 178.88.161.82 port 38186 [preauth] Dec 29 10:38:47 host sshd[12849]: Connection closed by 178.88.161.82 port 38102 [preauth] Dec 29 10:38:47 host sshd[12848]: Connection closed by 178.88.161.82 port 38228 [preauth] Dec 29 10:38:47 host sshd[12853]: Connection closed by 178.88.161.82 port 38196 [preauth] Dec 29 10:38:47 host sshd[12860]: Connection closed by 178.88.161.82 port 38136 [preauth] Dec 29 10:38:47 host sshd[12856]: Connection closed by 178.88.161.82 port 38150 [preauth] Dec 29 10:38:47 host sshd[12857]: Connection closed by 178.88.161.82 port 38004 [preauth] Dec 29 10:38:47 host sshd[12852]: Connection closed by 178.88.161.82 port 37920 [preauth] Dec 29 10:38:47 host sshd[12858]: Connection closed by 178.88.161.82 port 37944 [preauth] Dec 29 10:38:47 host sshd[12855]: Connection closed by 178.88.161.82 port 38166 [preauth] Dec 29 10:38:47 host sshd[12864]: Connection closed by 178.88.161.82 port 38204 [preauth] Dec 29 10:38:47 host sshd[12859]: Connection closed by 178.88.161.82 port 37992 [preauth] Dec 29 10:38:47 host sshd[12862]: Connection closed by 178.88.161.82 port 38082 [preauth] Dec 29 10:38:48 host sshd[12861]: Connection closed by 178.88.161.82 port 38010 [preauth] Dec 29 10:38:48 host sshd[12863]: Connection closed by 178.88.161.82 port 38094 [preauth] Dec 29 10:46:27 host sshd[14019]: Invalid user devuser from 162.218.126.136 port 52926 Dec 29 10:46:27 host sshd[14019]: input_userauth_request: invalid user devuser [preauth] Dec 29 10:46:27 host sshd[14019]: pam_unix(sshd:auth): check pass; user unknown Dec 29 10:46:27 host sshd[14019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 29 10:46:29 host sshd[14019]: Failed password for invalid user devuser from 162.218.126.136 port 52926 ssh2 Dec 29 10:46:29 host sshd[14019]: Connection closed by 162.218.126.136 port 52926 [preauth] Dec 29 11:16:06 host sshd[18493]: Invalid user user1 from 92.46.108.20 port 44890 Dec 29 11:16:06 host sshd[18493]: input_userauth_request: invalid user user1 [preauth] Dec 29 11:16:06 host sshd[18493]: pam_unix(sshd:auth): check pass; user unknown Dec 29 11:16:06 host sshd[18493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 29 11:16:09 host sshd[18493]: Failed password for invalid user user1 from 92.46.108.20 port 44890 ssh2 Dec 29 11:16:09 host sshd[18493]: Connection closed by 92.46.108.20 port 44890 [preauth] Dec 29 11:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 11:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 11:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 11:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 11:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 11:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 11:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 11:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 11:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 11:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 29 11:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 11:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 11:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 29 11:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 11:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 11:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 29 11:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 11:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 11:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 29 11:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 11:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 11:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 29 11:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 11:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 11:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 29 11:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 11:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 11:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 29 11:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 11:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 11:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 29 11:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 11:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 29 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=a2zgroup user-2=dartsimp user-3=laundryboniface user-4=wwwkaretakers user-5=cochintaxi user-6=travelboniface user-7=wwwresourcehunte user-8=keralaholi user-9=wwwrmswll user-10=ugotscom user-11=wwwpmcresource user-12=vfmassets user-13=shalinijames user-14=wwwtestugo user-15=pmcresources user-16=disposeat user-17=wwwkmaorg user-18=remysagr user-19=woodpeck user-20=wwwkapin user-21=palco123 user-22=gifterman user-23=phmetals user-24=kottayamcalldriv user-25=mrsclean user-26=wwwnexidigital user-27=bonifacegroup user-28=wwwevmhonda user-29=wwwletsstalkfood user-30=straightcurve feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 29 11:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 29 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-uJtr3CGmALA78lXS.~ Dec 29 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-uJtr3CGmALA78lXS.~' Dec 29 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-uJtr3CGmALA78lXS.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 29 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 29 11:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 11:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 11:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 11:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 11:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 11:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 11:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 11:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 11:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 11:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 11:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 11:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 29 11:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 11:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 11:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 11:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 11:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 11:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 29 11:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 29 11:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 29 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 29 11:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 11:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 11:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 29 11:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 11:21:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 11:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 29 11:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 11:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 11:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 29 11:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 11:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 11:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 29 11:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 11:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 11:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 29 11:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 11:22:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 11:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 29 11:22:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 11:22:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 11:22:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 29 11:22:16 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 11:22:17 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 11:45:28 host sshd[23919]: User root from 103.13.40.2 not allowed because not listed in AllowUsers Dec 29 11:45:28 host sshd[23919]: input_userauth_request: invalid user root [preauth] Dec 29 11:45:28 host unix_chkpwd[23921]: password check failed for user (root) Dec 29 11:45:28 host sshd[23919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 user=root Dec 29 11:45:28 host sshd[23919]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 11:45:30 host sshd[23919]: Failed password for invalid user root from 103.13.40.2 port 59576 ssh2 Dec 29 11:45:30 host sshd[23919]: Connection closed by 103.13.40.2 port 59576 [preauth] Dec 29 11:46:37 host sshd[24188]: Invalid user em from 45.93.201.90 port 41574 Dec 29 11:46:37 host sshd[24188]: input_userauth_request: invalid user em [preauth] Dec 29 11:46:37 host sshd[24188]: pam_unix(sshd:auth): check pass; user unknown Dec 29 11:46:37 host sshd[24188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 29 11:46:39 host sshd[24188]: Failed password for invalid user em from 45.93.201.90 port 41574 ssh2 Dec 29 11:46:42 host sshd[24188]: pam_unix(sshd:auth): check pass; user unknown Dec 29 11:46:44 host sshd[24188]: Failed password for invalid user em from 45.93.201.90 port 41574 ssh2 Dec 29 11:46:48 host sshd[24188]: pam_unix(sshd:auth): check pass; user unknown Dec 29 11:46:50 host sshd[24188]: Failed password for invalid user em from 45.93.201.90 port 41574 ssh2 Dec 29 11:46:53 host sshd[24188]: Connection closed by 45.93.201.90 port 41574 [preauth] Dec 29 11:46:53 host sshd[24188]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 29 11:51:46 host sshd[24954]: Invalid user user1 from 106.10.122.53 port 45230 Dec 29 11:51:46 host sshd[24954]: input_userauth_request: invalid user user1 [preauth] Dec 29 11:51:46 host sshd[24954]: pam_unix(sshd:auth): check pass; user unknown Dec 29 11:51:46 host sshd[24954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 29 11:51:48 host sshd[24954]: Failed password for invalid user user1 from 106.10.122.53 port 45230 ssh2 Dec 29 11:51:48 host sshd[24954]: Connection closed by 106.10.122.53 port 45230 [preauth] Dec 29 11:55:04 host sshd[25490]: Invalid user user from 162.218.126.136 port 56070 Dec 29 11:55:04 host sshd[25490]: input_userauth_request: invalid user user [preauth] Dec 29 11:55:04 host sshd[25490]: pam_unix(sshd:auth): check pass; user unknown Dec 29 11:55:04 host sshd[25490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 29 11:55:06 host sshd[25490]: Failed password for invalid user user from 162.218.126.136 port 56070 ssh2 Dec 29 11:55:06 host sshd[25490]: Connection closed by 162.218.126.136 port 56070 [preauth] Dec 29 12:07:10 host sshd[27979]: Invalid user brian from 107.189.30.59 port 35464 Dec 29 12:07:10 host sshd[27979]: input_userauth_request: invalid user brian [preauth] Dec 29 12:07:10 host sshd[27979]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:07:10 host sshd[27979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Dec 29 12:07:12 host sshd[27979]: Failed password for invalid user brian from 107.189.30.59 port 35464 ssh2 Dec 29 12:07:13 host sshd[27979]: Connection closed by 107.189.30.59 port 35464 [preauth] Dec 29 12:16:09 host sshd[29651]: Connection closed by 172.104.11.4 port 42000 [preauth] Dec 29 12:16:10 host sshd[29654]: Connection closed by 172.104.11.4 port 17514 [preauth] Dec 29 12:16:12 host sshd[29658]: Connection closed by 172.104.11.4 port 17524 [preauth] Dec 29 12:17:58 host sshd[29881]: Did not receive identification string from 58.72.18.130 port 6148 Dec 29 12:19:52 host sshd[30127]: Invalid user avahi from 104.244.74.6 port 49996 Dec 29 12:19:52 host sshd[30127]: input_userauth_request: invalid user avahi [preauth] Dec 29 12:19:52 host sshd[30127]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:19:52 host sshd[30127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Dec 29 12:19:54 host sshd[30127]: Failed password for invalid user avahi from 104.244.74.6 port 49996 ssh2 Dec 29 12:19:54 host sshd[30127]: Connection closed by 104.244.74.6 port 49996 [preauth] Dec 29 12:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 12:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 12:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 12:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 12:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 12:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 12:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 12:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 12:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 12:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 29 12:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 12:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 12:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 29 12:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 12:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 29 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 29 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 29 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 29 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 29 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 29 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 12:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 12:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 12:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 12:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 29 12:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkmaorg user-2=disposeat user-3=remysagr user-4=woodpeck user-5=wwwkapin user-6=wwwtestugo user-7=shalinijames user-8=vfmassets user-9=pmcresources user-10=wwwevmhonda user-11=bonifacegroup user-12=straightcurve user-13=wwwletsstalkfood user-14=phmetals user-15=kottayamcalldriv user-16=gifterman user-17=palco123 user-18=wwwnexidigital user-19=mrsclean user-20=cochintaxi user-21=wwwkaretakers user-22=dartsimp user-23=a2zgroup user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=ugotscom user-28=wwwrmswll user-29=keralaholi user-30=wwwresourcehunte feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 29 12:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 29 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-APhcc9A8dHLJWSOB.~ Dec 29 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-APhcc9A8dHLJWSOB.~' Dec 29 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-APhcc9A8dHLJWSOB.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 29 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 29 12:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 12:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 12:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 12:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 12:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 12:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 12:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 12:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 12:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 12:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 12:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 12:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 29 12:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 12:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 12:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 12:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 29 12:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 29 12:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 29 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 29 12:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 12:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 29 12:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 12:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 12:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 29 12:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 12:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 29 12:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 12:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 29 12:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 12:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 12:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 29 12:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 12:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 12:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 29 12:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 12:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 12:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 29 12:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 12:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 12:22:42 host sshd[30870]: Did not receive identification string from 20.163.208.188 port 48404 Dec 29 12:22:43 host sshd[30873]: Invalid user postgres from 20.163.208.188 port 48448 Dec 29 12:22:43 host sshd[30873]: input_userauth_request: invalid user postgres [preauth] Dec 29 12:22:43 host sshd[30871]: Invalid user oracle from 20.163.208.188 port 48414 Dec 29 12:22:43 host sshd[30871]: input_userauth_request: invalid user oracle [preauth] Dec 29 12:22:43 host sshd[30878]: Invalid user ftpuser from 20.163.208.188 port 48534 Dec 29 12:22:43 host sshd[30874]: Invalid user zjw from 20.163.208.188 port 48456 Dec 29 12:22:43 host sshd[30874]: input_userauth_request: invalid user zjw [preauth] Dec 29 12:22:43 host sshd[30875]: Invalid user hadoop from 20.163.208.188 port 48476 Dec 29 12:22:43 host sshd[30878]: input_userauth_request: invalid user ftpuser [preauth] Dec 29 12:22:43 host sshd[30875]: input_userauth_request: invalid user hadoop [preauth] Dec 29 12:22:43 host sshd[30877]: Invalid user user from 20.163.208.188 port 48554 Dec 29 12:22:43 host sshd[30879]: Invalid user elastic from 20.163.208.188 port 48498 Dec 29 12:22:43 host sshd[30877]: input_userauth_request: invalid user user [preauth] Dec 29 12:22:43 host sshd[30879]: input_userauth_request: invalid user elastic [preauth] Dec 29 12:22:43 host sshd[30876]: Invalid user guest from 20.163.208.188 port 48436 Dec 29 12:22:43 host sshd[30876]: input_userauth_request: invalid user guest [preauth] Dec 29 12:22:43 host sshd[30880]: Invalid user ubuntu from 20.163.208.188 port 48626 Dec 29 12:22:43 host sshd[30880]: input_userauth_request: invalid user ubuntu [preauth] Dec 29 12:22:43 host sshd[30881]: Invalid user steam from 20.163.208.188 port 48588 Dec 29 12:22:43 host sshd[30882]: Invalid user ubuntu from 20.163.208.188 port 48682 Dec 29 12:22:43 host sshd[30881]: input_userauth_request: invalid user steam [preauth] Dec 29 12:22:43 host sshd[30882]: input_userauth_request: invalid user ubuntu [preauth] Dec 29 12:22:43 host sshd[30889]: Invalid user jenkins from 20.163.208.188 port 48646 Dec 29 12:22:43 host sshd[30889]: input_userauth_request: invalid user jenkins [preauth] Dec 29 12:22:43 host sshd[30891]: Invalid user fa from 20.163.208.188 port 48732 Dec 29 12:22:43 host sshd[30892]: Invalid user git from 20.163.208.188 port 48782 Dec 29 12:22:43 host sshd[30891]: input_userauth_request: invalid user fa [preauth] Dec 29 12:22:43 host sshd[30892]: input_userauth_request: invalid user git [preauth] Dec 29 12:22:43 host sshd[30888]: Invalid user oracle from 20.163.208.188 port 48634 Dec 29 12:22:43 host sshd[30886]: Invalid user web from 20.163.208.188 port 48658 Dec 29 12:22:43 host sshd[30888]: input_userauth_request: invalid user oracle [preauth] Dec 29 12:22:43 host sshd[30886]: input_userauth_request: invalid user web [preauth] Dec 29 12:22:43 host sshd[30894]: Invalid user discordbot from 20.163.208.188 port 48754 Dec 29 12:22:43 host sshd[30894]: input_userauth_request: invalid user discordbot [preauth] Dec 29 12:22:43 host sshd[30885]: Invalid user steam from 20.163.208.188 port 48430 Dec 29 12:22:43 host sshd[30885]: input_userauth_request: invalid user steam [preauth] Dec 29 12:22:43 host sshd[30887]: Invalid user postgres from 20.163.208.188 port 48720 Dec 29 12:22:43 host sshd[30887]: input_userauth_request: invalid user postgres [preauth] Dec 29 12:22:43 host sshd[30890]: Invalid user posiflex from 20.163.208.188 port 48768 Dec 29 12:22:43 host sshd[30890]: input_userauth_request: invalid user posiflex [preauth] Dec 29 12:22:43 host sshd[30899]: Invalid user user from 20.163.208.188 port 48674 Dec 29 12:22:43 host sshd[30899]: input_userauth_request: invalid user user [preauth] Dec 29 12:22:43 host sshd[30883]: Invalid user guest from 20.163.208.188 port 48586 Dec 29 12:22:43 host sshd[30883]: input_userauth_request: invalid user guest [preauth] Dec 29 12:22:43 host sshd[30893]: Invalid user steam from 20.163.208.188 port 48746 Dec 29 12:22:43 host sshd[30893]: input_userauth_request: invalid user steam [preauth] Dec 29 12:22:43 host sshd[30884]: User centos from 20.163.208.188 not allowed because not listed in AllowUsers Dec 29 12:22:43 host sshd[30884]: input_userauth_request: invalid user centos [preauth] Dec 29 12:22:43 host sshd[30896]: Invalid user ftpuser from 20.163.208.188 port 48522 Dec 29 12:22:43 host sshd[30896]: input_userauth_request: invalid user ftpuser [preauth] Dec 29 12:22:43 host sshd[30897]: Invalid user ubuntu from 20.163.208.188 port 48496 Dec 29 12:22:43 host sshd[30897]: input_userauth_request: invalid user ubuntu [preauth] Dec 29 12:22:43 host sshd[30900]: Invalid user esuser from 20.163.208.188 port 48576 Dec 29 12:22:43 host sshd[30900]: input_userauth_request: invalid user esuser [preauth] Dec 29 12:22:43 host sshd[30898]: Invalid user guest from 20.163.208.188 port 48480 Dec 29 12:22:43 host sshd[30902]: Invalid user user from 20.163.208.188 port 48752 Dec 29 12:22:43 host sshd[30898]: input_userauth_request: invalid user guest [preauth] Dec 29 12:22:43 host sshd[30902]: input_userauth_request: invalid user user [preauth] Dec 29 12:22:43 host sshd[30904]: Invalid user steam from 20.163.208.188 port 48698 Dec 29 12:22:43 host sshd[30904]: input_userauth_request: invalid user steam [preauth] Dec 29 12:22:43 host sshd[30901]: Invalid user test from 20.163.208.188 port 48504 Dec 29 12:22:43 host sshd[30901]: input_userauth_request: invalid user test [preauth] Dec 29 12:22:43 host sshd[30903]: Invalid user dspace from 20.163.208.188 port 48570 Dec 29 12:22:43 host sshd[30903]: input_userauth_request: invalid user dspace [preauth] Dec 29 12:22:43 host sshd[30871]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:22:43 host sshd[30871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Dec 29 12:22:44 host sshd[30878]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:22:44 host sshd[30878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Dec 29 12:22:44 host sshd[30873]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:22:44 host sshd[30873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Dec 29 12:22:44 host sshd[30879]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:22:44 host sshd[30879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Dec 29 12:22:44 host sshd[30877]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:22:44 host sshd[30877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Dec 29 12:22:44 host sshd[30875]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:22:44 host sshd[30875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Dec 29 12:22:44 host sshd[30874]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:22:44 host sshd[30874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Dec 29 12:22:44 host sshd[30881]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:22:44 host sshd[30881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Dec 29 12:22:44 host sshd[30880]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:22:44 host sshd[30880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Dec 29 12:22:44 host sshd[30882]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:22:44 host sshd[30882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Dec 29 12:22:44 host sshd[30889]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:22:44 host sshd[30876]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:22:44 host sshd[30889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Dec 29 12:22:44 host sshd[30886]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:22:44 host sshd[30876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Dec 29 12:22:44 host sshd[30886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Dec 29 12:22:44 host sshd[30892]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:22:44 host sshd[30892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Dec 29 12:22:44 host sshd[30888]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:22:44 host sshd[30891]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:22:44 host sshd[30888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Dec 29 12:22:44 host sshd[30891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Dec 29 12:22:44 host sshd[30894]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:22:44 host sshd[30887]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:22:44 host sshd[30894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Dec 29 12:22:44 host sshd[30887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Dec 29 12:22:44 host sshd[30890]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:22:44 host sshd[30890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Dec 29 12:22:44 host sshd[30885]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:22:44 host sshd[30885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Dec 29 12:22:44 host sshd[30883]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:22:44 host sshd[30893]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:22:44 host sshd[30883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Dec 29 12:22:44 host sshd[30893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Dec 29 12:22:44 host sshd[30896]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:22:44 host sshd[30896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Dec 29 12:22:44 host sshd[30897]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:22:44 host sshd[30897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Dec 29 12:22:44 host sshd[30899]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:22:44 host sshd[30899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Dec 29 12:22:44 host unix_chkpwd[30937]: password check failed for user (centos) Dec 29 12:22:44 host sshd[30884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 user=centos Dec 29 12:22:44 host sshd[30901]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:22:44 host sshd[30901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Dec 29 12:22:44 host sshd[30904]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:22:44 host sshd[30904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Dec 29 12:22:44 host sshd[30900]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:22:44 host sshd[30900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Dec 29 12:22:44 host sshd[30902]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:22:44 host sshd[30902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Dec 29 12:22:44 host sshd[30898]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:22:44 host sshd[30898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Dec 29 12:22:44 host sshd[30903]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:22:44 host sshd[30903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Dec 29 12:22:45 host sshd[30871]: Failed password for invalid user oracle from 20.163.208.188 port 48414 ssh2 Dec 29 12:22:46 host sshd[30878]: Failed password for invalid user ftpuser from 20.163.208.188 port 48534 ssh2 Dec 29 12:22:46 host sshd[30873]: Failed password for invalid user postgres from 20.163.208.188 port 48448 ssh2 Dec 29 12:22:46 host sshd[30875]: Failed password for invalid user hadoop from 20.163.208.188 port 48476 ssh2 Dec 29 12:22:46 host sshd[30879]: Failed password for invalid user elastic from 20.163.208.188 port 48498 ssh2 Dec 29 12:22:46 host sshd[30877]: Failed password for invalid user user from 20.163.208.188 port 48554 ssh2 Dec 29 12:22:46 host sshd[30874]: Failed password for invalid user zjw from 20.163.208.188 port 48456 ssh2 Dec 29 12:22:46 host sshd[30881]: Failed password for invalid user steam from 20.163.208.188 port 48588 ssh2 Dec 29 12:22:46 host sshd[30882]: Failed password for invalid user ubuntu from 20.163.208.188 port 48682 ssh2 Dec 29 12:22:46 host sshd[30880]: Failed password for invalid user ubuntu from 20.163.208.188 port 48626 ssh2 Dec 29 12:22:46 host sshd[30892]: Failed password for invalid user git from 20.163.208.188 port 48782 ssh2 Dec 29 12:22:46 host sshd[30886]: Failed password for invalid user web from 20.163.208.188 port 48658 ssh2 Dec 29 12:22:46 host sshd[30889]: Failed password for invalid user jenkins from 20.163.208.188 port 48646 ssh2 Dec 29 12:22:46 host sshd[30876]: Failed password for invalid user guest from 20.163.208.188 port 48436 ssh2 Dec 29 12:22:46 host sshd[30891]: Failed password for invalid user fa from 20.163.208.188 port 48732 ssh2 Dec 29 12:22:46 host sshd[30888]: Failed password for invalid user oracle from 20.163.208.188 port 48634 ssh2 Dec 29 12:22:46 host sshd[30894]: Failed password for invalid user discordbot from 20.163.208.188 port 48754 ssh2 Dec 29 12:22:46 host sshd[30887]: Failed password for invalid user postgres from 20.163.208.188 port 48720 ssh2 Dec 29 12:22:46 host sshd[30890]: Failed password for invalid user posiflex from 20.163.208.188 port 48768 ssh2 Dec 29 12:22:46 host sshd[30885]: Failed password for invalid user steam from 20.163.208.188 port 48430 ssh2 Dec 29 12:22:46 host sshd[30893]: Failed password for invalid user steam from 20.163.208.188 port 48746 ssh2 Dec 29 12:22:46 host sshd[30883]: Failed password for invalid user guest from 20.163.208.188 port 48586 ssh2 Dec 29 12:22:46 host sshd[30896]: Failed password for invalid user ftpuser from 20.163.208.188 port 48522 ssh2 Dec 29 12:22:46 host sshd[30897]: Failed password for invalid user ubuntu from 20.163.208.188 port 48496 ssh2 Dec 29 12:22:46 host sshd[30899]: Failed password for invalid user user from 20.163.208.188 port 48674 ssh2 Dec 29 12:22:46 host sshd[30901]: Failed password for invalid user test from 20.163.208.188 port 48504 ssh2 Dec 29 12:22:46 host sshd[30904]: Failed password for invalid user steam from 20.163.208.188 port 48698 ssh2 Dec 29 12:22:46 host sshd[30884]: Failed password for invalid user centos from 20.163.208.188 port 48604 ssh2 Dec 29 12:22:46 host sshd[30900]: Failed password for invalid user esuser from 20.163.208.188 port 48576 ssh2 Dec 29 12:22:46 host sshd[30902]: Failed password for invalid user user from 20.163.208.188 port 48752 ssh2 Dec 29 12:22:46 host sshd[30898]: Failed password for invalid user guest from 20.163.208.188 port 48480 ssh2 Dec 29 12:22:46 host sshd[30903]: Failed password for invalid user dspace from 20.163.208.188 port 48570 ssh2 Dec 29 12:22:46 host sshd[30871]: Connection closed by 20.163.208.188 port 48414 [preauth] Dec 29 12:22:46 host sshd[30873]: Connection closed by 20.163.208.188 port 48448 [preauth] Dec 29 12:22:46 host sshd[30892]: Connection closed by 20.163.208.188 port 48782 [preauth] Dec 29 12:22:46 host sshd[30882]: Connection closed by 20.163.208.188 port 48682 [preauth] Dec 29 12:22:46 host sshd[30875]: Connection closed by 20.163.208.188 port 48476 [preauth] Dec 29 12:22:46 host sshd[30894]: Connection closed by 20.163.208.188 port 48754 [preauth] Dec 29 12:22:46 host sshd[30887]: Connection closed by 20.163.208.188 port 48720 [preauth] Dec 29 12:22:46 host sshd[30888]: Connection closed by 20.163.208.188 port 48634 [preauth] Dec 29 12:22:46 host sshd[30891]: Connection closed by 20.163.208.188 port 48732 [preauth] Dec 29 12:22:46 host sshd[30889]: Connection closed by 20.163.208.188 port 48646 [preauth] Dec 29 12:22:46 host sshd[30880]: Connection closed by 20.163.208.188 port 48626 [preauth] Dec 29 12:22:46 host sshd[30874]: Connection closed by 20.163.208.188 port 48456 [preauth] Dec 29 12:22:46 host sshd[30893]: Connection closed by 20.163.208.188 port 48746 [preauth] Dec 29 12:22:46 host sshd[30881]: Connection closed by 20.163.208.188 port 48588 [preauth] Dec 29 12:22:46 host sshd[30890]: Connection closed by 20.163.208.188 port 48768 [preauth] Dec 29 12:22:47 host sshd[30879]: Connection closed by 20.163.208.188 port 48498 [preauth] Dec 29 12:22:47 host sshd[30877]: Connection closed by 20.163.208.188 port 48554 [preauth] Dec 29 12:22:47 host sshd[30899]: Connection closed by 20.163.208.188 port 48674 [preauth] Dec 29 12:22:47 host sshd[30886]: Connection closed by 20.163.208.188 port 48658 [preauth] Dec 29 12:22:47 host sshd[30903]: Connection closed by 20.163.208.188 port 48570 [preauth] Dec 29 12:22:47 host sshd[30883]: Connection closed by 20.163.208.188 port 48586 [preauth] Dec 29 12:22:47 host sshd[30884]: Connection closed by 20.163.208.188 port 48604 [preauth] Dec 29 12:22:47 host sshd[30896]: Connection closed by 20.163.208.188 port 48522 [preauth] Dec 29 12:22:47 host sshd[30876]: Connection closed by 20.163.208.188 port 48436 [preauth] Dec 29 12:22:47 host sshd[30885]: Connection closed by 20.163.208.188 port 48430 [preauth] Dec 29 12:22:47 host sshd[30904]: Connection closed by 20.163.208.188 port 48698 [preauth] Dec 29 12:22:47 host sshd[30897]: Connection closed by 20.163.208.188 port 48496 [preauth] Dec 29 12:22:47 host sshd[30900]: Connection closed by 20.163.208.188 port 48576 [preauth] Dec 29 12:22:47 host sshd[30898]: Connection closed by 20.163.208.188 port 48480 [preauth] Dec 29 12:22:47 host sshd[30901]: Connection closed by 20.163.208.188 port 48504 [preauth] Dec 29 12:22:47 host sshd[30902]: Connection closed by 20.163.208.188 port 48752 [preauth] Dec 29 12:22:47 host sshd[30878]: Connection closed by 20.163.208.188 port 48534 [preauth] Dec 29 12:23:48 host sshd[31123]: Invalid user avahi from 104.244.74.6 port 35330 Dec 29 12:23:48 host sshd[31123]: input_userauth_request: invalid user avahi [preauth] Dec 29 12:23:48 host sshd[31123]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:23:48 host sshd[31123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Dec 29 12:23:51 host sshd[31123]: Failed password for invalid user avahi from 104.244.74.6 port 35330 ssh2 Dec 29 12:23:51 host sshd[31123]: Connection closed by 104.244.74.6 port 35330 [preauth] Dec 29 12:26:26 host sshd[31538]: Invalid user zhy from 41.197.31.178 port 54754 Dec 29 12:26:26 host sshd[31538]: input_userauth_request: invalid user zhy [preauth] Dec 29 12:26:26 host sshd[31538]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:26:26 host sshd[31538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 29 12:26:28 host sshd[31538]: Failed password for invalid user zhy from 41.197.31.178 port 54754 ssh2 Dec 29 12:26:28 host sshd[31538]: Connection closed by 41.197.31.178 port 54754 [preauth] Dec 29 12:53:19 host sshd[3349]: Invalid user avahi from 104.244.74.6 port 40162 Dec 29 12:53:19 host sshd[3349]: input_userauth_request: invalid user avahi [preauth] Dec 29 12:53:19 host sshd[3349]: pam_unix(sshd:auth): check pass; user unknown Dec 29 12:53:19 host sshd[3349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Dec 29 12:53:21 host sshd[3349]: Failed password for invalid user avahi from 104.244.74.6 port 40162 ssh2 Dec 29 12:53:21 host sshd[3349]: Connection closed by 104.244.74.6 port 40162 [preauth] Dec 29 13:03:31 host sshd[4715]: Invalid user user from 162.218.126.136 port 33656 Dec 29 13:03:31 host sshd[4715]: input_userauth_request: invalid user user [preauth] Dec 29 13:03:31 host sshd[4715]: pam_unix(sshd:auth): check pass; user unknown Dec 29 13:03:31 host sshd[4715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 29 13:03:34 host sshd[4715]: Failed password for invalid user user from 162.218.126.136 port 33656 ssh2 Dec 29 13:03:34 host sshd[4715]: Connection closed by 162.218.126.136 port 33656 [preauth] Dec 29 13:12:38 host sshd[5966]: Invalid user user from 103.13.40.2 port 54904 Dec 29 13:12:38 host sshd[5966]: input_userauth_request: invalid user user [preauth] Dec 29 13:12:38 host sshd[5966]: pam_unix(sshd:auth): check pass; user unknown Dec 29 13:12:38 host sshd[5966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 29 13:12:39 host sshd[5966]: Failed password for invalid user user from 103.13.40.2 port 54904 ssh2 Dec 29 13:12:39 host sshd[5966]: Connection closed by 103.13.40.2 port 54904 [preauth] Dec 29 13:18:50 host sshd[6941]: Invalid user install from 106.10.122.53 port 41600 Dec 29 13:18:50 host sshd[6941]: input_userauth_request: invalid user install [preauth] Dec 29 13:18:50 host sshd[6941]: pam_unix(sshd:auth): check pass; user unknown Dec 29 13:18:50 host sshd[6941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 29 13:18:52 host sshd[6941]: Failed password for invalid user install from 106.10.122.53 port 41600 ssh2 Dec 29 13:18:53 host sshd[6941]: Connection closed by 106.10.122.53 port 41600 [preauth] Dec 29 13:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 13:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 13:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 13:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 13:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 13:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 13:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 13:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 13:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 13:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 29 13:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 13:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 13:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 29 13:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 13:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 13:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 29 13:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 13:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 13:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 29 13:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 13:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 13:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 29 13:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 13:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 13:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 29 13:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 13:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 13:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 29 13:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 13:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 13:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 29 13:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 13:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 13:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 29 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkmaorg user-2=disposeat user-3=remysagr user-4=wwwkapin user-5=woodpeck user-6=wwwtestugo user-7=shalinijames user-8=vfmassets user-9=pmcresources user-10=wwwevmhonda user-11=bonifacegroup user-12=straightcurve user-13=wwwletsstalkfood user-14=kottayamcalldriv user-15=phmetals user-16=gifterman user-17=palco123 user-18=wwwnexidigital user-19=mrsclean user-20=cochintaxi user-21=wwwkaretakers user-22=dartsimp user-23=a2zgroup user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=ugotscom user-28=wwwrmswll user-29=keralaholi user-30=wwwresourcehunte feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 29 13:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 29 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-h77e2ajNJ7cKjn7i.~ Dec 29 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-h77e2ajNJ7cKjn7i.~' Dec 29 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-h77e2ajNJ7cKjn7i.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 29 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 29 13:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 13:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 13:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 13:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 13:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 13:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 13:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 13:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 13:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 13:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 13:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 13:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 29 13:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 13:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 13:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 13:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 13:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 13:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 29 13:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 29 13:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 29 13:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 29 13:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 13:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 13:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 29 13:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 13:21:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 29 13:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 13:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 29 13:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 13:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 29 13:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 13:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 13:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 29 13:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 13:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 13:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 29 13:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 13:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 13:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 29 13:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 13:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 13:26:27 host sshd[8400]: User root from 106.246.226.66 not allowed because not listed in AllowUsers Dec 29 13:26:27 host sshd[8400]: input_userauth_request: invalid user root [preauth] Dec 29 13:26:27 host unix_chkpwd[8405]: password check failed for user (root) Dec 29 13:26:27 host sshd[8400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.246.226.66 user=root Dec 29 13:26:27 host sshd[8400]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 13:26:29 host sshd[8400]: Failed password for invalid user root from 106.246.226.66 port 40634 ssh2 Dec 29 13:26:29 host sshd[8400]: Received disconnect from 106.246.226.66 port 40634:11: Bye Bye [preauth] Dec 29 13:26:29 host sshd[8400]: Disconnected from 106.246.226.66 port 40634 [preauth] Dec 29 13:28:43 host sshd[8850]: User root from 106.246.226.66 not allowed because not listed in AllowUsers Dec 29 13:28:43 host sshd[8850]: input_userauth_request: invalid user root [preauth] Dec 29 13:28:43 host unix_chkpwd[8853]: password check failed for user (root) Dec 29 13:28:43 host sshd[8850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.246.226.66 user=root Dec 29 13:28:43 host sshd[8850]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 13:28:45 host sshd[8850]: Failed password for invalid user root from 106.246.226.66 port 49772 ssh2 Dec 29 13:30:07 host sshd[9102]: Invalid user en from 45.93.201.90 port 36162 Dec 29 13:30:07 host sshd[9102]: input_userauth_request: invalid user en [preauth] Dec 29 13:30:07 host sshd[9102]: pam_unix(sshd:auth): check pass; user unknown Dec 29 13:30:07 host sshd[9102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 29 13:30:09 host sshd[9102]: Failed password for invalid user en from 45.93.201.90 port 36162 ssh2 Dec 29 13:30:12 host sshd[9102]: pam_unix(sshd:auth): check pass; user unknown Dec 29 13:30:14 host sshd[9102]: Failed password for invalid user en from 45.93.201.90 port 36162 ssh2 Dec 29 13:30:17 host sshd[9102]: pam_unix(sshd:auth): check pass; user unknown Dec 29 13:30:20 host sshd[9102]: Failed password for invalid user en from 45.93.201.90 port 36162 ssh2 Dec 29 13:30:23 host sshd[9102]: Connection closed by 45.93.201.90 port 36162 [preauth] Dec 29 13:30:23 host sshd[9102]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 29 13:36:55 host sshd[10095]: User root from 167.99.114.108 not allowed because not listed in AllowUsers Dec 29 13:36:55 host sshd[10095]: input_userauth_request: invalid user root [preauth] Dec 29 13:36:55 host unix_chkpwd[10098]: password check failed for user (root) Dec 29 13:36:55 host sshd[10095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.114.108 user=root Dec 29 13:36:55 host sshd[10095]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 13:36:58 host sshd[10095]: Failed password for invalid user root from 167.99.114.108 port 40702 ssh2 Dec 29 13:36:58 host sshd[10095]: Received disconnect from 167.99.114.108 port 40702:11: Bye Bye [preauth] Dec 29 13:36:58 host sshd[10095]: Disconnected from 167.99.114.108 port 40702 [preauth] Dec 29 13:37:08 host sshd[10121]: User root from 92.46.108.20 not allowed because not listed in AllowUsers Dec 29 13:37:08 host sshd[10121]: input_userauth_request: invalid user root [preauth] Dec 29 13:37:08 host unix_chkpwd[10127]: password check failed for user (root) Dec 29 13:37:08 host sshd[10121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 user=root Dec 29 13:37:08 host sshd[10121]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 13:37:10 host sshd[10121]: Failed password for invalid user root from 92.46.108.20 port 46516 ssh2 Dec 29 13:37:11 host sshd[10121]: Connection closed by 92.46.108.20 port 46516 [preauth] Dec 29 13:37:39 host sshd[10189]: User root from 159.65.12.104 not allowed because not listed in AllowUsers Dec 29 13:37:39 host sshd[10189]: input_userauth_request: invalid user root [preauth] Dec 29 13:37:39 host unix_chkpwd[10191]: password check failed for user (root) Dec 29 13:37:39 host sshd[10189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.12.104 user=root Dec 29 13:37:39 host sshd[10189]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 13:37:40 host sshd[10189]: Failed password for invalid user root from 159.65.12.104 port 37234 ssh2 Dec 29 13:37:40 host sshd[10189]: Received disconnect from 159.65.12.104 port 37234:11: Bye Bye [preauth] Dec 29 13:37:40 host sshd[10189]: Disconnected from 159.65.12.104 port 37234 [preauth] Dec 29 13:38:56 host sshd[10446]: User root from 110.172.191.114 not allowed because not listed in AllowUsers Dec 29 13:38:56 host sshd[10446]: input_userauth_request: invalid user root [preauth] Dec 29 13:38:56 host unix_chkpwd[10448]: password check failed for user (root) Dec 29 13:38:56 host sshd[10446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.172.191.114 user=root Dec 29 13:38:56 host sshd[10446]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 13:38:58 host sshd[10446]: Failed password for invalid user root from 110.172.191.114 port 55957 ssh2 Dec 29 13:38:58 host sshd[10446]: Received disconnect from 110.172.191.114 port 55957:11: Bye Bye [preauth] Dec 29 13:38:58 host sshd[10446]: Disconnected from 110.172.191.114 port 55957 [preauth] Dec 29 13:38:59 host sshd[10452]: User root from 134.209.69.41 not allowed because not listed in AllowUsers Dec 29 13:38:59 host sshd[10452]: input_userauth_request: invalid user root [preauth] Dec 29 13:38:59 host unix_chkpwd[10455]: password check failed for user (root) Dec 29 13:38:59 host sshd[10452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.69.41 user=root Dec 29 13:38:59 host sshd[10452]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 13:39:01 host sshd[10452]: Failed password for invalid user root from 134.209.69.41 port 50338 ssh2 Dec 29 13:39:01 host sshd[10452]: Received disconnect from 134.209.69.41 port 50338:11: Bye Bye [preauth] Dec 29 13:39:01 host sshd[10452]: Disconnected from 134.209.69.41 port 50338 [preauth] Dec 29 13:39:09 host sshd[10498]: User root from 13.65.16.18 not allowed because not listed in AllowUsers Dec 29 13:39:09 host sshd[10498]: input_userauth_request: invalid user root [preauth] Dec 29 13:39:09 host unix_chkpwd[10504]: password check failed for user (root) Dec 29 13:39:09 host sshd[10498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.65.16.18 user=root Dec 29 13:39:09 host sshd[10498]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 13:39:10 host sshd[10498]: Failed password for invalid user root from 13.65.16.18 port 58922 ssh2 Dec 29 13:39:11 host sshd[10498]: Received disconnect from 13.65.16.18 port 58922:11: Bye Bye [preauth] Dec 29 13:39:11 host sshd[10498]: Disconnected from 13.65.16.18 port 58922 [preauth] Dec 29 13:39:54 host sshd[10613]: User root from 52.140.61.101 not allowed because not listed in AllowUsers Dec 29 13:39:54 host sshd[10613]: input_userauth_request: invalid user root [preauth] Dec 29 13:39:54 host unix_chkpwd[10617]: password check failed for user (root) Dec 29 13:39:54 host sshd[10613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.140.61.101 user=root Dec 29 13:39:54 host sshd[10613]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 13:39:56 host sshd[10613]: Failed password for invalid user root from 52.140.61.101 port 54410 ssh2 Dec 29 13:39:56 host sshd[10613]: Received disconnect from 52.140.61.101 port 54410:11: Bye Bye [preauth] Dec 29 13:39:56 host sshd[10613]: Disconnected from 52.140.61.101 port 54410 [preauth] Dec 29 13:40:06 host sshd[10657]: User root from 43.153.25.8 not allowed because not listed in AllowUsers Dec 29 13:40:06 host sshd[10657]: input_userauth_request: invalid user root [preauth] Dec 29 13:40:06 host unix_chkpwd[10660]: password check failed for user (root) Dec 29 13:40:06 host sshd[10657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.25.8 user=root Dec 29 13:40:06 host sshd[10657]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 13:40:09 host sshd[10657]: Failed password for invalid user root from 43.153.25.8 port 44238 ssh2 Dec 29 13:40:09 host sshd[10657]: Received disconnect from 43.153.25.8 port 44238:11: Bye Bye [preauth] Dec 29 13:40:09 host sshd[10657]: Disconnected from 43.153.25.8 port 44238 [preauth] Dec 29 13:41:03 host sshd[10766]: User root from 202.163.121.58 not allowed because not listed in AllowUsers Dec 29 13:41:03 host sshd[10766]: input_userauth_request: invalid user root [preauth] Dec 29 13:41:03 host unix_chkpwd[10769]: password check failed for user (root) Dec 29 13:41:03 host sshd[10766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.163.121.58 user=root Dec 29 13:41:03 host sshd[10766]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 13:41:05 host sshd[10766]: Failed password for invalid user root from 202.163.121.58 port 53010 ssh2 Dec 29 13:41:05 host sshd[10766]: Received disconnect from 202.163.121.58 port 53010:11: Bye Bye [preauth] Dec 29 13:41:05 host sshd[10766]: Disconnected from 202.163.121.58 port 53010 [preauth] Dec 29 13:41:20 host sshd[10791]: User root from 167.99.114.108 not allowed because not listed in AllowUsers Dec 29 13:41:20 host sshd[10791]: input_userauth_request: invalid user root [preauth] Dec 29 13:41:20 host unix_chkpwd[10794]: password check failed for user (root) Dec 29 13:41:20 host sshd[10791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.114.108 user=root Dec 29 13:41:20 host sshd[10791]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 13:41:22 host sshd[10791]: Failed password for invalid user root from 167.99.114.108 port 35498 ssh2 Dec 29 13:41:23 host sshd[10791]: Received disconnect from 167.99.114.108 port 35498:11: Bye Bye [preauth] Dec 29 13:41:23 host sshd[10791]: Disconnected from 167.99.114.108 port 35498 [preauth] Dec 29 13:41:25 host sshd[10818]: User root from 173.82.206.226 not allowed because not listed in AllowUsers Dec 29 13:41:25 host sshd[10818]: input_userauth_request: invalid user root [preauth] Dec 29 13:41:25 host unix_chkpwd[10854]: password check failed for user (root) Dec 29 13:41:25 host sshd[10818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.82.206.226 user=root Dec 29 13:41:25 host sshd[10818]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 13:41:28 host sshd[10818]: Failed password for invalid user root from 173.82.206.226 port 46576 ssh2 Dec 29 13:41:28 host sshd[10818]: Received disconnect from 173.82.206.226 port 46576:11: Bye Bye [preauth] Dec 29 13:41:28 host sshd[10818]: Disconnected from 173.82.206.226 port 46576 [preauth] Dec 29 13:41:40 host sshd[10877]: User root from 128.199.111.126 not allowed because not listed in AllowUsers Dec 29 13:41:40 host sshd[10877]: input_userauth_request: invalid user root [preauth] Dec 29 13:41:40 host unix_chkpwd[10880]: password check failed for user (root) Dec 29 13:41:40 host sshd[10877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.111.126 user=root Dec 29 13:41:40 host sshd[10877]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 13:41:42 host sshd[10877]: Failed password for invalid user root from 128.199.111.126 port 43966 ssh2 Dec 29 13:41:42 host sshd[10877]: Received disconnect from 128.199.111.126 port 43966:11: Bye Bye [preauth] Dec 29 13:41:42 host sshd[10877]: Disconnected from 128.199.111.126 port 43966 [preauth] Dec 29 13:41:56 host sshd[10902]: User root from 134.209.69.41 not allowed because not listed in AllowUsers Dec 29 13:41:56 host sshd[10902]: input_userauth_request: invalid user root [preauth] Dec 29 13:41:56 host unix_chkpwd[10905]: password check failed for user (root) Dec 29 13:41:56 host sshd[10902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.69.41 user=root Dec 29 13:41:56 host sshd[10902]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 13:41:57 host sshd[10906]: User root from 13.77.174.169 not allowed because not listed in AllowUsers Dec 29 13:41:57 host sshd[10906]: input_userauth_request: invalid user root [preauth] Dec 29 13:41:57 host unix_chkpwd[10910]: password check failed for user (root) Dec 29 13:41:57 host sshd[10906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.77.174.169 user=root Dec 29 13:41:57 host sshd[10906]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 13:41:59 host sshd[10902]: Failed password for invalid user root from 134.209.69.41 port 35040 ssh2 Dec 29 13:41:59 host sshd[10902]: Received disconnect from 134.209.69.41 port 35040:11: Bye Bye [preauth] Dec 29 13:41:59 host sshd[10902]: Disconnected from 134.209.69.41 port 35040 [preauth] Dec 29 13:42:00 host sshd[10906]: Failed password for invalid user root from 13.77.174.169 port 39032 ssh2 Dec 29 13:42:00 host sshd[10906]: Received disconnect from 13.77.174.169 port 39032:11: Bye Bye [preauth] Dec 29 13:42:00 host sshd[10906]: Disconnected from 13.77.174.169 port 39032 [preauth] Dec 29 13:42:12 host sshd[10975]: User root from 134.209.106.24 not allowed because not listed in AllowUsers Dec 29 13:42:12 host sshd[10975]: input_userauth_request: invalid user root [preauth] Dec 29 13:42:12 host unix_chkpwd[10977]: password check failed for user (root) Dec 29 13:42:12 host sshd[10975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.106.24 user=root Dec 29 13:42:12 host sshd[10975]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 13:42:14 host sshd[10975]: Failed password for invalid user root from 134.209.106.24 port 40342 ssh2 Dec 29 13:42:14 host sshd[10975]: Received disconnect from 134.209.106.24 port 40342:11: Bye Bye [preauth] Dec 29 13:42:14 host sshd[10975]: Disconnected from 134.209.106.24 port 40342 [preauth] Dec 29 13:42:36 host sshd[11066]: User root from 52.140.61.101 not allowed because not listed in AllowUsers Dec 29 13:42:36 host sshd[11066]: input_userauth_request: invalid user root [preauth] Dec 29 13:42:36 host unix_chkpwd[11068]: password check failed for user (root) Dec 29 13:42:36 host sshd[11066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.140.61.101 user=root Dec 29 13:42:36 host sshd[11066]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 13:42:38 host sshd[11066]: Failed password for invalid user root from 52.140.61.101 port 46100 ssh2 Dec 29 13:42:38 host sshd[11066]: Received disconnect from 52.140.61.101 port 46100:11: Bye Bye [preauth] Dec 29 13:42:38 host sshd[11066]: Disconnected from 52.140.61.101 port 46100 [preauth] Dec 29 13:42:54 host sshd[11133]: User root from 159.65.12.104 not allowed because not listed in AllowUsers Dec 29 13:42:54 host sshd[11133]: input_userauth_request: invalid user root [preauth] Dec 29 13:42:55 host unix_chkpwd[11136]: password check failed for user (root) Dec 29 13:42:55 host sshd[11133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.12.104 user=root Dec 29 13:42:55 host sshd[11133]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 13:42:57 host sshd[11133]: Failed password for invalid user root from 159.65.12.104 port 57992 ssh2 Dec 29 13:42:57 host sshd[11133]: Received disconnect from 159.65.12.104 port 57992:11: Bye Bye [preauth] Dec 29 13:42:57 host sshd[11133]: Disconnected from 159.65.12.104 port 57992 [preauth] Dec 29 13:43:01 host sshd[11175]: User root from 13.65.16.18 not allowed because not listed in AllowUsers Dec 29 13:43:02 host sshd[11175]: input_userauth_request: invalid user root [preauth] Dec 29 13:43:02 host unix_chkpwd[11197]: password check failed for user (root) Dec 29 13:43:02 host sshd[11175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.65.16.18 user=root Dec 29 13:43:02 host sshd[11175]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 13:43:04 host sshd[11175]: Failed password for invalid user root from 13.65.16.18 port 49032 ssh2 Dec 29 13:43:04 host sshd[11175]: Received disconnect from 13.65.16.18 port 49032:11: Bye Bye [preauth] Dec 29 13:43:04 host sshd[11175]: Disconnected from 13.65.16.18 port 49032 [preauth] Dec 29 13:43:15 host sshd[11247]: User root from 173.82.206.226 not allowed because not listed in AllowUsers Dec 29 13:43:15 host sshd[11247]: input_userauth_request: invalid user root [preauth] Dec 29 13:43:15 host unix_chkpwd[11250]: password check failed for user (root) Dec 29 13:43:15 host sshd[11247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.82.206.226 user=root Dec 29 13:43:15 host sshd[11247]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 13:43:18 host sshd[11247]: Failed password for invalid user root from 173.82.206.226 port 53914 ssh2 Dec 29 13:43:18 host sshd[11247]: Received disconnect from 173.82.206.226 port 53914:11: Bye Bye [preauth] Dec 29 13:43:18 host sshd[11247]: Disconnected from 173.82.206.226 port 53914 [preauth] Dec 29 13:43:27 host sshd[11317]: User root from 110.172.191.114 not allowed because not listed in AllowUsers Dec 29 13:43:27 host sshd[11317]: input_userauth_request: invalid user root [preauth] Dec 29 13:43:27 host unix_chkpwd[11319]: password check failed for user (root) Dec 29 13:43:27 host sshd[11317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.172.191.114 user=root Dec 29 13:43:27 host sshd[11317]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 13:43:29 host sshd[11317]: Failed password for invalid user root from 110.172.191.114 port 49767 ssh2 Dec 29 13:43:29 host sshd[11317]: Received disconnect from 110.172.191.114 port 49767:11: Bye Bye [preauth] Dec 29 13:43:29 host sshd[11317]: Disconnected from 110.172.191.114 port 49767 [preauth] Dec 29 13:43:31 host sshd[11388]: User root from 128.199.111.126 not allowed because not listed in AllowUsers Dec 29 13:43:31 host sshd[11388]: input_userauth_request: invalid user root [preauth] Dec 29 13:43:31 host unix_chkpwd[11392]: password check failed for user (root) Dec 29 13:43:31 host sshd[11388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.111.126 user=root Dec 29 13:43:31 host sshd[11388]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 13:43:34 host sshd[11388]: Failed password for invalid user root from 128.199.111.126 port 33416 ssh2 Dec 29 13:43:34 host sshd[11388]: Received disconnect from 128.199.111.126 port 33416:11: Bye Bye [preauth] Dec 29 13:43:34 host sshd[11388]: Disconnected from 128.199.111.126 port 33416 [preauth] Dec 29 13:43:36 host sshd[11433]: User root from 43.153.25.8 not allowed because not listed in AllowUsers Dec 29 13:43:36 host sshd[11433]: input_userauth_request: invalid user root [preauth] Dec 29 13:43:36 host unix_chkpwd[11437]: password check failed for user (root) Dec 29 13:43:36 host sshd[11433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.25.8 user=root Dec 29 13:43:36 host sshd[11433]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 13:43:38 host sshd[11433]: Failed password for invalid user root from 43.153.25.8 port 54834 ssh2 Dec 29 13:43:38 host sshd[11433]: Received disconnect from 43.153.25.8 port 54834:11: Bye Bye [preauth] Dec 29 13:43:38 host sshd[11433]: Disconnected from 43.153.25.8 port 54834 [preauth] Dec 29 13:43:39 host sshd[11439]: User root from 202.163.121.58 not allowed because not listed in AllowUsers Dec 29 13:43:39 host sshd[11439]: input_userauth_request: invalid user root [preauth] Dec 29 13:43:39 host unix_chkpwd[11442]: password check failed for user (root) Dec 29 13:43:39 host sshd[11439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.163.121.58 user=root Dec 29 13:43:39 host sshd[11439]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 13:43:41 host sshd[11439]: Failed password for invalid user root from 202.163.121.58 port 37186 ssh2 Dec 29 13:43:46 host sshd[11516]: User root from 134.209.106.24 not allowed because not listed in AllowUsers Dec 29 13:43:46 host sshd[11516]: input_userauth_request: invalid user root [preauth] Dec 29 13:43:46 host unix_chkpwd[11518]: password check failed for user (root) Dec 29 13:43:46 host sshd[11516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.106.24 user=root Dec 29 13:43:46 host sshd[11516]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 13:43:48 host sshd[11516]: Failed password for invalid user root from 134.209.106.24 port 52740 ssh2 Dec 29 13:43:48 host sshd[11516]: Received disconnect from 134.209.106.24 port 52740:11: Bye Bye [preauth] Dec 29 13:43:48 host sshd[11516]: Disconnected from 134.209.106.24 port 52740 [preauth] Dec 29 13:44:47 host sshd[11831]: User root from 13.77.174.169 not allowed because not listed in AllowUsers Dec 29 13:44:47 host sshd[11831]: input_userauth_request: invalid user root [preauth] Dec 29 13:44:47 host unix_chkpwd[11836]: password check failed for user (root) Dec 29 13:44:47 host sshd[11831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.77.174.169 user=root Dec 29 13:44:47 host sshd[11831]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 13:44:49 host sshd[11831]: Failed password for invalid user root from 13.77.174.169 port 45396 ssh2 Dec 29 13:44:49 host sshd[11831]: Received disconnect from 13.77.174.169 port 45396:11: Bye Bye [preauth] Dec 29 13:44:49 host sshd[11831]: Disconnected from 13.77.174.169 port 45396 [preauth] Dec 29 14:05:10 host sshd[15338]: Invalid user colin from 205.214.74.6 port 37274 Dec 29 14:05:10 host sshd[15338]: input_userauth_request: invalid user colin [preauth] Dec 29 14:05:10 host sshd[15338]: pam_unix(sshd:auth): check pass; user unknown Dec 29 14:05:10 host sshd[15338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.214.74.6 Dec 29 14:05:12 host sshd[15338]: Failed password for invalid user colin from 205.214.74.6 port 37274 ssh2 Dec 29 14:05:13 host sshd[15338]: Received disconnect from 205.214.74.6 port 37274:11: Bye Bye [preauth] Dec 29 14:05:13 host sshd[15338]: Disconnected from 205.214.74.6 port 37274 [preauth] Dec 29 14:05:45 host sshd[15514]: Invalid user mark from 209.141.56.48 port 41404 Dec 29 14:05:45 host sshd[15514]: input_userauth_request: invalid user mark [preauth] Dec 29 14:05:45 host sshd[15514]: pam_unix(sshd:auth): check pass; user unknown Dec 29 14:05:45 host sshd[15514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Dec 29 14:05:47 host sshd[15514]: Failed password for invalid user mark from 209.141.56.48 port 41404 ssh2 Dec 29 14:05:47 host sshd[15514]: Connection closed by 209.141.56.48 port 41404 [preauth] Dec 29 14:11:11 host sshd[16316]: Invalid user wpuser from 205.214.74.6 port 37660 Dec 29 14:11:11 host sshd[16316]: input_userauth_request: invalid user wpuser [preauth] Dec 29 14:11:11 host sshd[16316]: pam_unix(sshd:auth): check pass; user unknown Dec 29 14:11:11 host sshd[16316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.214.74.6 Dec 29 14:11:13 host sshd[16316]: Failed password for invalid user wpuser from 205.214.74.6 port 37660 ssh2 Dec 29 14:11:13 host sshd[16316]: Received disconnect from 205.214.74.6 port 37660:11: Bye Bye [preauth] Dec 29 14:11:13 host sshd[16316]: Disconnected from 205.214.74.6 port 37660 [preauth] Dec 29 14:12:20 host sshd[16474]: User root from 205.214.74.6 not allowed because not listed in AllowUsers Dec 29 14:12:20 host sshd[16474]: input_userauth_request: invalid user root [preauth] Dec 29 14:12:20 host unix_chkpwd[16482]: password check failed for user (root) Dec 29 14:12:20 host sshd[16474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.214.74.6 user=root Dec 29 14:12:20 host sshd[16474]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 14:12:22 host sshd[16474]: Failed password for invalid user root from 205.214.74.6 port 33942 ssh2 Dec 29 14:14:11 host sshd[16781]: User root from 41.197.31.178 not allowed because not listed in AllowUsers Dec 29 14:14:11 host sshd[16781]: input_userauth_request: invalid user root [preauth] Dec 29 14:14:11 host unix_chkpwd[16785]: password check failed for user (root) Dec 29 14:14:11 host sshd[16781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 user=root Dec 29 14:14:11 host sshd[16781]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 14:14:14 host sshd[16781]: Failed password for invalid user root from 41.197.31.178 port 33292 ssh2 Dec 29 14:14:14 host sshd[16781]: Connection closed by 41.197.31.178 port 33292 [preauth] Dec 29 14:19:42 host sshd[17495]: Invalid user omnisky from 162.218.126.136 port 41138 Dec 29 14:19:42 host sshd[17495]: input_userauth_request: invalid user omnisky [preauth] Dec 29 14:19:43 host sshd[17495]: pam_unix(sshd:auth): check pass; user unknown Dec 29 14:19:43 host sshd[17495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 29 14:19:45 host sshd[17495]: Failed password for invalid user omnisky from 162.218.126.136 port 41138 ssh2 Dec 29 14:19:45 host sshd[17495]: Connection closed by 162.218.126.136 port 41138 [preauth] Dec 29 14:21:08 host sshd[17784]: User root from 149.202.89.19 not allowed because not listed in AllowUsers Dec 29 14:21:08 host sshd[17784]: input_userauth_request: invalid user root [preauth] Dec 29 14:21:08 host unix_chkpwd[17787]: password check failed for user (root) Dec 29 14:21:08 host sshd[17784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.89.19 user=root Dec 29 14:21:08 host sshd[17784]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 14:21:10 host sshd[17784]: Failed password for invalid user root from 149.202.89.19 port 60300 ssh2 Dec 29 14:21:11 host sshd[17784]: Connection closed by 149.202.89.19 port 60300 [preauth] Dec 29 14:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 14:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 14:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 14:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 14:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 14:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 14:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 14:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 14:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 14:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 29 14:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 14:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 14:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 29 14:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 14:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 14:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 29 14:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 14:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 14:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 29 14:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 14:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 14:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 29 14:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 14:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 14:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 29 14:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 14:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 14:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 29 14:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 14:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 14:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 29 14:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 14:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 29 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=laundryboniface user-4=dartsimp user-5=a2zgroup user-6=wwwpmcresource user-7=wwwrmswll user-8=keralaholi user-9=wwwresourcehunte user-10=ugotscom user-11=travelboniface user-12=woodpeck user-13=wwwkapin user-14=disposeat user-15=wwwkmaorg user-16=remysagr user-17=pmcresources user-18=vfmassets user-19=wwwtestugo user-20=shalinijames user-21=wwwletsstalkfood user-22=straightcurve user-23=bonifacegroup user-24=wwwevmhonda user-25=wwwnexidigital user-26=mrsclean user-27=gifterman user-28=palco123 user-29=phmetals user-30=kottayamcalldriv feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 29 14:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 29 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fUArPd0VAas1GpHY.~ Dec 29 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fUArPd0VAas1GpHY.~' Dec 29 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fUArPd0VAas1GpHY.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 29 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 29 14:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 14:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 14:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 14:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 14:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 14:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 14:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 14:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 14:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 14:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 14:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 14:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 29 14:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 14:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 29 14:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 29 14:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 29 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 29 14:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 14:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 14:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 29 14:21:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 14:22:00 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 14:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 29 14:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 14:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 14:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 29 14:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 14:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 14:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 29 14:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 14:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 14:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 29 14:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 14:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 14:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 29 14:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 14:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 14:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 29 14:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 14:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 14:23:52 host sshd[18302]: User root from 138.68.74.198 not allowed because not listed in AllowUsers Dec 29 14:23:52 host sshd[18302]: input_userauth_request: invalid user root [preauth] Dec 29 14:23:52 host unix_chkpwd[18305]: password check failed for user (root) Dec 29 14:23:52 host sshd[18302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.74.198 user=root Dec 29 14:23:52 host sshd[18302]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 14:23:54 host sshd[18302]: Failed password for invalid user root from 138.68.74.198 port 37312 ssh2 Dec 29 14:23:55 host sshd[18302]: Connection closed by 138.68.74.198 port 37312 [preauth] Dec 29 14:24:16 host sshd[18336]: Invalid user mark from 209.141.56.48 port 60096 Dec 29 14:24:16 host sshd[18336]: input_userauth_request: invalid user mark [preauth] Dec 29 14:24:16 host sshd[18336]: pam_unix(sshd:auth): check pass; user unknown Dec 29 14:24:16 host sshd[18336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Dec 29 14:24:18 host sshd[18336]: Failed password for invalid user mark from 209.141.56.48 port 60096 ssh2 Dec 29 14:24:18 host sshd[18336]: Connection closed by 209.141.56.48 port 60096 [preauth] Dec 29 14:27:35 host sshd[18845]: User root from 149.202.89.19 not allowed because not listed in AllowUsers Dec 29 14:27:35 host sshd[18845]: input_userauth_request: invalid user root [preauth] Dec 29 14:27:36 host unix_chkpwd[18852]: password check failed for user (root) Dec 29 14:27:36 host sshd[18845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.89.19 user=root Dec 29 14:27:36 host sshd[18845]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 14:27:38 host sshd[18845]: Failed password for invalid user root from 149.202.89.19 port 50360 ssh2 Dec 29 14:27:38 host sshd[18845]: Connection closed by 149.202.89.19 port 50360 [preauth] Dec 29 14:29:46 host sshd[19131]: User root from 138.68.74.198 not allowed because not listed in AllowUsers Dec 29 14:29:46 host sshd[19131]: input_userauth_request: invalid user root [preauth] Dec 29 14:29:46 host unix_chkpwd[19139]: password check failed for user (root) Dec 29 14:29:46 host sshd[19131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.74.198 user=root Dec 29 14:29:46 host sshd[19131]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 14:29:47 host sshd[19131]: Failed password for invalid user root from 138.68.74.198 port 41224 ssh2 Dec 29 14:29:48 host sshd[19131]: Connection closed by 138.68.74.198 port 41224 [preauth] Dec 29 14:30:31 host sshd[19262]: Did not receive identification string from 149.129.220.104 port 61000 Dec 29 14:38:38 host sshd[20366]: Invalid user tdatuser from 103.13.40.2 port 53326 Dec 29 14:38:38 host sshd[20366]: input_userauth_request: invalid user tdatuser [preauth] Dec 29 14:38:38 host sshd[20366]: pam_unix(sshd:auth): check pass; user unknown Dec 29 14:38:38 host sshd[20366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 29 14:38:39 host sshd[20366]: Failed password for invalid user tdatuser from 103.13.40.2 port 53326 ssh2 Dec 29 14:38:39 host sshd[20366]: Connection closed by 103.13.40.2 port 53326 [preauth] Dec 29 14:40:11 host sshd[20543]: Invalid user admin from 194.169.175.102 port 55780 Dec 29 14:40:11 host sshd[20543]: input_userauth_request: invalid user admin [preauth] Dec 29 14:40:11 host sshd[20543]: pam_unix(sshd:auth): check pass; user unknown Dec 29 14:40:11 host sshd[20543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 Dec 29 14:40:12 host sshd[20543]: Failed password for invalid user admin from 194.169.175.102 port 55780 ssh2 Dec 29 14:40:12 host sshd[20543]: Received disconnect from 194.169.175.102 port 55780:11: Client disconnecting normally [preauth] Dec 29 14:40:12 host sshd[20543]: Disconnected from 194.169.175.102 port 55780 [preauth] Dec 29 14:45:57 host sshd[21326]: Invalid user user from 106.10.122.53 port 55408 Dec 29 14:45:57 host sshd[21326]: input_userauth_request: invalid user user [preauth] Dec 29 14:45:57 host sshd[21326]: pam_unix(sshd:auth): check pass; user unknown Dec 29 14:45:57 host sshd[21326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 29 14:45:59 host sshd[21326]: Failed password for invalid user user from 106.10.122.53 port 55408 ssh2 Dec 29 14:45:59 host sshd[21326]: Connection closed by 106.10.122.53 port 55408 [preauth] Dec 29 14:53:09 host sshd[22493]: Did not receive identification string from 104.152.52.211 port 45587 Dec 29 14:53:40 host sshd[22680]: User root from 201.131.164.160 not allowed because not listed in AllowUsers Dec 29 14:53:40 host sshd[22680]: input_userauth_request: invalid user root [preauth] Dec 29 14:53:40 host unix_chkpwd[22687]: password check failed for user (root) Dec 29 14:53:40 host sshd[22680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.131.164.160 user=root Dec 29 14:53:40 host sshd[22680]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 14:53:42 host sshd[22680]: Failed password for invalid user root from 201.131.164.160 port 41172 ssh2 Dec 29 14:53:42 host sshd[22680]: Received disconnect from 201.131.164.160 port 41172:11: Bye Bye [preauth] Dec 29 14:53:42 host sshd[22680]: Disconnected from 201.131.164.160 port 41172 [preauth] Dec 29 14:54:04 host sshd[22755]: User root from 174.101.75.44 not allowed because not listed in AllowUsers Dec 29 14:54:04 host sshd[22755]: input_userauth_request: invalid user root [preauth] Dec 29 14:54:04 host unix_chkpwd[22764]: password check failed for user (root) Dec 29 14:54:04 host sshd[22755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.101.75.44 user=root Dec 29 14:54:04 host sshd[22755]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 14:54:06 host sshd[22755]: Failed password for invalid user root from 174.101.75.44 port 34606 ssh2 Dec 29 14:54:07 host sshd[22755]: Received disconnect from 174.101.75.44 port 34606:11: Bye Bye [preauth] Dec 29 14:54:07 host sshd[22755]: Disconnected from 174.101.75.44 port 34606 [preauth] Dec 29 14:55:00 host sshd[22894]: User root from 65.49.192.87 not allowed because not listed in AllowUsers Dec 29 14:55:00 host sshd[22894]: input_userauth_request: invalid user root [preauth] Dec 29 14:55:00 host unix_chkpwd[22898]: password check failed for user (root) Dec 29 14:55:00 host sshd[22894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.49.192.87 user=root Dec 29 14:55:00 host sshd[22894]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 14:55:02 host sshd[22894]: Failed password for invalid user root from 65.49.192.87 port 50990 ssh2 Dec 29 14:55:02 host sshd[22894]: Received disconnect from 65.49.192.87 port 50990:11: Bye Bye [preauth] Dec 29 14:55:02 host sshd[22894]: Disconnected from 65.49.192.87 port 50990 [preauth] Dec 29 14:56:40 host sshd[23120]: User root from 172.174.53.158 not allowed because not listed in AllowUsers Dec 29 14:56:40 host sshd[23120]: input_userauth_request: invalid user root [preauth] Dec 29 14:56:40 host unix_chkpwd[23124]: password check failed for user (root) Dec 29 14:56:40 host sshd[23120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.174.53.158 user=root Dec 29 14:56:40 host sshd[23120]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 14:56:41 host sshd[23120]: Failed password for invalid user root from 172.174.53.158 port 42076 ssh2 Dec 29 14:56:41 host sshd[23120]: Received disconnect from 172.174.53.158 port 42076:11: Bye Bye [preauth] Dec 29 14:56:41 host sshd[23120]: Disconnected from 172.174.53.158 port 42076 [preauth] Dec 29 14:58:12 host sshd[23275]: Connection closed by 174.101.75.44 port 43892 [preauth] Dec 29 14:58:14 host sshd[23304]: User root from 172.174.53.158 not allowed because not listed in AllowUsers Dec 29 14:58:14 host sshd[23304]: input_userauth_request: invalid user root [preauth] Dec 29 14:58:14 host unix_chkpwd[23307]: password check failed for user (root) Dec 29 14:58:14 host sshd[23304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.174.53.158 user=root Dec 29 14:58:14 host sshd[23304]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 14:58:16 host sshd[23304]: Failed password for invalid user root from 172.174.53.158 port 36108 ssh2 Dec 29 14:58:16 host sshd[23304]: Received disconnect from 172.174.53.158 port 36108:11: Bye Bye [preauth] Dec 29 14:58:16 host sshd[23304]: Disconnected from 172.174.53.158 port 36108 [preauth] Dec 29 14:58:21 host sshd[23343]: User root from 201.131.164.160 not allowed because not listed in AllowUsers Dec 29 14:58:21 host sshd[23343]: input_userauth_request: invalid user root [preauth] Dec 29 14:58:21 host unix_chkpwd[23348]: password check failed for user (root) Dec 29 14:58:21 host sshd[23343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.131.164.160 user=root Dec 29 14:58:21 host sshd[23343]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 14:58:22 host sshd[23343]: Failed password for invalid user root from 201.131.164.160 port 34116 ssh2 Dec 29 14:58:23 host sshd[23343]: Received disconnect from 201.131.164.160 port 34116:11: Bye Bye [preauth] Dec 29 14:58:23 host sshd[23343]: Disconnected from 201.131.164.160 port 34116 [preauth] Dec 29 14:58:41 host sshd[23441]: User root from 2.226.152.85 not allowed because not listed in AllowUsers Dec 29 14:58:41 host sshd[23441]: input_userauth_request: invalid user root [preauth] Dec 29 14:58:41 host unix_chkpwd[23496]: password check failed for user (root) Dec 29 14:58:41 host sshd[23441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.226.152.85 user=root Dec 29 14:58:41 host sshd[23441]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 14:58:43 host sshd[23441]: Failed password for invalid user root from 2.226.152.85 port 34732 ssh2 Dec 29 14:58:43 host sshd[23441]: Received disconnect from 2.226.152.85 port 34732:11: Bye Bye [preauth] Dec 29 14:58:43 host sshd[23441]: Disconnected from 2.226.152.85 port 34732 [preauth] Dec 29 14:59:05 host sshd[23588]: User root from 65.49.192.87 not allowed because not listed in AllowUsers Dec 29 14:59:05 host sshd[23588]: input_userauth_request: invalid user root [preauth] Dec 29 14:59:05 host unix_chkpwd[23591]: password check failed for user (root) Dec 29 14:59:05 host sshd[23588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.49.192.87 user=root Dec 29 14:59:05 host sshd[23588]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 14:59:07 host sshd[23588]: Failed password for invalid user root from 65.49.192.87 port 37342 ssh2 Dec 29 14:59:47 host sshd[23679]: Connection closed by 174.101.75.44 port 56836 [preauth] Dec 29 15:01:28 host sshd[23935]: User root from 174.101.75.44 not allowed because not listed in AllowUsers Dec 29 15:01:28 host sshd[23935]: input_userauth_request: invalid user root [preauth] Dec 29 15:01:28 host unix_chkpwd[23964]: password check failed for user (root) Dec 29 15:01:28 host sshd[23935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.101.75.44 user=root Dec 29 15:01:28 host sshd[23935]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 15:01:30 host sshd[23935]: Failed password for invalid user root from 174.101.75.44 port 51608 ssh2 Dec 29 15:01:30 host sshd[23935]: Received disconnect from 174.101.75.44 port 51608:11: Bye Bye [preauth] Dec 29 15:01:30 host sshd[23935]: Disconnected from 174.101.75.44 port 51608 [preauth] Dec 29 15:03:43 host sshd[24228]: User root from 2.226.152.85 not allowed because not listed in AllowUsers Dec 29 15:03:43 host sshd[24228]: input_userauth_request: invalid user root [preauth] Dec 29 15:03:43 host unix_chkpwd[24231]: password check failed for user (root) Dec 29 15:03:43 host sshd[24228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.226.152.85 user=root Dec 29 15:03:43 host sshd[24228]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 15:03:46 host sshd[24228]: Failed password for invalid user root from 2.226.152.85 port 33234 ssh2 Dec 29 15:03:46 host sshd[24228]: Received disconnect from 2.226.152.85 port 33234:11: Bye Bye [preauth] Dec 29 15:03:46 host sshd[24228]: Disconnected from 2.226.152.85 port 33234 [preauth] Dec 29 15:13:07 host sshd[25649]: Invalid user eo from 45.93.201.90 port 48402 Dec 29 15:13:07 host sshd[25649]: input_userauth_request: invalid user eo [preauth] Dec 29 15:13:07 host sshd[25649]: pam_unix(sshd:auth): check pass; user unknown Dec 29 15:13:07 host sshd[25649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 29 15:13:08 host sshd[25649]: Failed password for invalid user eo from 45.93.201.90 port 48402 ssh2 Dec 29 15:13:11 host sshd[25649]: pam_unix(sshd:auth): check pass; user unknown Dec 29 15:13:14 host sshd[25649]: Failed password for invalid user eo from 45.93.201.90 port 48402 ssh2 Dec 29 15:13:17 host sshd[25649]: pam_unix(sshd:auth): check pass; user unknown Dec 29 15:13:18 host sshd[25649]: Failed password for invalid user eo from 45.93.201.90 port 48402 ssh2 Dec 29 15:13:22 host sshd[25649]: Connection closed by 45.93.201.90 port 48402 [preauth] Dec 29 15:13:22 host sshd[25649]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 29 15:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 15:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 15:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 15:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 15:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 15:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 15:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 15:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 15:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 29 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 29 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 29 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 29 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 29 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 29 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 29 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 29 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 15:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 15:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 29 15:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 15:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkapin user-2=woodpeck user-3=disposeat user-4=wwwkmaorg user-5=remysagr user-6=pmcresources user-7=vfmassets user-8=shalinijames user-9=wwwtestugo user-10=straightcurve user-11=wwwletsstalkfood user-12=bonifacegroup user-13=wwwevmhonda user-14=mrsclean user-15=wwwnexidigital user-16=palco123 user-17=gifterman user-18=kottayamcalldriv user-19=phmetals user-20=wwwkaretakers user-21=cochintaxi user-22=laundryboniface user-23=a2zgroup user-24=dartsimp user-25=wwwpmcresource user-26=wwwresourcehunte user-27=keralaholi user-28=wwwrmswll user-29=ugotscom user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 29 15:21:50 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 29 15:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 15:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 15:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 15:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-eq2fxnJ9gmRJOKjw.~ Dec 29 15:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 15:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-eq2fxnJ9gmRJOKjw.~' Dec 29 15:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 15:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-eq2fxnJ9gmRJOKjw.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 15:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 15:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 29 15:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 15:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 29 15:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 15:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 15:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 29 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 15:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 15:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 29 15:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 29 15:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 29 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 29 15:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 15:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 15:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 29 15:21:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 15:21:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 15:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 29 15:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 15:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 15:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 29 15:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 15:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 15:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 29 15:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 15:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 15:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 29 15:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 15:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 15:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 29 15:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 15:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 15:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 29 15:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 15:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 15:36:05 host sshd[29576]: User root from 103.171.84.241 not allowed because not listed in AllowUsers Dec 29 15:36:05 host sshd[29576]: input_userauth_request: invalid user root [preauth] Dec 29 15:36:05 host unix_chkpwd[29580]: password check failed for user (root) Dec 29 15:36:05 host sshd[29576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.171.84.241 user=root Dec 29 15:36:05 host sshd[29576]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 15:36:07 host sshd[29576]: Failed password for invalid user root from 103.171.84.241 port 48808 ssh2 Dec 29 15:36:07 host sshd[29576]: Received disconnect from 103.171.84.241 port 48808:11: Bye Bye [preauth] Dec 29 15:36:07 host sshd[29576]: Disconnected from 103.171.84.241 port 48808 [preauth] Dec 29 15:37:45 host sshd[29835]: User root from 34.126.108.141 not allowed because not listed in AllowUsers Dec 29 15:37:45 host sshd[29835]: input_userauth_request: invalid user root [preauth] Dec 29 15:37:45 host unix_chkpwd[29837]: password check failed for user (root) Dec 29 15:37:45 host sshd[29835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.126.108.141 user=root Dec 29 15:37:45 host sshd[29835]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 15:37:47 host sshd[29835]: Failed password for invalid user root from 34.126.108.141 port 49480 ssh2 Dec 29 15:37:47 host sshd[29835]: Received disconnect from 34.126.108.141 port 49480:11: Bye Bye [preauth] Dec 29 15:37:47 host sshd[29835]: Disconnected from 34.126.108.141 port 49480 [preauth] Dec 29 15:39:01 host sshd[29999]: User root from 159.65.205.113 not allowed because not listed in AllowUsers Dec 29 15:39:01 host sshd[29999]: input_userauth_request: invalid user root [preauth] Dec 29 15:39:01 host unix_chkpwd[30003]: password check failed for user (root) Dec 29 15:39:01 host sshd[29999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.205.113 user=root Dec 29 15:39:01 host sshd[29999]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 15:39:03 host sshd[29999]: Failed password for invalid user root from 159.65.205.113 port 38990 ssh2 Dec 29 15:39:04 host sshd[29999]: Received disconnect from 159.65.205.113 port 38990:11: Bye Bye [preauth] Dec 29 15:39:04 host sshd[29999]: Disconnected from 159.65.205.113 port 38990 [preauth] Dec 29 15:39:14 host sshd[30036]: User root from 92.36.149.243 not allowed because not listed in AllowUsers Dec 29 15:39:14 host sshd[30036]: input_userauth_request: invalid user root [preauth] Dec 29 15:39:14 host unix_chkpwd[30039]: password check failed for user (root) Dec 29 15:39:14 host sshd[30036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.36.149.243 user=root Dec 29 15:39:14 host sshd[30036]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 15:39:16 host sshd[30036]: Failed password for invalid user root from 92.36.149.243 port 35870 ssh2 Dec 29 15:39:17 host sshd[30036]: Received disconnect from 92.36.149.243 port 35870:11: Bye Bye [preauth] Dec 29 15:39:17 host sshd[30036]: Disconnected from 92.36.149.243 port 35870 [preauth] Dec 29 15:40:03 host sshd[30158]: User root from 159.203.189.4 not allowed because not listed in AllowUsers Dec 29 15:40:03 host sshd[30158]: input_userauth_request: invalid user root [preauth] Dec 29 15:40:03 host unix_chkpwd[30161]: password check failed for user (root) Dec 29 15:40:03 host sshd[30158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.189.4 user=root Dec 29 15:40:03 host sshd[30158]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 15:40:05 host sshd[30158]: Failed password for invalid user root from 159.203.189.4 port 59232 ssh2 Dec 29 15:40:05 host sshd[30158]: Received disconnect from 159.203.189.4 port 59232:11: Bye Bye [preauth] Dec 29 15:40:05 host sshd[30158]: Disconnected from 159.203.189.4 port 59232 [preauth] Dec 29 15:40:13 host sshd[30178]: User root from 20.194.60.135 not allowed because not listed in AllowUsers Dec 29 15:40:13 host sshd[30178]: input_userauth_request: invalid user root [preauth] Dec 29 15:40:13 host unix_chkpwd[30181]: password check failed for user (root) Dec 29 15:40:13 host sshd[30178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.194.60.135 user=root Dec 29 15:40:13 host sshd[30178]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 15:40:15 host sshd[30178]: Failed password for invalid user root from 20.194.60.135 port 49826 ssh2 Dec 29 15:40:16 host sshd[30178]: Received disconnect from 20.194.60.135 port 49826:11: Bye Bye [preauth] Dec 29 15:40:16 host sshd[30178]: Disconnected from 20.194.60.135 port 49826 [preauth] Dec 29 15:40:44 host sshd[30369]: User root from 103.150.60.6 not allowed because not listed in AllowUsers Dec 29 15:40:44 host sshd[30369]: input_userauth_request: invalid user root [preauth] Dec 29 15:40:44 host unix_chkpwd[30371]: password check failed for user (root) Dec 29 15:40:44 host sshd[30369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.150.60.6 user=root Dec 29 15:40:44 host sshd[30369]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 15:40:46 host sshd[30369]: Failed password for invalid user root from 103.150.60.6 port 51176 ssh2 Dec 29 15:40:46 host sshd[30369]: Received disconnect from 103.150.60.6 port 51176:11: Bye Bye [preauth] Dec 29 15:40:46 host sshd[30369]: Disconnected from 103.150.60.6 port 51176 [preauth] Dec 29 15:40:51 host sshd[30387]: User root from 159.65.205.113 not allowed because not listed in AllowUsers Dec 29 15:40:51 host sshd[30387]: input_userauth_request: invalid user root [preauth] Dec 29 15:40:51 host unix_chkpwd[30392]: password check failed for user (root) Dec 29 15:40:51 host sshd[30387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.205.113 user=root Dec 29 15:40:51 host sshd[30387]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 15:40:54 host sshd[30387]: Failed password for invalid user root from 159.65.205.113 port 41500 ssh2 Dec 29 15:41:10 host sshd[30461]: User root from 198.211.121.90 not allowed because not listed in AllowUsers Dec 29 15:41:10 host sshd[30461]: input_userauth_request: invalid user root [preauth] Dec 29 15:41:10 host unix_chkpwd[30466]: password check failed for user (root) Dec 29 15:41:10 host sshd[30461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.121.90 user=root Dec 29 15:41:10 host sshd[30461]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 15:41:11 host sshd[30467]: User root from 34.126.108.141 not allowed because not listed in AllowUsers Dec 29 15:41:11 host sshd[30467]: input_userauth_request: invalid user root [preauth] Dec 29 15:41:11 host unix_chkpwd[30469]: password check failed for user (root) Dec 29 15:41:11 host sshd[30467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.126.108.141 user=root Dec 29 15:41:11 host sshd[30467]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 15:41:12 host sshd[30461]: Failed password for invalid user root from 198.211.121.90 port 56402 ssh2 Dec 29 15:41:12 host sshd[30467]: Failed password for invalid user root from 34.126.108.141 port 58296 ssh2 Dec 29 15:41:12 host sshd[30467]: Received disconnect from 34.126.108.141 port 58296:11: Bye Bye [preauth] Dec 29 15:41:12 host sshd[30467]: Disconnected from 34.126.108.141 port 58296 [preauth] Dec 29 15:41:12 host sshd[30461]: Received disconnect from 198.211.121.90 port 56402:11: Bye Bye [preauth] Dec 29 15:41:12 host sshd[30461]: Disconnected from 198.211.121.90 port 56402 [preauth] Dec 29 15:41:13 host sshd[30472]: User root from 103.171.84.241 not allowed because not listed in AllowUsers Dec 29 15:41:13 host sshd[30472]: input_userauth_request: invalid user root [preauth] Dec 29 15:41:13 host unix_chkpwd[30494]: password check failed for user (root) Dec 29 15:41:13 host sshd[30472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.171.84.241 user=root Dec 29 15:41:13 host sshd[30472]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 15:41:15 host sshd[30472]: Failed password for invalid user root from 103.171.84.241 port 45798 ssh2 Dec 29 15:41:16 host sshd[30472]: Received disconnect from 103.171.84.241 port 45798:11: Bye Bye [preauth] Dec 29 15:41:16 host sshd[30472]: Disconnected from 103.171.84.241 port 45798 [preauth] Dec 29 15:42:26 host sshd[30703]: User root from 159.203.189.4 not allowed because not listed in AllowUsers Dec 29 15:42:26 host sshd[30703]: input_userauth_request: invalid user root [preauth] Dec 29 15:42:26 host unix_chkpwd[30706]: password check failed for user (root) Dec 29 15:42:26 host sshd[30703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.189.4 user=root Dec 29 15:42:26 host sshd[30703]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 15:42:28 host sshd[30703]: Failed password for invalid user root from 159.203.189.4 port 52576 ssh2 Dec 29 15:42:28 host sshd[30703]: Received disconnect from 159.203.189.4 port 52576:11: Bye Bye [preauth] Dec 29 15:42:28 host sshd[30703]: Disconnected from 159.203.189.4 port 52576 [preauth] Dec 29 15:42:31 host sshd[30741]: User root from 103.150.60.6 not allowed because not listed in AllowUsers Dec 29 15:42:31 host sshd[30741]: input_userauth_request: invalid user root [preauth] Dec 29 15:42:31 host unix_chkpwd[30743]: password check failed for user (root) Dec 29 15:42:31 host sshd[30741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.150.60.6 user=root Dec 29 15:42:31 host sshd[30741]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 15:42:33 host sshd[30741]: Failed password for invalid user root from 103.150.60.6 port 49736 ssh2 Dec 29 15:42:33 host sshd[30741]: Received disconnect from 103.150.60.6 port 49736:11: Bye Bye [preauth] Dec 29 15:42:33 host sshd[30741]: Disconnected from 103.150.60.6 port 49736 [preauth] Dec 29 15:42:34 host sshd[30755]: User root from 198.211.121.90 not allowed because not listed in AllowUsers Dec 29 15:42:34 host sshd[30755]: input_userauth_request: invalid user root [preauth] Dec 29 15:42:34 host unix_chkpwd[30782]: password check failed for user (root) Dec 29 15:42:34 host sshd[30755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.121.90 user=root Dec 29 15:42:34 host sshd[30755]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 15:42:36 host sshd[30755]: Failed password for invalid user root from 198.211.121.90 port 52664 ssh2 Dec 29 15:42:36 host sshd[30755]: Received disconnect from 198.211.121.90 port 52664:11: Bye Bye [preauth] Dec 29 15:42:36 host sshd[30755]: Disconnected from 198.211.121.90 port 52664 [preauth] Dec 29 15:44:34 host sshd[31033]: User root from 20.194.60.135 not allowed because not listed in AllowUsers Dec 29 15:44:34 host sshd[31033]: input_userauth_request: invalid user root [preauth] Dec 29 15:44:34 host unix_chkpwd[31036]: password check failed for user (root) Dec 29 15:44:34 host sshd[31033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.194.60.135 user=root Dec 29 15:44:34 host sshd[31033]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 15:44:36 host sshd[31033]: Failed password for invalid user root from 20.194.60.135 port 53418 ssh2 Dec 29 15:44:36 host sshd[31033]: Received disconnect from 20.194.60.135 port 53418:11: Bye Bye [preauth] Dec 29 15:44:36 host sshd[31033]: Disconnected from 20.194.60.135 port 53418 [preauth] Dec 29 15:54:27 host sshd[32393]: Invalid user nagios from 162.218.126.136 port 35664 Dec 29 15:54:27 host sshd[32393]: input_userauth_request: invalid user nagios [preauth] Dec 29 15:54:28 host sshd[32393]: pam_unix(sshd:auth): check pass; user unknown Dec 29 15:54:28 host sshd[32393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 29 15:54:30 host sshd[32393]: Failed password for invalid user nagios from 162.218.126.136 port 35664 ssh2 Dec 29 15:54:30 host sshd[32393]: Connection closed by 162.218.126.136 port 35664 [preauth] Dec 29 15:56:47 host sshd[32747]: User root from 128.199.162.2 not allowed because not listed in AllowUsers Dec 29 15:56:47 host sshd[32747]: input_userauth_request: invalid user root [preauth] Dec 29 15:56:47 host unix_chkpwd[32749]: password check failed for user (root) Dec 29 15:56:47 host sshd[32747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.162.2 user=root Dec 29 15:56:47 host sshd[32747]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 15:56:49 host sshd[32747]: Failed password for invalid user root from 128.199.162.2 port 48885 ssh2 Dec 29 15:56:49 host sshd[32747]: Received disconnect from 128.199.162.2 port 48885:11: Bye Bye [preauth] Dec 29 15:56:49 host sshd[32747]: Disconnected from 128.199.162.2 port 48885 [preauth] Dec 29 15:57:28 host sshd[398]: User root from 202.137.26.4 not allowed because not listed in AllowUsers Dec 29 15:57:28 host sshd[398]: input_userauth_request: invalid user root [preauth] Dec 29 15:57:28 host unix_chkpwd[400]: password check failed for user (root) Dec 29 15:57:28 host sshd[398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.137.26.4 user=root Dec 29 15:57:28 host sshd[398]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 15:57:30 host sshd[398]: Failed password for invalid user root from 202.137.26.4 port 38812 ssh2 Dec 29 15:57:30 host sshd[398]: Received disconnect from 202.137.26.4 port 38812:11: Bye Bye [preauth] Dec 29 15:57:30 host sshd[398]: Disconnected from 202.137.26.4 port 38812 [preauth] Dec 29 15:58:32 host sshd[523]: User root from 184.18.211.199 not allowed because not listed in AllowUsers Dec 29 15:58:32 host sshd[523]: input_userauth_request: invalid user root [preauth] Dec 29 15:58:32 host unix_chkpwd[526]: password check failed for user (root) Dec 29 15:58:32 host sshd[523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.18.211.199 user=root Dec 29 15:58:32 host sshd[523]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 15:58:33 host sshd[523]: Failed password for invalid user root from 184.18.211.199 port 56696 ssh2 Dec 29 15:58:33 host sshd[523]: Received disconnect from 184.18.211.199 port 56696:11: Bye Bye [preauth] Dec 29 15:58:33 host sshd[523]: Disconnected from 184.18.211.199 port 56696 [preauth] Dec 29 15:58:52 host sshd[550]: User root from 162.243.48.133 not allowed because not listed in AllowUsers Dec 29 15:58:52 host sshd[550]: input_userauth_request: invalid user root [preauth] Dec 29 15:58:52 host unix_chkpwd[554]: password check failed for user (root) Dec 29 15:58:52 host sshd[550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.48.133 user=root Dec 29 15:58:52 host sshd[550]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 15:58:55 host sshd[550]: Failed password for invalid user root from 162.243.48.133 port 46734 ssh2 Dec 29 15:58:55 host sshd[550]: Received disconnect from 162.243.48.133 port 46734:11: Bye Bye [preauth] Dec 29 15:58:55 host sshd[550]: Disconnected from 162.243.48.133 port 46734 [preauth] Dec 29 15:59:11 host sshd[583]: Invalid user lighthouse from 141.145.193.96 port 44788 Dec 29 15:59:11 host sshd[583]: input_userauth_request: invalid user lighthouse [preauth] Dec 29 15:59:11 host sshd[583]: pam_unix(sshd:auth): check pass; user unknown Dec 29 15:59:11 host sshd[583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.145.193.96 Dec 29 15:59:13 host sshd[583]: Failed password for invalid user lighthouse from 141.145.193.96 port 44788 ssh2 Dec 29 15:59:13 host sshd[583]: Received disconnect from 141.145.193.96 port 44788:11: Bye Bye [preauth] Dec 29 15:59:13 host sshd[583]: Disconnected from 141.145.193.96 port 44788 [preauth] Dec 29 15:59:23 host sshd[596]: Invalid user nginx from 92.46.108.20 port 59320 Dec 29 15:59:23 host sshd[596]: input_userauth_request: invalid user nginx [preauth] Dec 29 15:59:24 host sshd[596]: pam_unix(sshd:auth): check pass; user unknown Dec 29 15:59:24 host sshd[596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 29 15:59:25 host sshd[596]: Failed password for invalid user nginx from 92.46.108.20 port 59320 ssh2 Dec 29 15:59:26 host sshd[596]: Connection closed by 92.46.108.20 port 59320 [preauth] Dec 29 16:01:30 host sshd[921]: User root from 172.96.251.203 not allowed because not listed in AllowUsers Dec 29 16:01:30 host sshd[921]: input_userauth_request: invalid user root [preauth] Dec 29 16:01:30 host unix_chkpwd[930]: password check failed for user (root) Dec 29 16:01:30 host sshd[921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.96.251.203 user=root Dec 29 16:01:30 host sshd[921]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 16:01:32 host sshd[921]: Failed password for invalid user root from 172.96.251.203 port 55304 ssh2 Dec 29 16:01:32 host sshd[921]: Received disconnect from 172.96.251.203 port 55304:11: Bye Bye [preauth] Dec 29 16:01:32 host sshd[921]: Disconnected from 172.96.251.203 port 55304 [preauth] Dec 29 16:01:55 host sshd[974]: User root from 27.118.22.221 not allowed because not listed in AllowUsers Dec 29 16:01:55 host sshd[974]: input_userauth_request: invalid user root [preauth] Dec 29 16:01:55 host unix_chkpwd[976]: password check failed for user (root) Dec 29 16:01:55 host sshd[974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.118.22.221 user=root Dec 29 16:01:55 host sshd[974]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 16:01:56 host sshd[974]: Failed password for invalid user root from 27.118.22.221 port 50258 ssh2 Dec 29 16:01:56 host sshd[974]: Received disconnect from 27.118.22.221 port 50258:11: Bye Bye [preauth] Dec 29 16:01:56 host sshd[974]: Disconnected from 27.118.22.221 port 50258 [preauth] Dec 29 16:02:38 host sshd[1069]: User root from 128.199.162.2 not allowed because not listed in AllowUsers Dec 29 16:02:38 host sshd[1069]: input_userauth_request: invalid user root [preauth] Dec 29 16:02:38 host unix_chkpwd[1072]: password check failed for user (root) Dec 29 16:02:38 host sshd[1069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.162.2 user=root Dec 29 16:02:38 host sshd[1069]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 16:02:38 host sshd[1065]: User root from 162.243.48.133 not allowed because not listed in AllowUsers Dec 29 16:02:38 host sshd[1065]: input_userauth_request: invalid user root [preauth] Dec 29 16:02:38 host unix_chkpwd[1073]: password check failed for user (root) Dec 29 16:02:38 host sshd[1065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.48.133 user=root Dec 29 16:02:38 host sshd[1065]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 16:02:40 host sshd[1069]: Failed password for invalid user root from 128.199.162.2 port 50358 ssh2 Dec 29 16:02:40 host sshd[1065]: Failed password for invalid user root from 162.243.48.133 port 36562 ssh2 Dec 29 16:02:40 host sshd[1137]: Invalid user lighthouse from 141.145.193.96 port 56580 Dec 29 16:02:40 host sshd[1137]: input_userauth_request: invalid user lighthouse [preauth] Dec 29 16:02:40 host sshd[1137]: pam_unix(sshd:auth): check pass; user unknown Dec 29 16:02:40 host sshd[1137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.145.193.96 Dec 29 16:02:41 host sshd[1182]: Invalid user user from 41.197.31.178 port 44296 Dec 29 16:02:41 host sshd[1182]: input_userauth_request: invalid user user [preauth] Dec 29 16:02:42 host sshd[1182]: pam_unix(sshd:auth): check pass; user unknown Dec 29 16:02:42 host sshd[1182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 29 16:02:42 host sshd[1137]: Failed password for invalid user lighthouse from 141.145.193.96 port 56580 ssh2 Dec 29 16:02:42 host sshd[1137]: Received disconnect from 141.145.193.96 port 56580:11: Bye Bye [preauth] Dec 29 16:02:42 host sshd[1137]: Disconnected from 141.145.193.96 port 56580 [preauth] Dec 29 16:02:43 host sshd[1182]: Failed password for invalid user user from 41.197.31.178 port 44296 ssh2 Dec 29 16:02:43 host sshd[1182]: Connection closed by 41.197.31.178 port 44296 [preauth] Dec 29 16:03:03 host sshd[1292]: User root from 202.137.26.4 not allowed because not listed in AllowUsers Dec 29 16:03:03 host sshd[1292]: input_userauth_request: invalid user root [preauth] Dec 29 16:03:03 host unix_chkpwd[1294]: password check failed for user (root) Dec 29 16:03:03 host sshd[1292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.137.26.4 user=root Dec 29 16:03:03 host sshd[1292]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 16:03:05 host sshd[1292]: Failed password for invalid user root from 202.137.26.4 port 39514 ssh2 Dec 29 16:03:21 host sshd[1360]: User root from 45.7.119.3 not allowed because not listed in AllowUsers Dec 29 16:03:21 host sshd[1360]: input_userauth_request: invalid user root [preauth] Dec 29 16:03:21 host unix_chkpwd[1363]: password check failed for user (root) Dec 29 16:03:21 host sshd[1360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.7.119.3 user=root Dec 29 16:03:21 host sshd[1360]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 16:03:24 host sshd[1360]: Failed password for invalid user root from 45.7.119.3 port 28182 ssh2 Dec 29 16:03:24 host sshd[1360]: Received disconnect from 45.7.119.3 port 28182:11: Bye Bye [preauth] Dec 29 16:03:24 host sshd[1360]: Disconnected from 45.7.119.3 port 28182 [preauth] Dec 29 16:03:30 host sshd[1393]: User root from 184.18.211.199 not allowed because not listed in AllowUsers Dec 29 16:03:30 host sshd[1393]: input_userauth_request: invalid user root [preauth] Dec 29 16:03:30 host unix_chkpwd[1397]: password check failed for user (root) Dec 29 16:03:30 host sshd[1393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.18.211.199 user=root Dec 29 16:03:30 host sshd[1393]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 16:03:32 host sshd[1393]: Failed password for invalid user root from 184.18.211.199 port 50146 ssh2 Dec 29 16:03:32 host sshd[1393]: Received disconnect from 184.18.211.199 port 50146:11: Bye Bye [preauth] Dec 29 16:03:32 host sshd[1393]: Disconnected from 184.18.211.199 port 50146 [preauth] Dec 29 16:03:47 host sshd[1445]: User root from 141.145.193.96 not allowed because not listed in AllowUsers Dec 29 16:03:47 host sshd[1445]: input_userauth_request: invalid user root [preauth] Dec 29 16:03:47 host unix_chkpwd[1448]: password check failed for user (root) Dec 29 16:03:47 host sshd[1445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.145.193.96 user=root Dec 29 16:03:47 host sshd[1445]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 16:03:49 host sshd[1445]: Failed password for invalid user root from 141.145.193.96 port 47554 ssh2 Dec 29 16:03:49 host sshd[1445]: Received disconnect from 141.145.193.96 port 47554:11: Bye Bye [preauth] Dec 29 16:03:49 host sshd[1445]: Disconnected from 141.145.193.96 port 47554 [preauth] Dec 29 16:04:50 host sshd[1580]: User root from 27.118.22.221 not allowed because not listed in AllowUsers Dec 29 16:04:50 host sshd[1580]: input_userauth_request: invalid user root [preauth] Dec 29 16:04:50 host unix_chkpwd[1584]: password check failed for user (root) Dec 29 16:04:50 host sshd[1580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.118.22.221 user=root Dec 29 16:04:50 host sshd[1580]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 16:04:51 host sshd[1580]: Failed password for invalid user root from 27.118.22.221 port 55350 ssh2 Dec 29 16:04:51 host sshd[1580]: Received disconnect from 27.118.22.221 port 55350:11: Bye Bye [preauth] Dec 29 16:04:51 host sshd[1580]: Disconnected from 27.118.22.221 port 55350 [preauth] Dec 29 16:05:05 host sshd[1652]: User root from 45.7.119.3 not allowed because not listed in AllowUsers Dec 29 16:05:05 host sshd[1652]: input_userauth_request: invalid user root [preauth] Dec 29 16:05:05 host unix_chkpwd[1659]: password check failed for user (root) Dec 29 16:05:05 host sshd[1652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.7.119.3 user=root Dec 29 16:05:05 host sshd[1652]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 16:05:08 host sshd[1652]: Failed password for invalid user root from 45.7.119.3 port 41502 ssh2 Dec 29 16:05:08 host sshd[1652]: Received disconnect from 45.7.119.3 port 41502:11: Bye Bye [preauth] Dec 29 16:05:08 host sshd[1652]: Disconnected from 45.7.119.3 port 41502 [preauth] Dec 29 16:05:20 host sshd[1713]: Invalid user user1 from 103.13.40.2 port 38330 Dec 29 16:05:20 host sshd[1713]: input_userauth_request: invalid user user1 [preauth] Dec 29 16:05:20 host sshd[1713]: pam_unix(sshd:auth): check pass; user unknown Dec 29 16:05:20 host sshd[1713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 29 16:05:22 host sshd[1713]: Failed password for invalid user user1 from 103.13.40.2 port 38330 ssh2 Dec 29 16:05:22 host sshd[1713]: Connection closed by 103.13.40.2 port 38330 [preauth] Dec 29 16:07:25 host sshd[2053]: User root from 172.96.251.203 not allowed because not listed in AllowUsers Dec 29 16:07:25 host sshd[2053]: input_userauth_request: invalid user root [preauth] Dec 29 16:07:25 host unix_chkpwd[2083]: password check failed for user (root) Dec 29 16:07:25 host sshd[2053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.96.251.203 user=root Dec 29 16:07:25 host sshd[2053]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 16:07:26 host sshd[2053]: Failed password for invalid user root from 172.96.251.203 port 46916 ssh2 Dec 29 16:07:27 host sshd[2053]: Received disconnect from 172.96.251.203 port 46916:11: Bye Bye [preauth] Dec 29 16:07:27 host sshd[2053]: Disconnected from 172.96.251.203 port 46916 [preauth] Dec 29 16:12:46 host sshd[2882]: Invalid user student02 from 106.10.122.53 port 49370 Dec 29 16:12:46 host sshd[2882]: input_userauth_request: invalid user student02 [preauth] Dec 29 16:12:47 host sshd[2882]: pam_unix(sshd:auth): check pass; user unknown Dec 29 16:12:47 host sshd[2882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 29 16:12:49 host sshd[2882]: Failed password for invalid user student02 from 106.10.122.53 port 49370 ssh2 Dec 29 16:12:49 host sshd[2882]: Connection closed by 106.10.122.53 port 49370 [preauth] Dec 29 16:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 16:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 16:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 16:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 16:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 16:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 16:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 16:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 16:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 29 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 29 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 29 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 29 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 29 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 29 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 29 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 29 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 16:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 16:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 16:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 16:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 29 16:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 16:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 16:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=disposeat user-2=wwwkmaorg user-3=remysagr user-4=wwwkapin user-5=woodpeck user-6=shalinijames user-7=wwwtestugo user-8=vfmassets user-9=pmcresources user-10=wwwevmhonda user-11=bonifacegroup user-12=wwwletsstalkfood user-13=straightcurve user-14=kottayamcalldriv user-15=phmetals user-16=palco123 user-17=gifterman user-18=mrsclean user-19=wwwnexidigital user-20=cochintaxi user-21=wwwkaretakers user-22=a2zgroup user-23=dartsimp user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=ugotscom user-28=keralaholi user-29=wwwresourcehunte user-30=wwwrmswll feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 29 16:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 29 16:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 16:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 16:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 16:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 16:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-S5nzMCowpnOKDgT1.~ Dec 29 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-S5nzMCowpnOKDgT1.~' Dec 29 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-S5nzMCowpnOKDgT1.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 29 16:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 16:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 16:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 29 16:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 16:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 16:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 16:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 16:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 16:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 16:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 16:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 29 16:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 16:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 16:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 16:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 29 16:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 29 16:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 29 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 29 16:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 16:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 16:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 29 16:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 16:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 16:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 29 16:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 16:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 16:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 29 16:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 16:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 16:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 29 16:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 16:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 16:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 29 16:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 16:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 16:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 29 16:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 16:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 16:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 29 16:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 16:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 16:36:54 host sshd[6836]: Invalid user mark from 209.141.56.48 port 41108 Dec 29 16:36:54 host sshd[6836]: input_userauth_request: invalid user mark [preauth] Dec 29 16:36:54 host sshd[6836]: pam_unix(sshd:auth): check pass; user unknown Dec 29 16:36:54 host sshd[6836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Dec 29 16:36:56 host sshd[6836]: Failed password for invalid user mark from 209.141.56.48 port 41108 ssh2 Dec 29 16:36:56 host sshd[6836]: Connection closed by 209.141.56.48 port 41108 [preauth] Dec 29 16:58:15 host sshd[10460]: Invalid user ep from 45.93.201.90 port 56094 Dec 29 16:58:15 host sshd[10460]: input_userauth_request: invalid user ep [preauth] Dec 29 16:58:15 host sshd[10460]: pam_unix(sshd:auth): check pass; user unknown Dec 29 16:58:15 host sshd[10460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 29 16:58:17 host sshd[10460]: Failed password for invalid user ep from 45.93.201.90 port 56094 ssh2 Dec 29 16:58:21 host sshd[10460]: pam_unix(sshd:auth): check pass; user unknown Dec 29 16:58:23 host sshd[10460]: Failed password for invalid user ep from 45.93.201.90 port 56094 ssh2 Dec 29 16:58:26 host sshd[10460]: pam_unix(sshd:auth): check pass; user unknown Dec 29 16:58:27 host sshd[10460]: Failed password for invalid user ep from 45.93.201.90 port 56094 ssh2 Dec 29 16:58:31 host sshd[10460]: Connection closed by 45.93.201.90 port 56094 [preauth] Dec 29 16:58:31 host sshd[10460]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 29 17:07:57 host sshd[12239]: Invalid user ronald from 107.189.30.59 port 50156 Dec 29 17:07:57 host sshd[12239]: input_userauth_request: invalid user ronald [preauth] Dec 29 17:07:57 host sshd[12239]: pam_unix(sshd:auth): check pass; user unknown Dec 29 17:07:57 host sshd[12239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Dec 29 17:07:59 host sshd[12239]: Failed password for invalid user ronald from 107.189.30.59 port 50156 ssh2 Dec 29 17:08:00 host sshd[12239]: Connection closed by 107.189.30.59 port 50156 [preauth] Dec 29 17:17:45 host sshd[13946]: Invalid user pi from 82.65.197.203 port 51946 Dec 29 17:17:45 host sshd[13946]: input_userauth_request: invalid user pi [preauth] Dec 29 17:17:45 host sshd[13946]: pam_unix(sshd:auth): check pass; user unknown Dec 29 17:17:45 host sshd[13946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.65.197.203 Dec 29 17:17:45 host sshd[13948]: Invalid user pi from 82.65.197.203 port 51960 Dec 29 17:17:45 host sshd[13948]: input_userauth_request: invalid user pi [preauth] Dec 29 17:17:45 host sshd[13948]: pam_unix(sshd:auth): check pass; user unknown Dec 29 17:17:45 host sshd[13948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.65.197.203 Dec 29 17:17:47 host sshd[13946]: Failed password for invalid user pi from 82.65.197.203 port 51946 ssh2 Dec 29 17:17:47 host sshd[13946]: Connection closed by 82.65.197.203 port 51946 [preauth] Dec 29 17:17:48 host sshd[13948]: Failed password for invalid user pi from 82.65.197.203 port 51960 ssh2 Dec 29 17:17:48 host sshd[13948]: Connection closed by 82.65.197.203 port 51960 [preauth] Dec 29 17:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 17:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 17:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 17:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 17:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 17:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 29 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 29 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 29 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 29 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 29 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 29 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 29 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 29 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 29 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=vfmassets user-3=wwwtestugo user-4=shalinijames user-5=wwwkapin user-6=woodpeck user-7=disposeat user-8=wwwkmaorg user-9=remysagr user-10=mrsclean user-11=wwwnexidigital user-12=gifterman user-13=palco123 user-14=kottayamcalldriv user-15=phmetals user-16=wwwletsstalkfood user-17=straightcurve user-18=bonifacegroup user-19=wwwevmhonda user-20=laundryboniface user-21=dartsimp user-22=a2zgroup user-23=cochintaxi user-24=wwwkaretakers user-25=wwwrmswll user-26=keralaholi user-27=wwwresourcehunte user-28=ugotscom user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 29 17:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 29 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-rvl6Nksd6NHQzmzy.~ Dec 29 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-rvl6Nksd6NHQzmzy.~' Dec 29 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-rvl6Nksd6NHQzmzy.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 29 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 29 17:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 17:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 29 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 29 17:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 29 17:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 29 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 29 17:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 17:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 17:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 29 17:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 17:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 17:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 29 17:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 17:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 17:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 29 17:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 17:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 29 17:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 17:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 17:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 29 17:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 17:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 17:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 29 17:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 17:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 17:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 29 17:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 17:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 17:31:13 host sshd[16544]: Invalid user hadoop from 103.13.40.2 port 50764 Dec 29 17:31:13 host sshd[16544]: input_userauth_request: invalid user hadoop [preauth] Dec 29 17:31:13 host sshd[16544]: pam_unix(sshd:auth): check pass; user unknown Dec 29 17:31:13 host sshd[16544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 29 17:31:14 host sshd[16544]: Failed password for invalid user hadoop from 103.13.40.2 port 50764 ssh2 Dec 29 17:31:14 host sshd[16544]: Connection closed by 103.13.40.2 port 50764 [preauth] Dec 29 17:33:06 host sshd[16834]: Invalid user bhuang from 162.218.126.136 port 40370 Dec 29 17:33:06 host sshd[16834]: input_userauth_request: invalid user bhuang [preauth] Dec 29 17:33:06 host sshd[16834]: pam_unix(sshd:auth): check pass; user unknown Dec 29 17:33:06 host sshd[16834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 29 17:33:08 host sshd[16834]: Failed password for invalid user bhuang from 162.218.126.136 port 40370 ssh2 Dec 29 17:33:08 host sshd[16834]: Connection closed by 162.218.126.136 port 40370 [preauth] Dec 29 17:39:08 host sshd[17991]: Invalid user liyou from 106.10.122.53 port 43615 Dec 29 17:39:08 host sshd[17991]: input_userauth_request: invalid user liyou [preauth] Dec 29 17:39:09 host sshd[17991]: pam_unix(sshd:auth): check pass; user unknown Dec 29 17:39:09 host sshd[17991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 29 17:39:10 host sshd[17991]: Failed password for invalid user liyou from 106.10.122.53 port 43615 ssh2 Dec 29 17:39:10 host sshd[17991]: Connection closed by 106.10.122.53 port 43615 [preauth] Dec 29 17:45:50 host sshd[19395]: Did not receive identification string from 120.25.197.83 port 48652 Dec 29 18:05:25 host sshd[23945]: Invalid user test1 from 41.197.31.178 port 34634 Dec 29 18:05:25 host sshd[23945]: input_userauth_request: invalid user test1 [preauth] Dec 29 18:05:25 host sshd[23945]: pam_unix(sshd:auth): check pass; user unknown Dec 29 18:05:25 host sshd[23945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 29 18:05:27 host sshd[23945]: Failed password for invalid user test1 from 41.197.31.178 port 34634 ssh2 Dec 29 18:05:28 host sshd[23945]: Connection closed by 41.197.31.178 port 34634 [preauth] Dec 29 18:11:21 host sshd[25158]: Connection closed by 45.79.181.223 port 52118 [preauth] Dec 29 18:11:23 host sshd[25165]: Connection closed by 45.79.181.223 port 52128 [preauth] Dec 29 18:11:26 host sshd[25174]: Connection closed by 45.79.181.223 port 52144 [preauth] Dec 29 18:20:48 host sshd[27268]: Invalid user user1 from 92.46.108.20 port 58376 Dec 29 18:20:48 host sshd[27268]: input_userauth_request: invalid user user1 [preauth] Dec 29 18:20:49 host sshd[27268]: pam_unix(sshd:auth): check pass; user unknown Dec 29 18:20:49 host sshd[27268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 29 18:20:51 host sshd[27268]: Failed password for invalid user user1 from 92.46.108.20 port 58376 ssh2 Dec 29 18:20:51 host sshd[27268]: Connection closed by 92.46.108.20 port 58376 [preauth] Dec 29 18:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 18:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 18:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 29 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 29 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 29 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 29 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 29 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 29 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 29 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 29 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 18:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 18:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 18:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 18:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 29 18:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 18:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 18:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=bonifacegroup user-2=wwwevmhonda user-3=wwwletsstalkfood user-4=straightcurve user-5=palco123 user-6=gifterman user-7=kottayamcalldriv user-8=phmetals user-9=mrsclean user-10=wwwnexidigital user-11=disposeat user-12=wwwkmaorg user-13=remysagr user-14=woodpeck user-15=wwwkapin user-16=vfmassets user-17=shalinijames user-18=wwwtestugo user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=wwwresourcehunte user-23=keralaholi user-24=wwwrmswll user-25=ugotscom user-26=wwwkaretakers user-27=cochintaxi user-28=a2zgroup user-29=dartsimp user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 29 18:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 29 18:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-rNGowL2p1Im2NMU6.~ Dec 29 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-rNGowL2p1Im2NMU6.~' Dec 29 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-rNGowL2p1Im2NMU6.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 29 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 29 18:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 18:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 29 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 29 18:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 29 18:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 29 18:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 29 18:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 18:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 29 18:21:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 18:21:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 29 18:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 18:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 18:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 29 18:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 18:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 18:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 29 18:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 18:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 18:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 29 18:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 18:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 18:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 29 18:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 18:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 18:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 29 18:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 18:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 18:31:18 host sshd[29326]: Did not receive identification string from 87.236.176.130 port 45691 Dec 29 18:31:19 host sshd[29329]: Connection closed by 87.236.176.130 port 48585 [preauth] Dec 29 18:35:19 host sshd[29873]: Connection closed by 167.94.138.61 port 48306 [preauth] Dec 29 18:40:45 host sshd[30642]: Invalid user eq from 45.93.201.90 port 51062 Dec 29 18:40:45 host sshd[30642]: input_userauth_request: invalid user eq [preauth] Dec 29 18:40:45 host sshd[30642]: pam_unix(sshd:auth): check pass; user unknown Dec 29 18:40:45 host sshd[30642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 29 18:40:47 host sshd[30642]: Failed password for invalid user eq from 45.93.201.90 port 51062 ssh2 Dec 29 18:40:50 host sshd[30642]: pam_unix(sshd:auth): check pass; user unknown Dec 29 18:40:53 host sshd[30642]: Failed password for invalid user eq from 45.93.201.90 port 51062 ssh2 Dec 29 18:40:56 host sshd[30642]: pam_unix(sshd:auth): check pass; user unknown Dec 29 18:40:58 host sshd[30642]: Failed password for invalid user eq from 45.93.201.90 port 51062 ssh2 Dec 29 18:41:01 host sshd[30642]: Connection closed by 45.93.201.90 port 51062 [preauth] Dec 29 18:41:01 host sshd[30642]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 29 18:48:09 host sshd[31569]: Connection closed by 192.241.195.5 port 59882 [preauth] Dec 29 18:49:02 host sshd[31696]: Invalid user support from 198.98.49.71 port 57939 Dec 29 18:49:02 host sshd[31696]: input_userauth_request: invalid user support [preauth] Dec 29 18:49:02 host sshd[31696]: pam_unix(sshd:auth): check pass; user unknown Dec 29 18:49:02 host sshd[31696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.98.49.71 Dec 29 18:49:03 host sshd[31696]: Failed password for invalid user support from 198.98.49.71 port 57939 ssh2 Dec 29 18:49:04 host sshd[31696]: Connection reset by 198.98.49.71 port 57939 [preauth] Dec 29 18:56:08 host sshd[305]: Invalid user ubuntu from 162.218.126.136 port 50644 Dec 29 18:56:08 host sshd[305]: input_userauth_request: invalid user ubuntu [preauth] Dec 29 18:56:08 host sshd[305]: pam_unix(sshd:auth): check pass; user unknown Dec 29 18:56:08 host sshd[305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 29 18:56:10 host sshd[305]: Failed password for invalid user ubuntu from 162.218.126.136 port 50644 ssh2 Dec 29 18:56:10 host sshd[305]: Connection closed by 162.218.126.136 port 50644 [preauth] Dec 29 18:56:16 host sshd[330]: User root from 103.13.40.2 not allowed because not listed in AllowUsers Dec 29 18:56:16 host sshd[330]: input_userauth_request: invalid user root [preauth] Dec 29 18:56:16 host unix_chkpwd[332]: password check failed for user (root) Dec 29 18:56:16 host sshd[330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 user=root Dec 29 18:56:16 host sshd[330]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 18:56:18 host sshd[330]: Failed password for invalid user root from 103.13.40.2 port 50396 ssh2 Dec 29 18:56:18 host sshd[330]: Connection closed by 103.13.40.2 port 50396 [preauth] Dec 29 19:04:54 host sshd[1451]: Invalid user administrator from 106.10.122.53 port 53440 Dec 29 19:04:54 host sshd[1451]: input_userauth_request: invalid user administrator [preauth] Dec 29 19:04:54 host sshd[1451]: pam_unix(sshd:auth): check pass; user unknown Dec 29 19:04:54 host sshd[1451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 29 19:04:57 host sshd[1451]: Failed password for invalid user administrator from 106.10.122.53 port 53440 ssh2 Dec 29 19:04:57 host sshd[1451]: Connection closed by 106.10.122.53 port 53440 [preauth] Dec 29 19:05:22 host sshd[1510]: Invalid user admin from 14.47.57.72 port 38614 Dec 29 19:05:22 host sshd[1510]: input_userauth_request: invalid user admin [preauth] Dec 29 19:05:22 host sshd[1510]: pam_unix(sshd:auth): check pass; user unknown Dec 29 19:05:22 host sshd[1510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.47.57.72 Dec 29 19:05:25 host sshd[1510]: Failed password for invalid user admin from 14.47.57.72 port 38614 ssh2 Dec 29 19:05:26 host sshd[1510]: Connection closed by 14.47.57.72 port 38614 [preauth] Dec 29 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 29 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 29 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 29 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 29 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 29 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 29 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 29 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 29 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 29 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwevmhonda user-2=bonifacegroup user-3=wwwletsstalkfood user-4=straightcurve user-5=kottayamcalldriv user-6=phmetals user-7=palco123 user-8=gifterman user-9=wwwnexidigital user-10=mrsclean user-11=disposeat user-12=wwwkmaorg user-13=remysagr user-14=woodpeck user-15=wwwkapin user-16=shalinijames user-17=wwwtestugo user-18=vfmassets user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=ugotscom user-23=keralaholi user-24=wwwresourcehunte user-25=wwwrmswll user-26=wwwkaretakers user-27=cochintaxi user-28=a2zgroup user-29=dartsimp user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 29 19:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 29 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-sQD4g85eIqyGUkSE.~ Dec 29 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-sQD4g85eIqyGUkSE.~' Dec 29 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-sQD4g85eIqyGUkSE.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 29 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 29 19:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 19:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 19:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 19:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 19:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 19:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 19:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 19:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 19:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 19:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 19:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 19:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 29 19:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 19:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 29 19:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 29 19:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 29 19:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 29 19:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 19:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 19:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 29 19:21:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 19:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 19:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 29 19:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 19:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 19:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 29 19:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 19:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 19:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 29 19:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 19:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 19:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 29 19:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 19:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 19:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 29 19:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 19:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 19:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 29 19:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 19:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 19:31:12 host sshd[5344]: User root from 200.73.138.23 not allowed because not listed in AllowUsers Dec 29 19:31:12 host sshd[5344]: input_userauth_request: invalid user root [preauth] Dec 29 19:31:12 host unix_chkpwd[5352]: password check failed for user (root) Dec 29 19:31:12 host sshd[5344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.73.138.23 user=root Dec 29 19:31:12 host sshd[5344]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 19:31:13 host sshd[5344]: Failed password for invalid user root from 200.73.138.23 port 51228 ssh2 Dec 29 19:31:14 host sshd[5344]: Received disconnect from 200.73.138.23 port 51228:11: Bye Bye [preauth] Dec 29 19:31:14 host sshd[5344]: Disconnected from 200.73.138.23 port 51228 [preauth] Dec 29 19:38:11 host sshd[6240]: User root from 200.73.138.23 not allowed because not listed in AllowUsers Dec 29 19:38:11 host sshd[6240]: input_userauth_request: invalid user root [preauth] Dec 29 19:38:11 host unix_chkpwd[6245]: password check failed for user (root) Dec 29 19:38:11 host sshd[6240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.73.138.23 user=root Dec 29 19:38:11 host sshd[6240]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 19:38:13 host sshd[6240]: Failed password for invalid user root from 200.73.138.23 port 39786 ssh2 Dec 29 19:38:14 host sshd[6240]: Received disconnect from 200.73.138.23 port 39786:11: Bye Bye [preauth] Dec 29 19:38:14 host sshd[6240]: Disconnected from 200.73.138.23 port 39786 [preauth] Dec 29 19:58:21 host sshd[9447]: User root from 41.197.31.178 not allowed because not listed in AllowUsers Dec 29 19:58:21 host sshd[9447]: input_userauth_request: invalid user root [preauth] Dec 29 19:58:21 host unix_chkpwd[9451]: password check failed for user (root) Dec 29 19:58:21 host sshd[9447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 user=root Dec 29 19:58:21 host sshd[9447]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 19:58:23 host sshd[9447]: Failed password for invalid user root from 41.197.31.178 port 56378 ssh2 Dec 29 19:58:24 host sshd[9447]: Connection closed by 41.197.31.178 port 56378 [preauth] Dec 29 20:02:12 host sshd[9961]: Invalid user wang from 129.159.202.1 port 36110 Dec 29 20:02:12 host sshd[9961]: input_userauth_request: invalid user wang [preauth] Dec 29 20:02:12 host sshd[9961]: pam_unix(sshd:auth): check pass; user unknown Dec 29 20:02:12 host sshd[9961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.159.202.1 Dec 29 20:02:14 host sshd[9961]: Failed password for invalid user wang from 129.159.202.1 port 36110 ssh2 Dec 29 20:02:14 host sshd[9961]: Received disconnect from 129.159.202.1 port 36110:11: Bye Bye [preauth] Dec 29 20:02:14 host sshd[9961]: Disconnected from 129.159.202.1 port 36110 [preauth] Dec 29 20:04:08 host sshd[10295]: Invalid user test from 188.166.5.84 port 57730 Dec 29 20:04:08 host sshd[10295]: input_userauth_request: invalid user test [preauth] Dec 29 20:04:08 host sshd[10295]: pam_unix(sshd:auth): check pass; user unknown Dec 29 20:04:08 host sshd[10295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.5.84 Dec 29 20:04:10 host sshd[10295]: Failed password for invalid user test from 188.166.5.84 port 57730 ssh2 Dec 29 20:04:10 host sshd[10295]: Received disconnect from 188.166.5.84 port 57730:11: Bye Bye [preauth] Dec 29 20:04:10 host sshd[10295]: Disconnected from 188.166.5.84 port 57730 [preauth] Dec 29 20:04:27 host sshd[10335]: Invalid user grace from 129.159.250.50 port 36804 Dec 29 20:04:27 host sshd[10335]: input_userauth_request: invalid user grace [preauth] Dec 29 20:04:27 host sshd[10335]: pam_unix(sshd:auth): check pass; user unknown Dec 29 20:04:27 host sshd[10335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.159.250.50 Dec 29 20:04:29 host sshd[10335]: Failed password for invalid user grace from 129.159.250.50 port 36804 ssh2 Dec 29 20:04:29 host sshd[10335]: Received disconnect from 129.159.250.50 port 36804:11: Bye Bye [preauth] Dec 29 20:04:29 host sshd[10335]: Disconnected from 129.159.250.50 port 36804 [preauth] Dec 29 20:05:10 host sshd[10426]: User root from 144.22.185.115 not allowed because not listed in AllowUsers Dec 29 20:05:10 host sshd[10426]: input_userauth_request: invalid user root [preauth] Dec 29 20:05:10 host unix_chkpwd[10433]: password check failed for user (root) Dec 29 20:05:10 host sshd[10426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.22.185.115 user=root Dec 29 20:05:10 host sshd[10426]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 20:05:12 host sshd[10426]: Failed password for invalid user root from 144.22.185.115 port 37720 ssh2 Dec 29 20:05:13 host sshd[10426]: Received disconnect from 144.22.185.115 port 37720:11: Bye Bye [preauth] Dec 29 20:05:13 host sshd[10426]: Disconnected from 144.22.185.115 port 37720 [preauth] Dec 29 20:06:15 host sshd[10545]: User root from 103.212.211.135 not allowed because not listed in AllowUsers Dec 29 20:06:15 host sshd[10545]: input_userauth_request: invalid user root [preauth] Dec 29 20:06:15 host unix_chkpwd[10547]: password check failed for user (root) Dec 29 20:06:15 host sshd[10545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.212.211.135 user=root Dec 29 20:06:15 host sshd[10545]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 20:06:17 host sshd[10545]: Failed password for invalid user root from 103.212.211.135 port 40252 ssh2 Dec 29 20:06:17 host sshd[10545]: Received disconnect from 103.212.211.135 port 40252:11: Bye Bye [preauth] Dec 29 20:06:17 host sshd[10545]: Disconnected from 103.212.211.135 port 40252 [preauth] Dec 29 20:06:25 host sshd[10592]: Invalid user azureuser from 40.76.205.168 port 1024 Dec 29 20:06:25 host sshd[10592]: input_userauth_request: invalid user azureuser [preauth] Dec 29 20:06:25 host sshd[10592]: pam_unix(sshd:auth): check pass; user unknown Dec 29 20:06:25 host sshd[10592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.76.205.168 Dec 29 20:06:27 host sshd[10592]: Failed password for invalid user azureuser from 40.76.205.168 port 1024 ssh2 Dec 29 20:06:27 host sshd[10592]: Received disconnect from 40.76.205.168 port 1024:11: Bye Bye [preauth] Dec 29 20:06:27 host sshd[10592]: Disconnected from 40.76.205.168 port 1024 [preauth] Dec 29 20:06:54 host sshd[10627]: Invalid user ubuntu1 from 201.186.40.35 port 33948 Dec 29 20:06:54 host sshd[10627]: input_userauth_request: invalid user ubuntu1 [preauth] Dec 29 20:06:54 host sshd[10627]: pam_unix(sshd:auth): check pass; user unknown Dec 29 20:06:54 host sshd[10627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.186.40.35 Dec 29 20:06:55 host sshd[10627]: Failed password for invalid user ubuntu1 from 201.186.40.35 port 33948 ssh2 Dec 29 20:06:56 host sshd[10627]: Received disconnect from 201.186.40.35 port 33948:11: Bye Bye [preauth] Dec 29 20:06:56 host sshd[10627]: Disconnected from 201.186.40.35 port 33948 [preauth] Dec 29 20:07:22 host sshd[10674]: User root from 129.159.250.50 not allowed because not listed in AllowUsers Dec 29 20:07:22 host sshd[10674]: input_userauth_request: invalid user root [preauth] Dec 29 20:07:22 host unix_chkpwd[10678]: password check failed for user (root) Dec 29 20:07:22 host sshd[10674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.159.250.50 user=root Dec 29 20:07:22 host sshd[10674]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 20:07:24 host sshd[10674]: Failed password for invalid user root from 129.159.250.50 port 48856 ssh2 Dec 29 20:07:24 host sshd[10674]: Received disconnect from 129.159.250.50 port 48856:11: Bye Bye [preauth] Dec 29 20:07:24 host sshd[10674]: Disconnected from 129.159.250.50 port 48856 [preauth] Dec 29 20:07:36 host sshd[10747]: Invalid user rachel from 129.159.202.1 port 45732 Dec 29 20:07:36 host sshd[10747]: input_userauth_request: invalid user rachel [preauth] Dec 29 20:07:36 host sshd[10747]: pam_unix(sshd:auth): check pass; user unknown Dec 29 20:07:36 host sshd[10747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.159.202.1 Dec 29 20:07:38 host sshd[10747]: Failed password for invalid user rachel from 129.159.202.1 port 45732 ssh2 Dec 29 20:07:38 host sshd[10747]: Received disconnect from 129.159.202.1 port 45732:11: Bye Bye [preauth] Dec 29 20:07:38 host sshd[10747]: Disconnected from 129.159.202.1 port 45732 [preauth] Dec 29 20:07:51 host sshd[10754]: Connection closed by 183.252.189.14 port 59270 [preauth] Dec 29 20:07:51 host sshd[10762]: User root from 188.166.5.84 not allowed because not listed in AllowUsers Dec 29 20:07:51 host sshd[10762]: input_userauth_request: invalid user root [preauth] Dec 29 20:07:51 host unix_chkpwd[10766]: password check failed for user (root) Dec 29 20:07:51 host sshd[10762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.5.84 user=root Dec 29 20:07:51 host sshd[10762]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 20:07:53 host sshd[10762]: Failed password for invalid user root from 188.166.5.84 port 43428 ssh2 Dec 29 20:07:53 host sshd[10762]: Received disconnect from 188.166.5.84 port 43428:11: Bye Bye [preauth] Dec 29 20:07:53 host sshd[10762]: Disconnected from 188.166.5.84 port 43428 [preauth] Dec 29 20:08:00 host sshd[10871]: Invalid user xxx from 162.218.126.136 port 55544 Dec 29 20:08:00 host sshd[10871]: input_userauth_request: invalid user xxx [preauth] Dec 29 20:08:00 host sshd[10871]: pam_unix(sshd:auth): check pass; user unknown Dec 29 20:08:00 host sshd[10871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 29 20:08:02 host sshd[10871]: Failed password for invalid user xxx from 162.218.126.136 port 55544 ssh2 Dec 29 20:08:02 host sshd[10871]: Connection closed by 162.218.126.136 port 55544 [preauth] Dec 29 20:08:19 host sshd[10950]: Invalid user compras from 103.212.211.135 port 42782 Dec 29 20:08:19 host sshd[10950]: input_userauth_request: invalid user compras [preauth] Dec 29 20:08:19 host sshd[10950]: pam_unix(sshd:auth): check pass; user unknown Dec 29 20:08:19 host sshd[10950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.212.211.135 Dec 29 20:08:21 host sshd[10950]: Failed password for invalid user compras from 103.212.211.135 port 42782 ssh2 Dec 29 20:08:21 host sshd[10950]: Received disconnect from 103.212.211.135 port 42782:11: Bye Bye [preauth] Dec 29 20:08:21 host sshd[10950]: Disconnected from 103.212.211.135 port 42782 [preauth] Dec 29 20:08:21 host sshd[10952]: User root from 144.22.185.115 not allowed because not listed in AllowUsers Dec 29 20:08:21 host sshd[10952]: input_userauth_request: invalid user root [preauth] Dec 29 20:08:21 host unix_chkpwd[10956]: password check failed for user (root) Dec 29 20:08:21 host sshd[10952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.22.185.115 user=root Dec 29 20:08:21 host sshd[10952]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 20:08:23 host sshd[10952]: Failed password for invalid user root from 144.22.185.115 port 33626 ssh2 Dec 29 20:08:28 host sshd[11042]: User root from 40.76.205.168 not allowed because not listed in AllowUsers Dec 29 20:08:28 host sshd[11042]: input_userauth_request: invalid user root [preauth] Dec 29 20:08:28 host unix_chkpwd[11045]: password check failed for user (root) Dec 29 20:08:28 host sshd[11042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.76.205.168 user=root Dec 29 20:08:28 host sshd[11042]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 20:08:30 host sshd[11042]: Failed password for invalid user root from 40.76.205.168 port 1024 ssh2 Dec 29 20:08:31 host sshd[11042]: Received disconnect from 40.76.205.168 port 1024:11: Bye Bye [preauth] Dec 29 20:08:31 host sshd[11042]: Disconnected from 40.76.205.168 port 1024 [preauth] Dec 29 20:08:42 host sshd[11088]: User root from 129.159.202.1 not allowed because not listed in AllowUsers Dec 29 20:08:42 host sshd[11088]: input_userauth_request: invalid user root [preauth] Dec 29 20:08:42 host unix_chkpwd[11091]: password check failed for user (root) Dec 29 20:08:42 host sshd[11088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.159.202.1 user=root Dec 29 20:08:42 host sshd[11088]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 20:08:44 host sshd[11088]: Failed password for invalid user root from 129.159.202.1 port 48018 ssh2 Dec 29 20:08:57 host sshd[11138]: User root from 201.186.40.35 not allowed because not listed in AllowUsers Dec 29 20:08:57 host sshd[11138]: input_userauth_request: invalid user root [preauth] Dec 29 20:08:57 host unix_chkpwd[11148]: password check failed for user (root) Dec 29 20:08:57 host sshd[11138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.186.40.35 user=root Dec 29 20:08:57 host sshd[11138]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 20:08:59 host sshd[11138]: Failed password for invalid user root from 201.186.40.35 port 37430 ssh2 Dec 29 20:08:59 host sshd[11138]: Received disconnect from 201.186.40.35 port 37430:11: Bye Bye [preauth] Dec 29 20:08:59 host sshd[11138]: Disconnected from 201.186.40.35 port 37430 [preauth] Dec 29 20:20:50 host sshd[12855]: Invalid user lxy from 103.13.40.2 port 45510 Dec 29 20:20:50 host sshd[12855]: input_userauth_request: invalid user lxy [preauth] Dec 29 20:20:50 host sshd[12855]: pam_unix(sshd:auth): check pass; user unknown Dec 29 20:20:50 host sshd[12855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 29 20:20:52 host sshd[12855]: Failed password for invalid user lxy from 103.13.40.2 port 45510 ssh2 Dec 29 20:20:52 host sshd[12855]: Connection closed by 103.13.40.2 port 45510 [preauth] Dec 29 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 29 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 29 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 29 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 29 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 29 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 29 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 29 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 29 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 29 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=a2zgroup user-4=dartsimp user-5=laundryboniface user-6=wwwpmcresource user-7=travelboniface user-8=ugotscom user-9=wwwresourcehunte user-10=keralaholi user-11=wwwrmswll user-12=disposeat user-13=remysagr user-14=wwwkmaorg user-15=woodpeck user-16=wwwkapin user-17=shalinijames user-18=wwwtestugo user-19=vfmassets user-20=pmcresources user-21=wwwevmhonda user-22=bonifacegroup user-23=wwwletsstalkfood user-24=straightcurve user-25=phmetals user-26=kottayamcalldriv user-27=palco123 user-28=gifterman user-29=mrsclean user-30=wwwnexidigital feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 29 20:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 29 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zxqwwmRlBzBkPUgf.~ Dec 29 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zxqwwmRlBzBkPUgf.~' Dec 29 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zxqwwmRlBzBkPUgf.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 29 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 29 20:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 20:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 20:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 20:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 20:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 20:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 20:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 20:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 29 20:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 20:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 20:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 20:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 29 20:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 29 20:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 29 20:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 29 20:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 20:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 29 20:21:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 20:21:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 29 20:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 20:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 20:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 29 20:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 20:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 29 20:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 20:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 20:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 29 20:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 20:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 20:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 29 20:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 20:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 20:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 29 20:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 20:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 20:22:20 host sshd[13215]: Invalid user user1 from 165.227.173.102 port 38688 Dec 29 20:22:20 host sshd[13215]: input_userauth_request: invalid user user1 [preauth] Dec 29 20:22:22 host sshd[13215]: pam_unix(sshd:auth): check pass; user unknown Dec 29 20:22:22 host sshd[13215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.173.102 Dec 29 20:22:24 host sshd[13215]: Failed password for invalid user user1 from 165.227.173.102 port 38688 ssh2 Dec 29 20:22:25 host sshd[13215]: Connection closed by 165.227.173.102 port 38688 [preauth] Dec 29 20:23:32 host sshd[13364]: Invalid user er from 45.93.201.90 port 56872 Dec 29 20:23:32 host sshd[13364]: input_userauth_request: invalid user er [preauth] Dec 29 20:23:32 host sshd[13364]: pam_unix(sshd:auth): check pass; user unknown Dec 29 20:23:32 host sshd[13364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 29 20:23:34 host sshd[13364]: Failed password for invalid user er from 45.93.201.90 port 56872 ssh2 Dec 29 20:23:38 host sshd[13364]: pam_unix(sshd:auth): check pass; user unknown Dec 29 20:23:39 host sshd[13364]: Failed password for invalid user er from 45.93.201.90 port 56872 ssh2 Dec 29 20:23:43 host sshd[13364]: pam_unix(sshd:auth): check pass; user unknown Dec 29 20:23:45 host sshd[13364]: Failed password for invalid user er from 45.93.201.90 port 56872 ssh2 Dec 29 20:23:48 host sshd[13364]: Connection closed by 45.93.201.90 port 56872 [preauth] Dec 29 20:23:48 host sshd[13364]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 29 20:30:43 host sshd[14393]: Invalid user oracle from 106.10.122.53 port 51354 Dec 29 20:30:43 host sshd[14393]: input_userauth_request: invalid user oracle [preauth] Dec 29 20:30:43 host sshd[14393]: pam_unix(sshd:auth): check pass; user unknown Dec 29 20:30:43 host sshd[14393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 29 20:30:46 host sshd[14393]: Failed password for invalid user oracle from 106.10.122.53 port 51354 ssh2 Dec 29 20:30:46 host sshd[14393]: Connection closed by 106.10.122.53 port 51354 [preauth] Dec 29 20:42:46 host sshd[15989]: User root from 92.46.108.20 not allowed because not listed in AllowUsers Dec 29 20:42:46 host sshd[15989]: input_userauth_request: invalid user root [preauth] Dec 29 20:42:46 host unix_chkpwd[15993]: password check failed for user (root) Dec 29 20:42:46 host sshd[15989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 user=root Dec 29 20:42:46 host sshd[15989]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 20:42:49 host sshd[15989]: Failed password for invalid user root from 92.46.108.20 port 41276 ssh2 Dec 29 20:42:49 host sshd[15989]: Connection closed by 92.46.108.20 port 41276 [preauth] Dec 29 20:51:09 host sshd[17056]: User root from 45.66.230.87 not allowed because not listed in AllowUsers Dec 29 20:51:09 host sshd[17056]: input_userauth_request: invalid user root [preauth] Dec 29 20:51:09 host unix_chkpwd[17059]: password check failed for user (root) Dec 29 20:51:09 host sshd[17056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.66.230.87 user=root Dec 29 20:51:09 host sshd[17056]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 20:51:11 host sshd[17056]: Failed password for invalid user root from 45.66.230.87 port 46900 ssh2 Dec 29 20:51:11 host sshd[17056]: Received disconnect from 45.66.230.87 port 46900:11: Bye Bye [preauth] Dec 29 20:51:11 host sshd[17056]: Disconnected from 45.66.230.87 port 46900 [preauth] Dec 29 20:51:13 host sshd[17062]: Invalid user admin from 45.66.230.87 port 55634 Dec 29 20:51:13 host sshd[17062]: input_userauth_request: invalid user admin [preauth] Dec 29 20:51:13 host sshd[17062]: pam_unix(sshd:auth): check pass; user unknown Dec 29 20:51:13 host sshd[17062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.66.230.87 Dec 29 20:51:14 host sshd[17062]: Failed password for invalid user admin from 45.66.230.87 port 55634 ssh2 Dec 29 20:51:15 host sshd[17062]: Received disconnect from 45.66.230.87 port 55634:11: Bye Bye [preauth] Dec 29 20:51:15 host sshd[17062]: Disconnected from 45.66.230.87 port 55634 [preauth] Dec 29 20:51:16 host sshd[17066]: Invalid user admin from 45.66.230.87 port 36012 Dec 29 20:51:16 host sshd[17066]: input_userauth_request: invalid user admin [preauth] Dec 29 20:51:16 host sshd[17066]: pam_unix(sshd:auth): check pass; user unknown Dec 29 20:51:16 host sshd[17066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.66.230.87 Dec 29 20:51:18 host sshd[17066]: Failed password for invalid user admin from 45.66.230.87 port 36012 ssh2 Dec 29 20:51:18 host sshd[17066]: Received disconnect from 45.66.230.87 port 36012:11: Bye Bye [preauth] Dec 29 20:51:18 host sshd[17066]: Disconnected from 45.66.230.87 port 36012 [preauth] Dec 29 21:11:53 host sshd[19836]: Invalid user usuario from 104.199.35.3 port 60672 Dec 29 21:11:53 host sshd[19836]: input_userauth_request: invalid user usuario [preauth] Dec 29 21:11:53 host sshd[19836]: pam_unix(sshd:auth): check pass; user unknown Dec 29 21:11:53 host sshd[19836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.199.35.3 Dec 29 21:11:54 host sshd[19836]: Failed password for invalid user usuario from 104.199.35.3 port 60672 ssh2 Dec 29 21:11:54 host sshd[19836]: Received disconnect from 104.199.35.3 port 60672:11: Bye Bye [preauth] Dec 29 21:11:54 host sshd[19836]: Disconnected from 104.199.35.3 port 60672 [preauth] Dec 29 21:12:12 host sshd[19871]: User root from 181.52.249.176 not allowed because not listed in AllowUsers Dec 29 21:12:12 host sshd[19871]: input_userauth_request: invalid user root [preauth] Dec 29 21:12:12 host unix_chkpwd[19875]: password check failed for user (root) Dec 29 21:12:12 host sshd[19871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.52.249.176 user=root Dec 29 21:12:12 host sshd[19871]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 21:12:14 host sshd[19871]: Failed password for invalid user root from 181.52.249.176 port 51234 ssh2 Dec 29 21:12:14 host sshd[19871]: Received disconnect from 181.52.249.176 port 51234:11: Bye Bye [preauth] Dec 29 21:12:14 host sshd[19871]: Disconnected from 181.52.249.176 port 51234 [preauth] Dec 29 21:12:45 host sshd[19930]: User adm from 159.203.105.247 not allowed because not listed in AllowUsers Dec 29 21:12:45 host sshd[19930]: input_userauth_request: invalid user adm [preauth] Dec 29 21:12:45 host unix_chkpwd[19933]: password check failed for user (adm) Dec 29 21:12:45 host sshd[19930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.105.247 user=adm Dec 29 21:12:45 host sshd[19930]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "adm" Dec 29 21:12:47 host sshd[19930]: Failed password for invalid user adm from 159.203.105.247 port 35442 ssh2 Dec 29 21:12:47 host sshd[19930]: Received disconnect from 159.203.105.247 port 35442:11: Bye Bye [preauth] Dec 29 21:12:47 host sshd[19930]: Disconnected from 159.203.105.247 port 35442 [preauth] Dec 29 21:12:52 host sshd[19939]: User root from 103.48.193.7 not allowed because not listed in AllowUsers Dec 29 21:12:52 host sshd[19939]: input_userauth_request: invalid user root [preauth] Dec 29 21:12:52 host unix_chkpwd[19941]: password check failed for user (root) Dec 29 21:12:52 host sshd[19939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.48.193.7 user=root Dec 29 21:12:52 host sshd[19939]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 21:12:54 host sshd[19939]: Failed password for invalid user root from 103.48.193.7 port 54108 ssh2 Dec 29 21:12:54 host sshd[19939]: Received disconnect from 103.48.193.7 port 54108:11: Bye Bye [preauth] Dec 29 21:12:54 host sshd[19939]: Disconnected from 103.48.193.7 port 54108 [preauth] Dec 29 21:13:03 host sshd[19974]: Invalid user informix from 203.229.206.26 port 36594 Dec 29 21:13:03 host sshd[19974]: input_userauth_request: invalid user informix [preauth] Dec 29 21:13:03 host sshd[19974]: pam_unix(sshd:auth): check pass; user unknown Dec 29 21:13:03 host sshd[19974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.229.206.26 Dec 29 21:13:06 host sshd[19974]: Failed password for invalid user informix from 203.229.206.26 port 36594 ssh2 Dec 29 21:13:06 host sshd[19974]: Received disconnect from 203.229.206.26 port 36594:11: Bye Bye [preauth] Dec 29 21:13:06 host sshd[19974]: Disconnected from 203.229.206.26 port 36594 [preauth] Dec 29 21:13:17 host sshd[19990]: Invalid user master from 185.59.74.158 port 35976 Dec 29 21:13:17 host sshd[19990]: input_userauth_request: invalid user master [preauth] Dec 29 21:13:17 host sshd[19990]: pam_unix(sshd:auth): check pass; user unknown Dec 29 21:13:17 host sshd[19990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.59.74.158 Dec 29 21:13:19 host sshd[19990]: Failed password for invalid user master from 185.59.74.158 port 35976 ssh2 Dec 29 21:13:19 host sshd[19990]: Received disconnect from 185.59.74.158 port 35976:11: Bye Bye [preauth] Dec 29 21:13:19 host sshd[19990]: Disconnected from 185.59.74.158 port 35976 [preauth] Dec 29 21:13:25 host sshd[19999]: User root from 104.199.35.3 not allowed because not listed in AllowUsers Dec 29 21:13:25 host sshd[19999]: input_userauth_request: invalid user root [preauth] Dec 29 21:13:25 host unix_chkpwd[20039]: password check failed for user (root) Dec 29 21:13:25 host sshd[19999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.199.35.3 user=root Dec 29 21:13:25 host sshd[19999]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 21:13:27 host sshd[19999]: Failed password for invalid user root from 104.199.35.3 port 47960 ssh2 Dec 29 21:13:27 host sshd[19999]: Received disconnect from 104.199.35.3 port 47960:11: Bye Bye [preauth] Dec 29 21:13:27 host sshd[19999]: Disconnected from 104.199.35.3 port 47960 [preauth] Dec 29 21:13:48 host sshd[20193]: User root from 181.52.249.176 not allowed because not listed in AllowUsers Dec 29 21:13:48 host sshd[20193]: input_userauth_request: invalid user root [preauth] Dec 29 21:13:48 host unix_chkpwd[20200]: password check failed for user (root) Dec 29 21:13:48 host sshd[20193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.52.249.176 user=root Dec 29 21:13:48 host sshd[20193]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 21:13:50 host sshd[20193]: Failed password for invalid user root from 181.52.249.176 port 42482 ssh2 Dec 29 21:14:34 host sshd[20349]: Invalid user ubuntu from 159.203.105.247 port 35554 Dec 29 21:14:34 host sshd[20349]: input_userauth_request: invalid user ubuntu [preauth] Dec 29 21:14:34 host sshd[20349]: pam_unix(sshd:auth): check pass; user unknown Dec 29 21:14:34 host sshd[20349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.105.247 Dec 29 21:14:36 host sshd[20349]: Failed password for invalid user ubuntu from 159.203.105.247 port 35554 ssh2 Dec 29 21:14:37 host sshd[20349]: Received disconnect from 159.203.105.247 port 35554:11: Bye Bye [preauth] Dec 29 21:14:37 host sshd[20349]: Disconnected from 159.203.105.247 port 35554 [preauth] Dec 29 21:14:55 host sshd[20401]: Invalid user ubuntu from 185.59.74.158 port 41828 Dec 29 21:14:55 host sshd[20401]: input_userauth_request: invalid user ubuntu [preauth] Dec 29 21:14:55 host sshd[20401]: pam_unix(sshd:auth): check pass; user unknown Dec 29 21:14:55 host sshd[20401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.59.74.158 Dec 29 21:14:56 host sshd[20401]: Failed password for invalid user ubuntu from 185.59.74.158 port 41828 ssh2 Dec 29 21:14:57 host sshd[20401]: Received disconnect from 185.59.74.158 port 41828:11: Bye Bye [preauth] Dec 29 21:14:57 host sshd[20401]: Disconnected from 185.59.74.158 port 41828 [preauth] Dec 29 21:15:08 host sshd[20444]: User root from 203.229.206.26 not allowed because not listed in AllowUsers Dec 29 21:15:08 host sshd[20444]: input_userauth_request: invalid user root [preauth] Dec 29 21:15:08 host unix_chkpwd[20447]: password check failed for user (root) Dec 29 21:15:08 host sshd[20444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.229.206.26 user=root Dec 29 21:15:08 host sshd[20444]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 21:15:09 host sshd[20444]: Failed password for invalid user root from 203.229.206.26 port 48332 ssh2 Dec 29 21:15:09 host sshd[20444]: Received disconnect from 203.229.206.26 port 48332:11: Bye Bye [preauth] Dec 29 21:15:09 host sshd[20444]: Disconnected from 203.229.206.26 port 48332 [preauth] Dec 29 21:15:40 host sshd[20532]: Invalid user user from 103.48.193.7 port 58712 Dec 29 21:15:40 host sshd[20532]: input_userauth_request: invalid user user [preauth] Dec 29 21:15:40 host sshd[20532]: pam_unix(sshd:auth): check pass; user unknown Dec 29 21:15:40 host sshd[20532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.48.193.7 Dec 29 21:15:42 host sshd[20532]: Failed password for invalid user user from 103.48.193.7 port 58712 ssh2 Dec 29 21:15:42 host sshd[20532]: Received disconnect from 103.48.193.7 port 58712:11: Bye Bye [preauth] Dec 29 21:15:42 host sshd[20532]: Disconnected from 103.48.193.7 port 58712 [preauth] Dec 29 21:16:12 host sshd[20620]: User root from 185.59.74.158 not allowed because not listed in AllowUsers Dec 29 21:16:12 host sshd[20620]: input_userauth_request: invalid user root [preauth] Dec 29 21:16:12 host unix_chkpwd[20623]: password check failed for user (root) Dec 29 21:16:12 host sshd[20620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.59.74.158 user=root Dec 29 21:16:12 host sshd[20620]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 21:16:13 host sshd[20620]: Failed password for invalid user root from 185.59.74.158 port 37678 ssh2 Dec 29 21:16:14 host sshd[20620]: Received disconnect from 185.59.74.158 port 37678:11: Bye Bye [preauth] Dec 29 21:16:14 host sshd[20620]: Disconnected from 185.59.74.158 port 37678 [preauth] Dec 29 21:16:18 host sshd[20658]: Invalid user shaoruizhi from 162.218.126.136 port 53842 Dec 29 21:16:18 host sshd[20658]: input_userauth_request: invalid user shaoruizhi [preauth] Dec 29 21:16:19 host sshd[20658]: pam_unix(sshd:auth): check pass; user unknown Dec 29 21:16:19 host sshd[20658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 29 21:16:21 host sshd[20658]: Failed password for invalid user shaoruizhi from 162.218.126.136 port 53842 ssh2 Dec 29 21:16:21 host sshd[20658]: Connection closed by 162.218.126.136 port 53842 [preauth] Dec 29 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 29 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 29 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 29 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 29 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 29 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 29 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 29 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 29 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 29 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=vfmassets user-3=shalinijames user-4=wwwtestugo user-5=wwwkapin user-6=woodpeck user-7=disposeat user-8=wwwkmaorg user-9=remysagr user-10=mrsclean user-11=wwwnexidigital user-12=palco123 user-13=gifterman user-14=kottayamcalldriv user-15=phmetals user-16=wwwletsstalkfood user-17=straightcurve user-18=bonifacegroup user-19=wwwevmhonda user-20=laundryboniface user-21=a2zgroup user-22=dartsimp user-23=cochintaxi user-24=wwwkaretakers user-25=keralaholi user-26=wwwresourcehunte user-27=wwwrmswll user-28=ugotscom user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 29 21:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 29 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-3hbbm8UtiVaxeiuQ.~ Dec 29 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-3hbbm8UtiVaxeiuQ.~' Dec 29 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-3hbbm8UtiVaxeiuQ.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 29 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 29 21:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 21:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 29 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 21:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 21:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 21:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 21:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 29 21:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 29 21:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 29 21:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 29 21:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 21:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 21:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 29 21:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 21:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 29 21:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 21:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 21:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 29 21:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 21:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 29 21:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 21:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 21:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 29 21:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 21:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 21:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 29 21:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 21:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 21:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 29 21:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 21:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 21:44:44 host sshd[24758]: Invalid user user1 from 103.13.40.2 port 55688 Dec 29 21:44:44 host sshd[24758]: input_userauth_request: invalid user user1 [preauth] Dec 29 21:44:44 host sshd[24758]: pam_unix(sshd:auth): check pass; user unknown Dec 29 21:44:44 host sshd[24758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 29 21:44:46 host sshd[24758]: Failed password for invalid user user1 from 103.13.40.2 port 55688 ssh2 Dec 29 21:44:46 host sshd[24758]: Connection closed by 103.13.40.2 port 55688 [preauth] Dec 29 21:44:52 host sshd[24812]: Invalid user user1 from 41.197.31.178 port 34306 Dec 29 21:44:52 host sshd[24812]: input_userauth_request: invalid user user1 [preauth] Dec 29 21:44:52 host sshd[24812]: pam_unix(sshd:auth): check pass; user unknown Dec 29 21:44:52 host sshd[24812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 29 21:44:55 host sshd[24812]: Failed password for invalid user user1 from 41.197.31.178 port 34306 ssh2 Dec 29 21:44:55 host sshd[24812]: Connection closed by 41.197.31.178 port 34306 [preauth] Dec 29 21:56:11 host sshd[26383]: Invalid user user1 from 106.10.122.53 port 47848 Dec 29 21:56:11 host sshd[26383]: input_userauth_request: invalid user user1 [preauth] Dec 29 21:56:11 host sshd[26383]: pam_unix(sshd:auth): check pass; user unknown Dec 29 21:56:11 host sshd[26383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 29 21:56:13 host sshd[26383]: Failed password for invalid user user1 from 106.10.122.53 port 47848 ssh2 Dec 29 21:56:13 host sshd[26383]: Connection closed by 106.10.122.53 port 47848 [preauth] Dec 29 22:03:35 host sshd[27471]: Invalid user anthony from 107.189.30.59 port 36616 Dec 29 22:03:35 host sshd[27471]: input_userauth_request: invalid user anthony [preauth] Dec 29 22:03:35 host sshd[27471]: pam_unix(sshd:auth): check pass; user unknown Dec 29 22:03:35 host sshd[27471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Dec 29 22:03:37 host sshd[27471]: Failed password for invalid user anthony from 107.189.30.59 port 36616 ssh2 Dec 29 22:03:38 host sshd[27471]: Connection closed by 107.189.30.59 port 36616 [preauth] Dec 29 22:06:08 host sshd[27817]: Invalid user et from 45.93.201.90 port 49002 Dec 29 22:06:08 host sshd[27817]: input_userauth_request: invalid user et [preauth] Dec 29 22:06:08 host sshd[27817]: pam_unix(sshd:auth): check pass; user unknown Dec 29 22:06:08 host sshd[27817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 29 22:06:09 host sshd[27817]: Failed password for invalid user et from 45.93.201.90 port 49002 ssh2 Dec 29 22:06:13 host sshd[27817]: pam_unix(sshd:auth): check pass; user unknown Dec 29 22:06:15 host sshd[27817]: Failed password for invalid user et from 45.93.201.90 port 49002 ssh2 Dec 29 22:06:18 host sshd[27817]: pam_unix(sshd:auth): check pass; user unknown Dec 29 22:06:20 host sshd[27817]: Failed password for invalid user et from 45.93.201.90 port 49002 ssh2 Dec 29 22:06:23 host sshd[27817]: Connection closed by 45.93.201.90 port 49002 [preauth] Dec 29 22:06:23 host sshd[27817]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 29 22:08:48 host sshd[28187]: User root from 144.24.189.200 not allowed because not listed in AllowUsers Dec 29 22:08:48 host sshd[28187]: input_userauth_request: invalid user root [preauth] Dec 29 22:08:48 host unix_chkpwd[28189]: password check failed for user (root) Dec 29 22:08:48 host sshd[28187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.24.189.200 user=root Dec 29 22:08:48 host sshd[28187]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 22:08:49 host sshd[28187]: Failed password for invalid user root from 144.24.189.200 port 42596 ssh2 Dec 29 22:08:49 host sshd[28187]: Received disconnect from 144.24.189.200 port 42596:11: Bye Bye [preauth] Dec 29 22:08:49 host sshd[28187]: Disconnected from 144.24.189.200 port 42596 [preauth] Dec 29 22:09:11 host sshd[28245]: Invalid user rafael from 112.196.62.36 port 57240 Dec 29 22:09:11 host sshd[28245]: input_userauth_request: invalid user rafael [preauth] Dec 29 22:09:11 host sshd[28245]: pam_unix(sshd:auth): check pass; user unknown Dec 29 22:09:11 host sshd[28245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.196.62.36 Dec 29 22:09:13 host sshd[28245]: Failed password for invalid user rafael from 112.196.62.36 port 57240 ssh2 Dec 29 22:09:13 host sshd[28245]: Received disconnect from 112.196.62.36 port 57240:11: Bye Bye [preauth] Dec 29 22:09:13 host sshd[28245]: Disconnected from 112.196.62.36 port 57240 [preauth] Dec 29 22:11:26 host sshd[28526]: Invalid user donald from 209.141.56.48 port 39194 Dec 29 22:11:26 host sshd[28526]: input_userauth_request: invalid user donald [preauth] Dec 29 22:11:26 host sshd[28526]: pam_unix(sshd:auth): check pass; user unknown Dec 29 22:11:26 host sshd[28526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Dec 29 22:11:28 host sshd[28526]: Failed password for invalid user donald from 209.141.56.48 port 39194 ssh2 Dec 29 22:11:28 host sshd[28526]: Connection closed by 209.141.56.48 port 39194 [preauth] Dec 29 22:11:51 host sshd[28564]: Invalid user user5 from 82.160.101.186 port 38853 Dec 29 22:11:51 host sshd[28564]: input_userauth_request: invalid user user5 [preauth] Dec 29 22:11:51 host sshd[28564]: pam_unix(sshd:auth): check pass; user unknown Dec 29 22:11:51 host sshd[28564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.160.101.186 Dec 29 22:11:53 host sshd[28564]: Failed password for invalid user user5 from 82.160.101.186 port 38853 ssh2 Dec 29 22:11:53 host sshd[28564]: Received disconnect from 82.160.101.186 port 38853:11: Bye Bye [preauth] Dec 29 22:11:53 host sshd[28564]: Disconnected from 82.160.101.186 port 38853 [preauth] Dec 29 22:13:19 host sshd[28733]: User root from 112.196.62.36 not allowed because not listed in AllowUsers Dec 29 22:13:19 host sshd[28733]: input_userauth_request: invalid user root [preauth] Dec 29 22:13:19 host unix_chkpwd[28735]: password check failed for user (root) Dec 29 22:13:19 host sshd[28733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.196.62.36 user=root Dec 29 22:13:19 host sshd[28733]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 22:13:20 host sshd[28733]: Failed password for invalid user root from 112.196.62.36 port 54580 ssh2 Dec 29 22:13:20 host sshd[28733]: Received disconnect from 112.196.62.36 port 54580:11: Bye Bye [preauth] Dec 29 22:13:20 host sshd[28733]: Disconnected from 112.196.62.36 port 54580 [preauth] Dec 29 22:14:20 host sshd[28981]: Invalid user zhao from 82.160.101.186 port 55604 Dec 29 22:14:20 host sshd[28981]: input_userauth_request: invalid user zhao [preauth] Dec 29 22:14:20 host sshd[28981]: pam_unix(sshd:auth): check pass; user unknown Dec 29 22:14:20 host sshd[28981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.160.101.186 Dec 29 22:14:21 host sshd[28981]: Failed password for invalid user zhao from 82.160.101.186 port 55604 ssh2 Dec 29 22:14:21 host sshd[28981]: Received disconnect from 82.160.101.186 port 55604:11: Bye Bye [preauth] Dec 29 22:14:21 host sshd[28981]: Disconnected from 82.160.101.186 port 55604 [preauth] Dec 29 22:16:03 host sshd[29205]: Invalid user valerie from 82.160.101.186 port 41796 Dec 29 22:16:03 host sshd[29205]: input_userauth_request: invalid user valerie [preauth] Dec 29 22:16:03 host sshd[29205]: pam_unix(sshd:auth): check pass; user unknown Dec 29 22:16:03 host sshd[29205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.160.101.186 Dec 29 22:16:05 host sshd[29205]: Failed password for invalid user valerie from 82.160.101.186 port 41796 ssh2 Dec 29 22:16:05 host sshd[29205]: Received disconnect from 82.160.101.186 port 41796:11: Bye Bye [preauth] Dec 29 22:16:05 host sshd[29205]: Disconnected from 82.160.101.186 port 41796 [preauth] Dec 29 22:17:05 host sshd[29340]: Invalid user deploy from 144.24.189.200 port 44544 Dec 29 22:17:05 host sshd[29340]: input_userauth_request: invalid user deploy [preauth] Dec 29 22:17:05 host sshd[29340]: pam_unix(sshd:auth): check pass; user unknown Dec 29 22:17:05 host sshd[29340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.24.189.200 Dec 29 22:17:07 host sshd[29340]: Failed password for invalid user deploy from 144.24.189.200 port 44544 ssh2 Dec 29 22:17:08 host sshd[29340]: Received disconnect from 144.24.189.200 port 44544:11: Bye Bye [preauth] Dec 29 22:17:08 host sshd[29340]: Disconnected from 144.24.189.200 port 44544 [preauth] Dec 29 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 29 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 29 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 29 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 29 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 29 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 29 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 29 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 29 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 22:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 22:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 22:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 22:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 29 22:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=a2zgroup user-2=dartsimp user-3=laundryboniface user-4=wwwkaretakers user-5=cochintaxi user-6=travelboniface user-7=ugotscom user-8=keralaholi user-9=wwwresourcehunte user-10=wwwrmswll user-11=wwwpmcresource user-12=shalinijames user-13=wwwtestugo user-14=vfmassets user-15=pmcresources user-16=disposeat user-17=wwwkmaorg user-18=remysagr user-19=wwwkapin user-20=woodpeck user-21=phmetals user-22=kottayamcalldriv user-23=palco123 user-24=gifterman user-25=wwwnexidigital user-26=mrsclean user-27=wwwevmhonda user-28=bonifacegroup user-29=wwwletsstalkfood user-30=straightcurve feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 29 22:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 29 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-7GslAWjgooFYaPiK.~ Dec 29 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-7GslAWjgooFYaPiK.~' Dec 29 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-7GslAWjgooFYaPiK.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 29 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 29 22:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 22:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 22:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 29 22:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 22:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 22:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 22:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 22:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 22:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 29 22:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 29 22:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 29 22:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 29 22:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 22:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 22:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 29 22:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 22:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 22:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 29 22:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 22:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 22:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 29 22:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 22:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 22:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 29 22:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 22:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 22:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 29 22:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 22:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 22:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 29 22:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 22:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 22:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 29 22:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 22:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 22:22:54 host sshd[30314]: Did not receive identification string from 62.233.50.248 port 64915 Dec 29 22:24:55 host sshd[30512]: Invalid user nginx from 162.218.126.136 port 56100 Dec 29 22:24:55 host sshd[30512]: input_userauth_request: invalid user nginx [preauth] Dec 29 22:24:56 host sshd[30512]: pam_unix(sshd:auth): check pass; user unknown Dec 29 22:24:56 host sshd[30512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 29 22:24:58 host sshd[30512]: Failed password for invalid user nginx from 162.218.126.136 port 56100 ssh2 Dec 29 22:24:58 host sshd[30512]: Connection closed by 162.218.126.136 port 56100 [preauth] Dec 29 22:27:22 host sshd[30774]: Did not receive identification string from 43.153.38.145 port 45038 Dec 29 22:45:54 host sshd[665]: Did not receive identification string from 186.122.177.117 port 50676 Dec 29 22:45:57 host sshd[666]: Invalid user ansadmin from 186.122.177.117 port 25637 Dec 29 22:45:57 host sshd[668]: Invalid user test from 186.122.177.117 port 44820 Dec 29 22:45:57 host sshd[668]: input_userauth_request: invalid user test [preauth] Dec 29 22:45:57 host sshd[673]: Invalid user ts3 from 186.122.177.117 port 41865 Dec 29 22:45:57 host sshd[666]: input_userauth_request: invalid user ansadmin [preauth] Dec 29 22:45:57 host sshd[673]: input_userauth_request: invalid user ts3 [preauth] Dec 29 22:45:57 host sshd[671]: User ftp from 186.122.177.117 not allowed because not listed in AllowUsers Dec 29 22:45:57 host sshd[670]: Invalid user web from 186.122.177.117 port 29550 Dec 29 22:45:57 host sshd[671]: input_userauth_request: invalid user ftp [preauth] Dec 29 22:45:57 host sshd[670]: input_userauth_request: invalid user web [preauth] Dec 29 22:45:57 host sshd[679]: Invalid user testuser from 186.122.177.117 port 8913 Dec 29 22:45:57 host sshd[679]: input_userauth_request: invalid user testuser [preauth] Dec 29 22:45:57 host sshd[676]: User mysql from 186.122.177.117 not allowed because not listed in AllowUsers Dec 29 22:45:57 host sshd[676]: input_userauth_request: invalid user mysql [preauth] Dec 29 22:45:57 host sshd[683]: Invalid user git from 186.122.177.117 port 41373 Dec 29 22:45:57 host sshd[683]: input_userauth_request: invalid user git [preauth] Dec 29 22:45:57 host sshd[669]: Invalid user oracle from 186.122.177.117 port 65431 Dec 29 22:45:57 host sshd[669]: input_userauth_request: invalid user oracle [preauth] Dec 29 22:45:57 host sshd[677]: User mysql from 186.122.177.117 not allowed because not listed in AllowUsers Dec 29 22:45:57 host sshd[674]: Invalid user dev from 186.122.177.117 port 45987 Dec 29 22:45:57 host sshd[677]: input_userauth_request: invalid user mysql [preauth] Dec 29 22:45:57 host sshd[674]: input_userauth_request: invalid user dev [preauth] Dec 29 22:45:57 host sshd[675]: Invalid user ec2-user from 186.122.177.117 port 26274 Dec 29 22:45:57 host sshd[675]: input_userauth_request: invalid user ec2-user [preauth] Dec 29 22:45:57 host sshd[678]: Invalid user postgres from 186.122.177.117 port 35055 Dec 29 22:45:57 host sshd[678]: input_userauth_request: invalid user postgres [preauth] Dec 29 22:45:57 host sshd[682]: Invalid user ubuntu from 186.122.177.117 port 39997 Dec 29 22:45:57 host sshd[682]: input_userauth_request: invalid user ubuntu [preauth] Dec 29 22:45:57 host sshd[690]: Invalid user oracle from 186.122.177.117 port 9317 Dec 29 22:45:57 host sshd[689]: Invalid user test from 186.122.177.117 port 43002 Dec 29 22:45:57 host sshd[690]: input_userauth_request: invalid user oracle [preauth] Dec 29 22:45:57 host sshd[689]: input_userauth_request: invalid user test [preauth] Dec 29 22:45:57 host sshd[691]: Invalid user oracle from 186.122.177.117 port 14386 Dec 29 22:45:57 host sshd[680]: Invalid user user from 186.122.177.117 port 12262 Dec 29 22:45:57 host sshd[684]: Invalid user test from 186.122.177.117 port 20563 Dec 29 22:45:57 host sshd[680]: input_userauth_request: invalid user user [preauth] Dec 29 22:45:57 host sshd[686]: Invalid user zjw from 186.122.177.117 port 17348 Dec 29 22:45:57 host sshd[686]: input_userauth_request: invalid user zjw [preauth] Dec 29 22:45:57 host sshd[685]: Invalid user steam from 186.122.177.117 port 64405 Dec 29 22:45:57 host sshd[684]: input_userauth_request: invalid user test [preauth] Dec 29 22:45:57 host sshd[687]: User centos from 186.122.177.117 not allowed because not listed in AllowUsers Dec 29 22:45:57 host sshd[685]: input_userauth_request: invalid user steam [preauth] Dec 29 22:45:57 host sshd[681]: Invalid user steam from 186.122.177.117 port 64837 Dec 29 22:45:57 host sshd[692]: Invalid user user from 186.122.177.117 port 39120 Dec 29 22:45:57 host sshd[681]: input_userauth_request: invalid user steam [preauth] Dec 29 22:45:57 host sshd[696]: Invalid user steam from 186.122.177.117 port 20529 Dec 29 22:45:57 host sshd[687]: input_userauth_request: invalid user centos [preauth] Dec 29 22:45:57 host sshd[696]: input_userauth_request: invalid user steam [preauth] Dec 29 22:45:57 host sshd[697]: Invalid user jenkins from 186.122.177.117 port 17297 Dec 29 22:45:57 host sshd[697]: input_userauth_request: invalid user jenkins [preauth] Dec 29 22:45:57 host sshd[688]: Invalid user elastic from 186.122.177.117 port 36053 Dec 29 22:45:57 host sshd[695]: User centos from 186.122.177.117 not allowed because not listed in AllowUsers Dec 29 22:45:57 host sshd[692]: input_userauth_request: invalid user user [preauth] Dec 29 22:45:57 host sshd[691]: input_userauth_request: invalid user oracle [preauth] Dec 29 22:45:57 host sshd[688]: input_userauth_request: invalid user elastic [preauth] Dec 29 22:45:57 host sshd[695]: input_userauth_request: invalid user centos [preauth] Dec 29 22:45:57 host sshd[666]: pam_unix(sshd:auth): check pass; user unknown Dec 29 22:45:57 host sshd[668]: pam_unix(sshd:auth): check pass; user unknown Dec 29 22:45:57 host sshd[673]: pam_unix(sshd:auth): check pass; user unknown Dec 29 22:45:57 host sshd[666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.177.117 Dec 29 22:45:57 host sshd[668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.177.117 Dec 29 22:45:57 host sshd[673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.177.117 Dec 29 22:45:57 host sshd[670]: pam_unix(sshd:auth): check pass; user unknown Dec 29 22:45:57 host sshd[670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.177.117 Dec 29 22:45:57 host sshd[669]: pam_unix(sshd:auth): check pass; user unknown Dec 29 22:45:57 host sshd[669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.177.117 Dec 29 22:45:57 host sshd[689]: pam_unix(sshd:auth): check pass; user unknown Dec 29 22:45:57 host sshd[682]: pam_unix(sshd:auth): check pass; user unknown Dec 29 22:45:57 host sshd[678]: pam_unix(sshd:auth): check pass; user unknown Dec 29 22:45:57 host sshd[689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.177.117 Dec 29 22:45:57 host sshd[678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.177.117 Dec 29 22:45:57 host sshd[682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.177.117 Dec 29 22:45:57 host sshd[675]: pam_unix(sshd:auth): check pass; user unknown Dec 29 22:45:57 host sshd[675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.177.117 Dec 29 22:45:57 host sshd[683]: pam_unix(sshd:auth): check pass; user unknown Dec 29 22:45:57 host sshd[683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.177.117 Dec 29 22:45:57 host sshd[674]: pam_unix(sshd:auth): check pass; user unknown Dec 29 22:45:57 host sshd[674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.177.117 Dec 29 22:45:57 host sshd[679]: pam_unix(sshd:auth): check pass; user unknown Dec 29 22:45:57 host sshd[679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.177.117 Dec 29 22:45:57 host sshd[690]: pam_unix(sshd:auth): check pass; user unknown Dec 29 22:45:57 host sshd[690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.177.117 Dec 29 22:45:57 host unix_chkpwd[763]: password check failed for user (mysql) Dec 29 22:45:57 host unix_chkpwd[762]: password check failed for user (ftp) Dec 29 22:45:57 host sshd[677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.177.117 user=mysql Dec 29 22:45:57 host sshd[677]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql" Dec 29 22:45:57 host sshd[671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.177.117 user=ftp Dec 29 22:45:57 host sshd[671]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Dec 29 22:45:57 host unix_chkpwd[764]: password check failed for user (mysql) Dec 29 22:45:57 host sshd[676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.177.117 user=mysql Dec 29 22:45:57 host sshd[676]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql" Dec 29 22:45:58 host sshd[681]: pam_unix(sshd:auth): check pass; user unknown Dec 29 22:45:58 host sshd[681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.177.117 Dec 29 22:45:58 host sshd[686]: pam_unix(sshd:auth): check pass; user unknown Dec 29 22:45:58 host sshd[680]: pam_unix(sshd:auth): check pass; user unknown Dec 29 22:45:58 host sshd[686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.177.117 Dec 29 22:45:58 host sshd[680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.177.117 Dec 29 22:45:58 host sshd[688]: pam_unix(sshd:auth): check pass; user unknown Dec 29 22:45:58 host sshd[688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.177.117 Dec 29 22:45:58 host sshd[684]: pam_unix(sshd:auth): check pass; user unknown Dec 29 22:45:58 host sshd[684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.177.117 Dec 29 22:45:58 host sshd[685]: pam_unix(sshd:auth): check pass; user unknown Dec 29 22:45:58 host sshd[685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.177.117 Dec 29 22:45:58 host sshd[697]: pam_unix(sshd:auth): check pass; user unknown Dec 29 22:45:58 host sshd[697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.177.117 Dec 29 22:45:58 host unix_chkpwd[786]: password check failed for user (centos) Dec 29 22:45:58 host sshd[687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.177.117 user=centos Dec 29 22:45:58 host sshd[691]: pam_unix(sshd:auth): check pass; user unknown Dec 29 22:45:58 host sshd[691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.177.117 Dec 29 22:45:58 host sshd[692]: pam_unix(sshd:auth): check pass; user unknown Dec 29 22:45:58 host sshd[692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.177.117 Dec 29 22:45:58 host sshd[696]: pam_unix(sshd:auth): check pass; user unknown Dec 29 22:45:58 host sshd[696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.177.117 Dec 29 22:45:58 host unix_chkpwd[787]: password check failed for user (centos) Dec 29 22:45:58 host sshd[695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.177.117 user=centos Dec 29 22:45:59 host sshd[666]: Failed password for invalid user ansadmin from 186.122.177.117 port 25637 ssh2 Dec 29 22:45:59 host sshd[673]: Failed password for invalid user ts3 from 186.122.177.117 port 41865 ssh2 Dec 29 22:45:59 host sshd[668]: Failed password for invalid user test from 186.122.177.117 port 44820 ssh2 Dec 29 22:45:59 host sshd[670]: Failed password for invalid user web from 186.122.177.117 port 29550 ssh2 Dec 29 22:45:59 host sshd[669]: Failed password for invalid user oracle from 186.122.177.117 port 65431 ssh2 Dec 29 22:45:59 host sshd[682]: Failed password for invalid user ubuntu from 186.122.177.117 port 39997 ssh2 Dec 29 22:45:59 host sshd[678]: Failed password for invalid user postgres from 186.122.177.117 port 35055 ssh2 Dec 29 22:45:59 host sshd[689]: Failed password for invalid user test from 186.122.177.117 port 43002 ssh2 Dec 29 22:45:59 host sshd[675]: Failed password for invalid user ec2-user from 186.122.177.117 port 26274 ssh2 Dec 29 22:45:59 host sshd[683]: Failed password for invalid user git from 186.122.177.117 port 41373 ssh2 Dec 29 22:45:59 host sshd[674]: Failed password for invalid user dev from 186.122.177.117 port 45987 ssh2 Dec 29 22:45:59 host sshd[679]: Failed password for invalid user testuser from 186.122.177.117 port 8913 ssh2 Dec 29 22:45:59 host sshd[690]: Failed password for invalid user oracle from 186.122.177.117 port 9317 ssh2 Dec 29 22:45:59 host sshd[677]: Failed password for invalid user mysql from 186.122.177.117 port 41194 ssh2 Dec 29 22:45:59 host sshd[671]: Failed password for invalid user ftp from 186.122.177.117 port 28878 ssh2 Dec 29 22:45:59 host sshd[676]: Failed password for invalid user mysql from 186.122.177.117 port 37032 ssh2 Dec 29 22:45:59 host sshd[686]: Failed password for invalid user zjw from 186.122.177.117 port 17348 ssh2 Dec 29 22:45:59 host sshd[680]: Failed password for invalid user user from 186.122.177.117 port 12262 ssh2 Dec 29 22:45:59 host sshd[681]: Failed password for invalid user steam from 186.122.177.117 port 64837 ssh2 Dec 29 22:45:59 host sshd[688]: Failed password for invalid user elastic from 186.122.177.117 port 36053 ssh2 Dec 29 22:45:59 host sshd[684]: Failed password for invalid user test from 186.122.177.117 port 20563 ssh2 Dec 29 22:45:59 host sshd[685]: Failed password for invalid user steam from 186.122.177.117 port 64405 ssh2 Dec 29 22:45:59 host sshd[697]: Failed password for invalid user jenkins from 186.122.177.117 port 17297 ssh2 Dec 29 22:45:59 host sshd[687]: Failed password for invalid user centos from 186.122.177.117 port 44798 ssh2 Dec 29 22:45:59 host sshd[691]: Failed password for invalid user oracle from 186.122.177.117 port 14386 ssh2 Dec 29 22:45:59 host sshd[692]: Failed password for invalid user user from 186.122.177.117 port 39120 ssh2 Dec 29 22:45:59 host sshd[696]: Failed password for invalid user steam from 186.122.177.117 port 20529 ssh2 Dec 29 22:45:59 host sshd[695]: Failed password for invalid user centos from 186.122.177.117 port 41626 ssh2 Dec 29 22:52:22 host sshd[1790]: Invalid user donald from 209.141.56.48 port 57798 Dec 29 22:52:22 host sshd[1790]: input_userauth_request: invalid user donald [preauth] Dec 29 22:52:22 host sshd[1790]: pam_unix(sshd:auth): check pass; user unknown Dec 29 22:52:22 host sshd[1790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Dec 29 22:52:24 host sshd[1790]: Failed password for invalid user donald from 209.141.56.48 port 57798 ssh2 Dec 29 22:52:24 host sshd[1790]: Connection closed by 209.141.56.48 port 57798 [preauth] Dec 29 23:05:21 host sshd[3432]: Invalid user app from 92.46.108.20 port 35610 Dec 29 23:05:21 host sshd[3432]: input_userauth_request: invalid user app [preauth] Dec 29 23:05:22 host sshd[3432]: pam_unix(sshd:auth): check pass; user unknown Dec 29 23:05:22 host sshd[3432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 29 23:05:24 host sshd[3432]: Failed password for invalid user app from 92.46.108.20 port 35610 ssh2 Dec 29 23:05:24 host sshd[3432]: Connection closed by 92.46.108.20 port 35610 [preauth] Dec 29 23:08:41 host sshd[3806]: Invalid user a from 103.13.40.2 port 34618 Dec 29 23:08:41 host sshd[3806]: input_userauth_request: invalid user a [preauth] Dec 29 23:08:41 host sshd[3806]: pam_unix(sshd:auth): check pass; user unknown Dec 29 23:08:41 host sshd[3806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 29 23:08:43 host sshd[3806]: Failed password for invalid user a from 103.13.40.2 port 34618 ssh2 Dec 29 23:08:43 host sshd[3806]: Connection closed by 103.13.40.2 port 34618 [preauth] Dec 29 23:17:41 host sshd[5072]: Invalid user donald from 209.141.56.48 port 56974 Dec 29 23:17:41 host sshd[5072]: input_userauth_request: invalid user donald [preauth] Dec 29 23:17:41 host sshd[5072]: pam_unix(sshd:auth): check pass; user unknown Dec 29 23:17:41 host sshd[5072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Dec 29 23:17:43 host sshd[5072]: Failed password for invalid user donald from 209.141.56.48 port 56974 ssh2 Dec 29 23:17:43 host sshd[5072]: Connection closed by 209.141.56.48 port 56974 [preauth] Dec 29 23:19:58 host sshd[5290]: Invalid user donald from 209.141.56.48 port 60606 Dec 29 23:19:58 host sshd[5290]: input_userauth_request: invalid user donald [preauth] Dec 29 23:19:58 host sshd[5290]: pam_unix(sshd:auth): check pass; user unknown Dec 29 23:19:58 host sshd[5290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Dec 29 23:20:00 host sshd[5290]: Failed password for invalid user donald from 209.141.56.48 port 60606 ssh2 Dec 29 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 29 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 29 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 29 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 29 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 29 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 29 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 29 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 29 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 23:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 23:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 23:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 23:21:48 host sshd[5710]: Invalid user user from 106.10.122.53 port 53642 Dec 29 23:21:48 host sshd[5710]: input_userauth_request: invalid user user [preauth] Dec 29 23:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 29 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=disposeat user-2=wwwkmaorg user-3=remysagr user-4=woodpeck user-5=wwwkapin user-6=wwwtestugo user-7=shalinijames user-8=vfmassets user-9=pmcresources user-10=wwwevmhonda user-11=bonifacegroup user-12=straightcurve user-13=wwwletsstalkfood user-14=phmetals user-15=kottayamcalldriv user-16=gifterman user-17=palco123 user-18=wwwnexidigital user-19=mrsclean user-20=cochintaxi user-21=wwwkaretakers user-22=dartsimp user-23=a2zgroup user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=ugotscom user-28=wwwrmswll user-29=keralaholi user-30=wwwresourcehunte feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 29 23:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 29 23:21:49 host sshd[5710]: pam_unix(sshd:auth): check pass; user unknown Dec 29 23:21:49 host sshd[5710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 29 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-M80QsHoR0wDzpmiU.~ Dec 29 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-M80QsHoR0wDzpmiU.~' Dec 29 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-M80QsHoR0wDzpmiU.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 29 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 29 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 29 23:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 23:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 29 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 29 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 29 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 29 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 23:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 29 23:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 29 23:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 29 23:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 29 23:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 29 23:21:51 host sshd[5710]: Failed password for invalid user user from 106.10.122.53 port 53642 ssh2 Dec 29 23:21:51 host sshd[5710]: Connection closed by 106.10.122.53 port 53642 [preauth] Dec 29 23:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 29 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 29 23:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 29 23:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 29 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 29 23:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 29 23:21:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 29 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 29 23:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 23:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 29 23:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 23:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 29 23:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 29 23:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 29 23:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 29 23:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 23:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 23:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 29 23:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 29 23:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 29 23:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 29 23:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 29 23:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 29 23:29:51 host sshd[6827]: Invalid user jiayu from 41.197.31.178 port 49950 Dec 29 23:29:51 host sshd[6827]: input_userauth_request: invalid user jiayu [preauth] Dec 29 23:29:52 host sshd[6827]: pam_unix(sshd:auth): check pass; user unknown Dec 29 23:29:52 host sshd[6827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 29 23:29:53 host sshd[6827]: Failed password for invalid user jiayu from 41.197.31.178 port 49950 ssh2 Dec 29 23:29:53 host sshd[6827]: Connection closed by 41.197.31.178 port 49950 [preauth] Dec 29 23:31:27 host sshd[7026]: User root from 217.15.157.144 not allowed because not listed in AllowUsers Dec 29 23:31:27 host sshd[7026]: input_userauth_request: invalid user root [preauth] Dec 29 23:31:27 host unix_chkpwd[7029]: password check failed for user (root) Dec 29 23:31:27 host sshd[7026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.15.157.144 user=root Dec 29 23:31:27 host sshd[7026]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 23:31:28 host sshd[7026]: Failed password for invalid user root from 217.15.157.144 port 8274 ssh2 Dec 29 23:31:29 host sshd[7026]: Received disconnect from 217.15.157.144 port 8274:11: Bye Bye [preauth] Dec 29 23:31:29 host sshd[7026]: Disconnected from 217.15.157.144 port 8274 [preauth] Dec 29 23:32:53 host sshd[7291]: Invalid user zk from 162.218.126.136 port 41004 Dec 29 23:32:53 host sshd[7291]: input_userauth_request: invalid user zk [preauth] Dec 29 23:32:53 host sshd[7291]: pam_unix(sshd:auth): check pass; user unknown Dec 29 23:32:53 host sshd[7291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 29 23:32:55 host sshd[7291]: Failed password for invalid user zk from 162.218.126.136 port 41004 ssh2 Dec 29 23:32:56 host sshd[7291]: Connection closed by 162.218.126.136 port 41004 [preauth] Dec 29 23:38:06 host sshd[7890]: User root from 217.15.157.144 not allowed because not listed in AllowUsers Dec 29 23:38:06 host sshd[7890]: input_userauth_request: invalid user root [preauth] Dec 29 23:38:06 host unix_chkpwd[7893]: password check failed for user (root) Dec 29 23:38:06 host sshd[7890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.15.157.144 user=root Dec 29 23:38:06 host sshd[7890]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 29 23:38:08 host sshd[7890]: Failed password for invalid user root from 217.15.157.144 port 4644 ssh2 Dec 29 23:38:08 host sshd[7890]: Received disconnect from 217.15.157.144 port 4644:11: Bye Bye [preauth] Dec 29 23:38:08 host sshd[7890]: Disconnected from 217.15.157.144 port 4644 [preauth] Dec 29 23:49:05 host sshd[9324]: Invalid user eu from 45.93.201.90 port 37378 Dec 29 23:49:05 host sshd[9324]: input_userauth_request: invalid user eu [preauth] Dec 29 23:49:05 host sshd[9324]: pam_unix(sshd:auth): check pass; user unknown Dec 29 23:49:05 host sshd[9324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 29 23:49:07 host sshd[9324]: Failed password for invalid user eu from 45.93.201.90 port 37378 ssh2 Dec 29 23:49:10 host sshd[9324]: pam_unix(sshd:auth): check pass; user unknown Dec 29 23:49:12 host sshd[9324]: Failed password for invalid user eu from 45.93.201.90 port 37378 ssh2 Dec 29 23:49:15 host sshd[9324]: pam_unix(sshd:auth): check pass; user unknown Dec 29 23:49:17 host sshd[9324]: Failed password for invalid user eu from 45.93.201.90 port 37378 ssh2 Dec 29 23:49:20 host sshd[9324]: Connection closed by 45.93.201.90 port 37378 [preauth] Dec 29 23:49:20 host sshd[9324]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 30 00:08:58 host sshd[12058]: Invalid user test from 159.65.232.117 port 45200 Dec 30 00:08:58 host sshd[12058]: input_userauth_request: invalid user test [preauth] Dec 30 00:08:58 host sshd[12058]: pam_unix(sshd:auth): check pass; user unknown Dec 30 00:08:58 host sshd[12058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.232.117 Dec 30 00:09:00 host sshd[12058]: Failed password for invalid user test from 159.65.232.117 port 45200 ssh2 Dec 30 00:09:00 host sshd[12058]: Received disconnect from 159.65.232.117 port 45200:11: Bye Bye [preauth] Dec 30 00:09:00 host sshd[12058]: Disconnected from 159.65.232.117 port 45200 [preauth] Dec 30 00:10:13 host sshd[12270]: Invalid user haoyu from 205.185.119.114 port 47758 Dec 30 00:10:13 host sshd[12270]: input_userauth_request: invalid user haoyu [preauth] Dec 30 00:10:13 host sshd[12270]: pam_unix(sshd:auth): check pass; user unknown Dec 30 00:10:13 host sshd[12270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.119.114 Dec 30 00:10:14 host sshd[12270]: Failed password for invalid user haoyu from 205.185.119.114 port 47758 ssh2 Dec 30 00:10:14 host sshd[12270]: Received disconnect from 205.185.119.114 port 47758:11: Bye Bye [preauth] Dec 30 00:10:14 host sshd[12270]: Disconnected from 205.185.119.114 port 47758 [preauth] Dec 30 00:10:32 host sshd[12333]: User root from 182.76.209.38 not allowed because not listed in AllowUsers Dec 30 00:10:32 host sshd[12333]: input_userauth_request: invalid user root [preauth] Dec 30 00:10:32 host unix_chkpwd[12337]: password check failed for user (root) Dec 30 00:10:32 host sshd[12333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.76.209.38 user=root Dec 30 00:10:32 host sshd[12333]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 00:10:34 host sshd[12333]: Failed password for invalid user root from 182.76.209.38 port 55186 ssh2 Dec 30 00:10:34 host sshd[12333]: Received disconnect from 182.76.209.38 port 55186:11: Bye Bye [preauth] Dec 30 00:10:34 host sshd[12333]: Disconnected from 182.76.209.38 port 55186 [preauth] Dec 30 00:11:14 host sshd[12424]: User root from 43.157.7.187 not allowed because not listed in AllowUsers Dec 30 00:11:14 host sshd[12424]: input_userauth_request: invalid user root [preauth] Dec 30 00:11:14 host unix_chkpwd[12429]: password check failed for user (root) Dec 30 00:11:14 host sshd[12424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.7.187 user=root Dec 30 00:11:14 host sshd[12424]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 00:11:15 host sshd[12427]: Invalid user allan from 161.35.63.109 port 37918 Dec 30 00:11:15 host sshd[12427]: input_userauth_request: invalid user allan [preauth] Dec 30 00:11:15 host sshd[12427]: pam_unix(sshd:auth): check pass; user unknown Dec 30 00:11:15 host sshd[12427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.63.109 Dec 30 00:11:16 host sshd[12424]: Failed password for invalid user root from 43.157.7.187 port 57674 ssh2 Dec 30 00:11:16 host sshd[12424]: Received disconnect from 43.157.7.187 port 57674:11: Bye Bye [preauth] Dec 30 00:11:16 host sshd[12424]: Disconnected from 43.157.7.187 port 57674 [preauth] Dec 30 00:11:17 host sshd[12427]: Failed password for invalid user allan from 161.35.63.109 port 37918 ssh2 Dec 30 00:11:18 host sshd[12427]: Received disconnect from 161.35.63.109 port 37918:11: Bye Bye [preauth] Dec 30 00:11:18 host sshd[12427]: Disconnected from 161.35.63.109 port 37918 [preauth] Dec 30 00:11:31 host sshd[12466]: Invalid user admin from 207.154.205.34 port 42454 Dec 30 00:11:31 host sshd[12466]: input_userauth_request: invalid user admin [preauth] Dec 30 00:11:31 host sshd[12466]: pam_unix(sshd:auth): check pass; user unknown Dec 30 00:11:31 host sshd[12466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.205.34 Dec 30 00:11:33 host sshd[12466]: Failed password for invalid user admin from 207.154.205.34 port 42454 ssh2 Dec 30 00:11:33 host sshd[12466]: Received disconnect from 207.154.205.34 port 42454:11: Bye Bye [preauth] Dec 30 00:11:33 host sshd[12466]: Disconnected from 207.154.205.34 port 42454 [preauth] Dec 30 00:11:36 host sshd[12478]: Invalid user test2 from 27.254.149.199 port 43572 Dec 30 00:11:36 host sshd[12478]: input_userauth_request: invalid user test2 [preauth] Dec 30 00:11:36 host sshd[12478]: pam_unix(sshd:auth): check pass; user unknown Dec 30 00:11:36 host sshd[12478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.149.199 Dec 30 00:11:38 host sshd[12478]: Failed password for invalid user test2 from 27.254.149.199 port 43572 ssh2 Dec 30 00:11:39 host sshd[12478]: Received disconnect from 27.254.149.199 port 43572:11: Bye Bye [preauth] Dec 30 00:11:39 host sshd[12478]: Disconnected from 27.254.149.199 port 43572 [preauth] Dec 30 00:11:39 host sshd[12484]: Invalid user haoyu from 103.225.124.210 port 34784 Dec 30 00:11:39 host sshd[12484]: input_userauth_request: invalid user haoyu [preauth] Dec 30 00:11:39 host sshd[12484]: pam_unix(sshd:auth): check pass; user unknown Dec 30 00:11:39 host sshd[12484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.225.124.210 Dec 30 00:11:42 host sshd[12484]: Failed password for invalid user haoyu from 103.225.124.210 port 34784 ssh2 Dec 30 00:11:42 host sshd[12484]: Received disconnect from 103.225.124.210 port 34784:11: Bye Bye [preauth] Dec 30 00:11:42 host sshd[12484]: Disconnected from 103.225.124.210 port 34784 [preauth] Dec 30 00:12:08 host sshd[12533]: Connection closed by 192.155.90.220 port 39142 [preauth] Dec 30 00:12:10 host sshd[12543]: Connection closed by 192.155.90.220 port 39148 [preauth] Dec 30 00:12:11 host sshd[12546]: Connection closed by 192.155.90.220 port 39154 [preauth] Dec 30 00:14:03 host sshd[12875]: User root from 59.127.158.223 not allowed because not listed in AllowUsers Dec 30 00:14:03 host sshd[12875]: input_userauth_request: invalid user root [preauth] Dec 30 00:14:03 host unix_chkpwd[12886]: password check failed for user (root) Dec 30 00:14:03 host sshd[12875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.127.158.223 user=root Dec 30 00:14:03 host sshd[12875]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 00:14:03 host sshd[12882]: User root from 137.184.231.138 not allowed because not listed in AllowUsers Dec 30 00:14:03 host sshd[12882]: input_userauth_request: invalid user root [preauth] Dec 30 00:14:03 host unix_chkpwd[12925]: password check failed for user (root) Dec 30 00:14:03 host sshd[12882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.231.138 user=root Dec 30 00:14:03 host sshd[12882]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 00:14:04 host sshd[12875]: Failed password for invalid user root from 59.127.158.223 port 50436 ssh2 Dec 30 00:14:05 host sshd[12875]: Received disconnect from 59.127.158.223 port 50436:11: Bye Bye [preauth] Dec 30 00:14:05 host sshd[12875]: Disconnected from 59.127.158.223 port 50436 [preauth] Dec 30 00:14:05 host sshd[12882]: Failed password for invalid user root from 137.184.231.138 port 42862 ssh2 Dec 30 00:14:05 host sshd[12882]: Received disconnect from 137.184.231.138 port 42862:11: Bye Bye [preauth] Dec 30 00:14:05 host sshd[12882]: Disconnected from 137.184.231.138 port 42862 [preauth] Dec 30 00:14:21 host sshd[12977]: User root from 43.157.7.187 not allowed because not listed in AllowUsers Dec 30 00:14:21 host sshd[12977]: input_userauth_request: invalid user root [preauth] Dec 30 00:14:21 host unix_chkpwd[12981]: password check failed for user (root) Dec 30 00:14:21 host sshd[12977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.7.187 user=root Dec 30 00:14:21 host sshd[12977]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 00:14:23 host sshd[12977]: Failed password for invalid user root from 43.157.7.187 port 43134 ssh2 Dec 30 00:14:39 host sshd[13068]: Invalid user user1 from 159.65.232.117 port 51812 Dec 30 00:14:39 host sshd[13068]: input_userauth_request: invalid user user1 [preauth] Dec 30 00:14:39 host sshd[13068]: pam_unix(sshd:auth): check pass; user unknown Dec 30 00:14:39 host sshd[13068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.232.117 Dec 30 00:14:41 host sshd[13068]: Failed password for invalid user user1 from 159.65.232.117 port 51812 ssh2 Dec 30 00:14:41 host sshd[13068]: Received disconnect from 159.65.232.117 port 51812:11: Bye Bye [preauth] Dec 30 00:14:41 host sshd[13068]: Disconnected from 159.65.232.117 port 51812 [preauth] Dec 30 00:14:53 host sshd[13307]: User root from 103.225.124.210 not allowed because not listed in AllowUsers Dec 30 00:14:53 host sshd[13307]: input_userauth_request: invalid user root [preauth] Dec 30 00:14:53 host unix_chkpwd[13309]: password check failed for user (root) Dec 30 00:14:53 host sshd[13307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.225.124.210 user=root Dec 30 00:14:53 host sshd[13307]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 00:14:55 host sshd[13307]: Failed password for invalid user root from 103.225.124.210 port 47840 ssh2 Dec 30 00:14:55 host sshd[13307]: Received disconnect from 103.225.124.210 port 47840:11: Bye Bye [preauth] Dec 30 00:14:55 host sshd[13307]: Disconnected from 103.225.124.210 port 47840 [preauth] Dec 30 00:14:58 host sshd[13404]: Invalid user oracle from 207.154.205.34 port 54216 Dec 30 00:14:58 host sshd[13404]: input_userauth_request: invalid user oracle [preauth] Dec 30 00:14:58 host sshd[13404]: pam_unix(sshd:auth): check pass; user unknown Dec 30 00:14:58 host sshd[13404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.205.34 Dec 30 00:15:00 host sshd[13404]: Failed password for invalid user oracle from 207.154.205.34 port 54216 ssh2 Dec 30 00:15:00 host sshd[13404]: Received disconnect from 207.154.205.34 port 54216:11: Bye Bye [preauth] Dec 30 00:15:00 host sshd[13404]: Disconnected from 207.154.205.34 port 54216 [preauth] Dec 30 00:15:07 host sshd[13551]: Invalid user sonia from 27.254.149.199 port 58152 Dec 30 00:15:07 host sshd[13551]: input_userauth_request: invalid user sonia [preauth] Dec 30 00:15:07 host sshd[13551]: pam_unix(sshd:auth): check pass; user unknown Dec 30 00:15:07 host sshd[13551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.149.199 Dec 30 00:15:09 host sshd[13551]: Failed password for invalid user sonia from 27.254.149.199 port 58152 ssh2 Dec 30 00:15:09 host sshd[13551]: Received disconnect from 27.254.149.199 port 58152:11: Bye Bye [preauth] Dec 30 00:15:09 host sshd[13551]: Disconnected from 27.254.149.199 port 58152 [preauth] Dec 30 00:15:40 host sshd[14040]: Invalid user cesar from 159.65.232.117 port 60232 Dec 30 00:15:40 host sshd[14040]: input_userauth_request: invalid user cesar [preauth] Dec 30 00:15:40 host sshd[14040]: pam_unix(sshd:auth): check pass; user unknown Dec 30 00:15:40 host sshd[14040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.232.117 Dec 30 00:15:42 host sshd[14040]: Failed password for invalid user cesar from 159.65.232.117 port 60232 ssh2 Dec 30 00:15:42 host sshd[14040]: Received disconnect from 159.65.232.117 port 60232:11: Bye Bye [preauth] Dec 30 00:15:42 host sshd[14040]: Disconnected from 159.65.232.117 port 60232 [preauth] Dec 30 00:15:46 host sshd[14100]: User root from 137.184.231.138 not allowed because not listed in AllowUsers Dec 30 00:15:46 host sshd[14100]: input_userauth_request: invalid user root [preauth] Dec 30 00:15:46 host unix_chkpwd[14108]: password check failed for user (root) Dec 30 00:15:46 host sshd[14100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.231.138 user=root Dec 30 00:15:46 host sshd[14100]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 00:15:48 host sshd[14111]: Invalid user will from 161.35.63.109 port 52224 Dec 30 00:15:48 host sshd[14111]: input_userauth_request: invalid user will [preauth] Dec 30 00:15:48 host sshd[14111]: pam_unix(sshd:auth): check pass; user unknown Dec 30 00:15:48 host sshd[14111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.63.109 Dec 30 00:15:48 host sshd[14100]: Failed password for invalid user root from 137.184.231.138 port 42964 ssh2 Dec 30 00:15:50 host sshd[14111]: Failed password for invalid user will from 161.35.63.109 port 52224 ssh2 Dec 30 00:15:50 host sshd[14111]: Received disconnect from 161.35.63.109 port 52224:11: Bye Bye [preauth] Dec 30 00:15:50 host sshd[14111]: Disconnected from 161.35.63.109 port 52224 [preauth] Dec 30 00:16:07 host sshd[14210]: User root from 207.154.205.34 not allowed because not listed in AllowUsers Dec 30 00:16:07 host sshd[14210]: input_userauth_request: invalid user root [preauth] Dec 30 00:16:07 host unix_chkpwd[14213]: password check failed for user (root) Dec 30 00:16:07 host sshd[14210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.205.34 user=root Dec 30 00:16:07 host sshd[14210]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 00:16:08 host sshd[14210]: Failed password for invalid user root from 207.154.205.34 port 50156 ssh2 Dec 30 00:16:31 host sshd[14338]: User root from 182.48.251.242 not allowed because not listed in AllowUsers Dec 30 00:16:31 host sshd[14338]: input_userauth_request: invalid user root [preauth] Dec 30 00:16:31 host unix_chkpwd[14341]: password check failed for user (root) Dec 30 00:16:31 host sshd[14338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.48.251.242 user=root Dec 30 00:16:31 host sshd[14338]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 00:16:33 host sshd[14338]: Failed password for invalid user root from 182.48.251.242 port 45490 ssh2 Dec 30 00:16:33 host sshd[14338]: Received disconnect from 182.48.251.242 port 45490:11: Bye Bye [preauth] Dec 30 00:16:33 host sshd[14338]: Disconnected from 182.48.251.242 port 45490 [preauth] Dec 30 00:16:37 host sshd[14354]: User root from 27.254.149.199 not allowed because not listed in AllowUsers Dec 30 00:16:37 host sshd[14354]: input_userauth_request: invalid user root [preauth] Dec 30 00:16:37 host unix_chkpwd[14356]: password check failed for user (root) Dec 30 00:16:37 host sshd[14354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.149.199 user=root Dec 30 00:16:37 host sshd[14354]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 00:16:39 host sshd[14354]: Failed password for invalid user root from 27.254.149.199 port 58614 ssh2 Dec 30 00:16:51 host sshd[14404]: Invalid user abc from 59.127.158.223 port 54568 Dec 30 00:16:51 host sshd[14404]: input_userauth_request: invalid user abc [preauth] Dec 30 00:16:51 host sshd[14404]: pam_unix(sshd:auth): check pass; user unknown Dec 30 00:16:51 host sshd[14404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.127.158.223 Dec 30 00:16:53 host sshd[14404]: Failed password for invalid user abc from 59.127.158.223 port 54568 ssh2 Dec 30 00:16:54 host sshd[14408]: Invalid user nathalie from 161.35.63.109 port 60100 Dec 30 00:16:54 host sshd[14408]: input_userauth_request: invalid user nathalie [preauth] Dec 30 00:16:54 host sshd[14408]: pam_unix(sshd:auth): check pass; user unknown Dec 30 00:16:54 host sshd[14408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.63.109 Dec 30 00:16:54 host sshd[14404]: Received disconnect from 59.127.158.223 port 54568:11: Bye Bye [preauth] Dec 30 00:16:54 host sshd[14404]: Disconnected from 59.127.158.223 port 54568 [preauth] Dec 30 00:16:56 host sshd[14408]: Failed password for invalid user nathalie from 161.35.63.109 port 60100 ssh2 Dec 30 00:16:56 host sshd[14408]: Received disconnect from 161.35.63.109 port 60100:11: Bye Bye [preauth] Dec 30 00:16:56 host sshd[14408]: Disconnected from 161.35.63.109 port 60100 [preauth] Dec 30 00:17:02 host sshd[14427]: User root from 205.185.119.114 not allowed because not listed in AllowUsers Dec 30 00:17:02 host sshd[14427]: input_userauth_request: invalid user root [preauth] Dec 30 00:17:02 host unix_chkpwd[14492]: password check failed for user (root) Dec 30 00:17:02 host sshd[14427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.119.114 user=root Dec 30 00:17:02 host sshd[14427]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 00:17:04 host sshd[14427]: Failed password for invalid user root from 205.185.119.114 port 43878 ssh2 Dec 30 00:17:04 host sshd[14427]: Received disconnect from 205.185.119.114 port 43878:11: Bye Bye [preauth] Dec 30 00:17:04 host sshd[14427]: Disconnected from 205.185.119.114 port 43878 [preauth] Dec 30 00:17:20 host sshd[14542]: User root from 112.240.57.14 not allowed because not listed in AllowUsers Dec 30 00:17:20 host sshd[14542]: input_userauth_request: invalid user root [preauth] Dec 30 00:17:20 host unix_chkpwd[14546]: password check failed for user (root) Dec 30 00:17:20 host sshd[14542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.240.57.14 user=root Dec 30 00:17:20 host sshd[14542]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 00:17:22 host sshd[14542]: Failed password for invalid user root from 112.240.57.14 port 52268 ssh2 Dec 30 00:17:22 host sshd[14542]: Received disconnect from 112.240.57.14 port 52268:11: Bye Bye [preauth] Dec 30 00:17:22 host sshd[14542]: Disconnected from 112.240.57.14 port 52268 [preauth] Dec 30 00:18:19 host sshd[14650]: User root from 182.48.251.242 not allowed because not listed in AllowUsers Dec 30 00:18:19 host sshd[14650]: input_userauth_request: invalid user root [preauth] Dec 30 00:18:19 host unix_chkpwd[14652]: password check failed for user (root) Dec 30 00:18:19 host sshd[14650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.48.251.242 user=root Dec 30 00:18:19 host sshd[14650]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 00:18:21 host sshd[14650]: Failed password for invalid user root from 182.48.251.242 port 41142 ssh2 Dec 30 00:18:21 host sshd[14650]: Received disconnect from 182.48.251.242 port 41142:11: Bye Bye [preauth] Dec 30 00:18:21 host sshd[14650]: Disconnected from 182.48.251.242 port 41142 [preauth] Dec 30 00:20:14 host sshd[15020]: Invalid user sonarqube from 182.76.209.38 port 39268 Dec 30 00:20:14 host sshd[15020]: input_userauth_request: invalid user sonarqube [preauth] Dec 30 00:20:14 host sshd[15020]: pam_unix(sshd:auth): check pass; user unknown Dec 30 00:20:14 host sshd[15020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.76.209.38 Dec 30 00:20:16 host sshd[15020]: Failed password for invalid user sonarqube from 182.76.209.38 port 39268 ssh2 Dec 30 00:20:16 host sshd[15020]: Received disconnect from 182.76.209.38 port 39268:11: Bye Bye [preauth] Dec 30 00:20:16 host sshd[15020]: Disconnected from 182.76.209.38 port 39268 [preauth] Dec 30 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 30 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 30 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 30 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 30 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 30 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 30 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 30 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 00:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 30 00:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 00:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 30 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=palco123 user-2=gifterman user-3=kottayamcalldriv user-4=phmetals user-5=wwwnexidigital user-6=mrsclean user-7=bonifacegroup user-8=wwwevmhonda user-9=wwwletsstalkfood user-10=straightcurve user-11=vfmassets user-12=shalinijames user-13=wwwtestugo user-14=pmcresources user-15=wwwkmaorg user-16=disposeat user-17=remysagr user-18=woodpeck user-19=wwwkapin user-20=travelboniface user-21=wwwresourcehunte user-22=keralaholi user-23=wwwrmswll user-24=ugotscom user-25=wwwpmcresource user-26=a2zgroup user-27=dartsimp user-28=laundryboniface user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 30 00:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 30 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-J7PoY11ND8C4vyGG.~ Dec 30 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-J7PoY11ND8C4vyGG.~' Dec 30 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-J7PoY11ND8C4vyGG.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 30 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 30 00:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 00:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 00:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 00:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 00:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 00:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 00:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 00:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 00:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 00:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 00:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 00:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 30 00:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 00:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 00:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 00:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 00:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 00:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 30 00:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 30 00:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 30 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 30 00:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 00:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 00:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 30 00:21:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 00:21:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 00:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 30 00:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 00:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 00:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 30 00:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 00:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 30 00:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 00:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 00:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 30 00:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 00:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 00:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 30 00:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 00:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 00:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 30 00:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 00:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 00:33:00 host sshd[16908]: User root from 112.240.57.14 not allowed because not listed in AllowUsers Dec 30 00:33:00 host sshd[16908]: input_userauth_request: invalid user root [preauth] Dec 30 00:33:00 host unix_chkpwd[16916]: password check failed for user (root) Dec 30 00:33:00 host sshd[16908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.240.57.14 user=root Dec 30 00:33:00 host sshd[16908]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 00:33:02 host sshd[16908]: Failed password for invalid user root from 112.240.57.14 port 55868 ssh2 Dec 30 00:33:02 host sshd[16908]: Received disconnect from 112.240.57.14 port 55868:11: Bye Bye [preauth] Dec 30 00:33:02 host sshd[16908]: Disconnected from 112.240.57.14 port 55868 [preauth] Dec 30 00:33:09 host sshd[16971]: User root from 103.13.40.2 not allowed because not listed in AllowUsers Dec 30 00:33:09 host sshd[16971]: input_userauth_request: invalid user root [preauth] Dec 30 00:33:09 host unix_chkpwd[16973]: password check failed for user (root) Dec 30 00:33:09 host sshd[16971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 user=root Dec 30 00:33:09 host sshd[16971]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 00:33:11 host sshd[16971]: Failed password for invalid user root from 103.13.40.2 port 51948 ssh2 Dec 30 00:33:11 host sshd[16971]: Connection closed by 103.13.40.2 port 51948 [preauth] Dec 30 00:40:02 host sshd[17840]: Invalid user liangshuang from 162.218.126.136 port 48574 Dec 30 00:40:02 host sshd[17840]: input_userauth_request: invalid user liangshuang [preauth] Dec 30 00:40:02 host sshd[17840]: pam_unix(sshd:auth): check pass; user unknown Dec 30 00:40:02 host sshd[17840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 30 00:40:04 host sshd[17840]: Failed password for invalid user liangshuang from 162.218.126.136 port 48574 ssh2 Dec 30 00:40:05 host sshd[17840]: Connection closed by 162.218.126.136 port 48574 [preauth] Dec 30 00:47:25 host sshd[18892]: User root from 106.10.122.53 not allowed because not listed in AllowUsers Dec 30 00:47:25 host sshd[18892]: input_userauth_request: invalid user root [preauth] Dec 30 00:47:25 host unix_chkpwd[18895]: password check failed for user (root) Dec 30 00:47:25 host sshd[18892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 user=root Dec 30 00:47:25 host sshd[18892]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 00:47:27 host sshd[18892]: Failed password for invalid user root from 106.10.122.53 port 55812 ssh2 Dec 30 00:47:27 host sshd[18892]: Connection closed by 106.10.122.53 port 55812 [preauth] Dec 30 00:57:55 host sshd[20373]: Did not receive identification string from 69.49.230.44 port 39012 Dec 30 00:59:43 host sshd[20576]: Connection closed by 94.102.61.20 port 37738 [preauth] Dec 30 01:15:06 host sshd[22994]: Invalid user user from 41.197.31.178 port 48946 Dec 30 01:15:06 host sshd[22994]: input_userauth_request: invalid user user [preauth] Dec 30 01:15:06 host sshd[22994]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:15:06 host sshd[22994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 30 01:15:08 host sshd[22994]: Failed password for invalid user user from 41.197.31.178 port 48946 ssh2 Dec 30 01:15:09 host sshd[22994]: Connection closed by 41.197.31.178 port 48946 [preauth] Dec 30 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 30 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 30 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 30 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 30 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 30 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 30 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 30 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 01:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 30 01:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 01:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 30 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwrmswll user-2=keralaholi user-3=wwwresourcehunte user-4=ugotscom user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=dartsimp user-9=a2zgroup user-10=cochintaxi user-11=wwwkaretakers user-12=mrsclean user-13=wwwnexidigital user-14=gifterman user-15=palco123 user-16=kottayamcalldriv user-17=phmetals user-18=straightcurve user-19=wwwletsstalkfood user-20=bonifacegroup user-21=wwwevmhonda user-22=pmcresources user-23=vfmassets user-24=wwwtestugo user-25=shalinijames user-26=woodpeck user-27=wwwkapin user-28=disposeat user-29=wwwkmaorg user-30=remysagr feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 30 01:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 30 01:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 01:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-4jS1BKOQz0Q0Sxfx.~ Dec 30 01:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-4jS1BKOQz0Q0Sxfx.~' Dec 30 01:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-4jS1BKOQz0Q0Sxfx.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 01:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 30 01:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 01:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 01:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 30 01:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 01:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 01:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 01:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 01:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 01:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 01:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 01:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 01:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 01:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 01:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 01:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 30 01:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 01:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 01:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 01:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 01:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 01:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 30 01:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 30 01:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 30 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 30 01:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 01:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 30 01:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 01:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 01:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 30 01:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 01:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 30 01:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 01:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 01:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 30 01:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 01:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 01:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 30 01:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 01:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 01:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 30 01:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 01:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 01:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 30 01:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 01:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 01:22:57 host sshd[24588]: Invalid user ts3srv from 41.89.116.30 port 39420 Dec 30 01:22:57 host sshd[24588]: input_userauth_request: invalid user ts3srv [preauth] Dec 30 01:22:57 host sshd[24588]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:22:57 host sshd[24588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.89.116.30 Dec 30 01:22:59 host sshd[24588]: Failed password for invalid user ts3srv from 41.89.116.30 port 39420 ssh2 Dec 30 01:22:59 host sshd[24588]: Received disconnect from 41.89.116.30 port 39420:11: Bye Bye [preauth] Dec 30 01:22:59 host sshd[24588]: Disconnected from 41.89.116.30 port 39420 [preauth] Dec 30 01:23:05 host sshd[24615]: Invalid user ashish from 43.131.29.54 port 38948 Dec 30 01:23:05 host sshd[24615]: input_userauth_request: invalid user ashish [preauth] Dec 30 01:23:05 host sshd[24615]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:23:05 host sshd[24615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.29.54 Dec 30 01:23:07 host sshd[24615]: Failed password for invalid user ashish from 43.131.29.54 port 38948 ssh2 Dec 30 01:23:07 host sshd[24615]: Received disconnect from 43.131.29.54 port 38948:11: Bye Bye [preauth] Dec 30 01:23:07 host sshd[24615]: Disconnected from 43.131.29.54 port 38948 [preauth] Dec 30 01:23:58 host sshd[24754]: User root from 159.65.249.79 not allowed because not listed in AllowUsers Dec 30 01:23:58 host sshd[24754]: input_userauth_request: invalid user root [preauth] Dec 30 01:23:59 host unix_chkpwd[24758]: password check failed for user (root) Dec 30 01:23:59 host sshd[24754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.249.79 user=root Dec 30 01:23:59 host sshd[24754]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 01:24:01 host sshd[24754]: Failed password for invalid user root from 159.65.249.79 port 37660 ssh2 Dec 30 01:24:01 host sshd[24754]: Received disconnect from 159.65.249.79 port 37660:11: Bye Bye [preauth] Dec 30 01:24:01 host sshd[24754]: Disconnected from 159.65.249.79 port 37660 [preauth] Dec 30 01:24:02 host sshd[24764]: Invalid user cesar from 137.184.183.214 port 33642 Dec 30 01:24:02 host sshd[24764]: input_userauth_request: invalid user cesar [preauth] Dec 30 01:24:02 host sshd[24764]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:24:02 host sshd[24764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.183.214 Dec 30 01:24:04 host sshd[24764]: Failed password for invalid user cesar from 137.184.183.214 port 33642 ssh2 Dec 30 01:24:04 host sshd[24764]: Received disconnect from 137.184.183.214 port 33642:11: Bye Bye [preauth] Dec 30 01:24:04 host sshd[24764]: Disconnected from 137.184.183.214 port 33642 [preauth] Dec 30 01:24:40 host sshd[24873]: Invalid user master from 43.157.10.111 port 41844 Dec 30 01:24:40 host sshd[24873]: input_userauth_request: invalid user master [preauth] Dec 30 01:24:40 host sshd[24873]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:24:40 host sshd[24873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.10.111 Dec 30 01:24:42 host sshd[24873]: Failed password for invalid user master from 43.157.10.111 port 41844 ssh2 Dec 30 01:24:42 host sshd[24873]: Received disconnect from 43.157.10.111 port 41844:11: Bye Bye [preauth] Dec 30 01:24:42 host sshd[24873]: Disconnected from 43.157.10.111 port 41844 [preauth] Dec 30 01:24:46 host sshd[24887]: Invalid user elsearch from 157.245.156.72 port 45484 Dec 30 01:24:46 host sshd[24887]: input_userauth_request: invalid user elsearch [preauth] Dec 30 01:24:46 host sshd[24887]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:24:46 host sshd[24887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.156.72 Dec 30 01:24:48 host sshd[24887]: Failed password for invalid user elsearch from 157.245.156.72 port 45484 ssh2 Dec 30 01:24:48 host sshd[24887]: Received disconnect from 157.245.156.72 port 45484:11: Bye Bye [preauth] Dec 30 01:24:48 host sshd[24887]: Disconnected from 157.245.156.72 port 45484 [preauth] Dec 30 01:25:13 host sshd[25039]: User root from 137.184.145.62 not allowed because not listed in AllowUsers Dec 30 01:25:13 host sshd[25039]: input_userauth_request: invalid user root [preauth] Dec 30 01:25:13 host unix_chkpwd[25043]: password check failed for user (root) Dec 30 01:25:13 host sshd[25039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.145.62 user=root Dec 30 01:25:13 host sshd[25039]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 01:25:15 host sshd[25039]: Failed password for invalid user root from 137.184.145.62 port 33680 ssh2 Dec 30 01:25:15 host sshd[25039]: Received disconnect from 137.184.145.62 port 33680:11: Bye Bye [preauth] Dec 30 01:25:15 host sshd[25039]: Disconnected from 137.184.145.62 port 33680 [preauth] Dec 30 01:25:32 host sshd[25140]: Did not receive identification string from 149.129.220.104 port 61000 Dec 30 01:26:04 host sshd[25209]: Invalid user gis from 143.198.226.152 port 39140 Dec 30 01:26:04 host sshd[25209]: input_userauth_request: invalid user gis [preauth] Dec 30 01:26:04 host sshd[25209]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:26:04 host sshd[25209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.226.152 Dec 30 01:26:06 host sshd[25216]: User root from 103.117.138.5 not allowed because not listed in AllowUsers Dec 30 01:26:06 host sshd[25216]: input_userauth_request: invalid user root [preauth] Dec 30 01:26:06 host unix_chkpwd[25218]: password check failed for user (root) Dec 30 01:26:06 host sshd[25216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.117.138.5 user=root Dec 30 01:26:06 host sshd[25216]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 01:26:06 host sshd[25209]: Failed password for invalid user gis from 143.198.226.152 port 39140 ssh2 Dec 30 01:26:06 host sshd[25209]: Received disconnect from 143.198.226.152 port 39140:11: Bye Bye [preauth] Dec 30 01:26:06 host sshd[25209]: Disconnected from 143.198.226.152 port 39140 [preauth] Dec 30 01:26:08 host sshd[25216]: Failed password for invalid user root from 103.117.138.5 port 35556 ssh2 Dec 30 01:26:08 host sshd[25216]: Received disconnect from 103.117.138.5 port 35556:11: Bye Bye [preauth] Dec 30 01:26:08 host sshd[25216]: Disconnected from 103.117.138.5 port 35556 [preauth] Dec 30 01:26:31 host sshd[25296]: Invalid user alex from 5.75.226.61 port 49498 Dec 30 01:26:31 host sshd[25296]: input_userauth_request: invalid user alex [preauth] Dec 30 01:26:31 host sshd[25296]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:26:31 host sshd[25296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.75.226.61 Dec 30 01:26:33 host sshd[25296]: Failed password for invalid user alex from 5.75.226.61 port 49498 ssh2 Dec 30 01:26:33 host sshd[25296]: Received disconnect from 5.75.226.61 port 49498:11: Bye Bye [preauth] Dec 30 01:26:33 host sshd[25296]: Disconnected from 5.75.226.61 port 49498 [preauth] Dec 30 01:27:36 host sshd[25453]: Invalid user tableau from 175.196.245.105 port 53656 Dec 30 01:27:36 host sshd[25453]: input_userauth_request: invalid user tableau [preauth] Dec 30 01:27:36 host sshd[25453]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:27:36 host sshd[25453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.196.245.105 Dec 30 01:27:38 host sshd[25453]: Failed password for invalid user tableau from 175.196.245.105 port 53656 ssh2 Dec 30 01:27:38 host sshd[25453]: Received disconnect from 175.196.245.105 port 53656:11: Bye Bye [preauth] Dec 30 01:27:38 host sshd[25453]: Disconnected from 175.196.245.105 port 53656 [preauth] Dec 30 01:27:50 host sshd[25496]: Invalid user usuario from 43.157.10.111 port 55648 Dec 30 01:27:50 host sshd[25496]: input_userauth_request: invalid user usuario [preauth] Dec 30 01:27:50 host sshd[25496]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:27:50 host sshd[25496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.10.111 Dec 30 01:27:52 host sshd[25496]: Failed password for invalid user usuario from 43.157.10.111 port 55648 ssh2 Dec 30 01:27:52 host sshd[25496]: Received disconnect from 43.157.10.111 port 55648:11: Bye Bye [preauth] Dec 30 01:27:52 host sshd[25496]: Disconnected from 43.157.10.111 port 55648 [preauth] Dec 30 01:28:15 host sshd[25574]: Invalid user master from 43.131.29.54 port 33916 Dec 30 01:28:15 host sshd[25574]: input_userauth_request: invalid user master [preauth] Dec 30 01:28:15 host sshd[25574]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:28:15 host sshd[25574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.29.54 Dec 30 01:28:17 host sshd[25574]: Failed password for invalid user master from 43.131.29.54 port 33916 ssh2 Dec 30 01:28:18 host sshd[25574]: Received disconnect from 43.131.29.54 port 33916:11: Bye Bye [preauth] Dec 30 01:28:18 host sshd[25574]: Disconnected from 43.131.29.54 port 33916 [preauth] Dec 30 01:28:26 host sshd[25613]: Invalid user jon from 137.184.183.214 port 33870 Dec 30 01:28:26 host sshd[25613]: input_userauth_request: invalid user jon [preauth] Dec 30 01:28:26 host sshd[25613]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:28:26 host sshd[25613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.183.214 Dec 30 01:28:28 host sshd[25613]: Failed password for invalid user jon from 137.184.183.214 port 33870 ssh2 Dec 30 01:28:28 host sshd[25613]: Received disconnect from 137.184.183.214 port 33870:11: Bye Bye [preauth] Dec 30 01:28:28 host sshd[25613]: Disconnected from 137.184.183.214 port 33870 [preauth] Dec 30 01:28:28 host sshd[25621]: Invalid user teamspeak3 from 159.65.249.79 port 37006 Dec 30 01:28:28 host sshd[25621]: input_userauth_request: invalid user teamspeak3 [preauth] Dec 30 01:28:28 host sshd[25621]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:28:28 host sshd[25621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.249.79 Dec 30 01:28:30 host sshd[25621]: Failed password for invalid user teamspeak3 from 159.65.249.79 port 37006 ssh2 Dec 30 01:28:30 host sshd[25621]: Received disconnect from 159.65.249.79 port 37006:11: Bye Bye [preauth] Dec 30 01:28:30 host sshd[25621]: Disconnected from 159.65.249.79 port 37006 [preauth] Dec 30 01:28:37 host sshd[25669]: Invalid user ts3srv from 157.245.156.72 port 33506 Dec 30 01:28:37 host sshd[25669]: input_userauth_request: invalid user ts3srv [preauth] Dec 30 01:28:37 host sshd[25669]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:28:37 host sshd[25669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.156.72 Dec 30 01:28:39 host sshd[25669]: Failed password for invalid user ts3srv from 157.245.156.72 port 33506 ssh2 Dec 30 01:28:39 host sshd[25669]: Received disconnect from 157.245.156.72 port 33506:11: Bye Bye [preauth] Dec 30 01:28:39 host sshd[25669]: Disconnected from 157.245.156.72 port 33506 [preauth] Dec 30 01:28:46 host sshd[25688]: Invalid user user from 137.184.145.62 port 57670 Dec 30 01:28:46 host sshd[25688]: input_userauth_request: invalid user user [preauth] Dec 30 01:28:46 host sshd[25688]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:28:46 host sshd[25688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.145.62 Dec 30 01:28:48 host sshd[25688]: Failed password for invalid user user from 137.184.145.62 port 57670 ssh2 Dec 30 01:28:48 host sshd[25688]: Received disconnect from 137.184.145.62 port 57670:11: Bye Bye [preauth] Dec 30 01:28:48 host sshd[25688]: Disconnected from 137.184.145.62 port 57670 [preauth] Dec 30 01:28:51 host sshd[25719]: Invalid user paulo from 5.75.226.61 port 59224 Dec 30 01:28:51 host sshd[25719]: input_userauth_request: invalid user paulo [preauth] Dec 30 01:28:51 host sshd[25719]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:28:51 host sshd[25719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.75.226.61 Dec 30 01:28:52 host sshd[25734]: Invalid user user7 from 41.89.116.30 port 44510 Dec 30 01:28:52 host sshd[25734]: input_userauth_request: invalid user user7 [preauth] Dec 30 01:28:52 host sshd[25734]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:28:52 host sshd[25734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.89.116.30 Dec 30 01:28:54 host sshd[25719]: Failed password for invalid user paulo from 5.75.226.61 port 59224 ssh2 Dec 30 01:28:54 host sshd[25719]: Received disconnect from 5.75.226.61 port 59224:11: Bye Bye [preauth] Dec 30 01:28:54 host sshd[25719]: Disconnected from 5.75.226.61 port 59224 [preauth] Dec 30 01:28:54 host sshd[25734]: Failed password for invalid user user7 from 41.89.116.30 port 44510 ssh2 Dec 30 01:28:55 host sshd[25734]: Received disconnect from 41.89.116.30 port 44510:11: Bye Bye [preauth] Dec 30 01:28:55 host sshd[25734]: Disconnected from 41.89.116.30 port 44510 [preauth] Dec 30 01:28:58 host sshd[25762]: Invalid user shen from 143.198.226.152 port 48662 Dec 30 01:28:58 host sshd[25762]: input_userauth_request: invalid user shen [preauth] Dec 30 01:28:58 host sshd[25762]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:28:58 host sshd[25762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.226.152 Dec 30 01:28:59 host sshd[25762]: Failed password for invalid user shen from 143.198.226.152 port 48662 ssh2 Dec 30 01:29:00 host sshd[25762]: Received disconnect from 143.198.226.152 port 48662:11: Bye Bye [preauth] Dec 30 01:29:00 host sshd[25762]: Disconnected from 143.198.226.152 port 48662 [preauth] Dec 30 01:29:05 host sshd[25792]: Invalid user git from 43.157.10.111 port 56370 Dec 30 01:29:05 host sshd[25792]: input_userauth_request: invalid user git [preauth] Dec 30 01:29:05 host sshd[25792]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:29:05 host sshd[25792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.10.111 Dec 30 01:29:07 host sshd[25792]: Failed password for invalid user git from 43.157.10.111 port 56370 ssh2 Dec 30 01:29:07 host sshd[25792]: Received disconnect from 43.157.10.111 port 56370:11: Bye Bye [preauth] Dec 30 01:29:07 host sshd[25792]: Disconnected from 43.157.10.111 port 56370 [preauth] Dec 30 01:29:09 host sshd[25799]: Invalid user userftp from 72.165.240.194 port 43800 Dec 30 01:29:09 host sshd[25799]: input_userauth_request: invalid user userftp [preauth] Dec 30 01:29:09 host sshd[25799]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:29:09 host sshd[25799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.165.240.194 Dec 30 01:29:11 host sshd[25799]: Failed password for invalid user userftp from 72.165.240.194 port 43800 ssh2 Dec 30 01:29:11 host sshd[25799]: Received disconnect from 72.165.240.194 port 43800:11: Bye Bye [preauth] Dec 30 01:29:11 host sshd[25799]: Disconnected from 72.165.240.194 port 43800 [preauth] Dec 30 01:29:21 host sshd[25867]: Invalid user gis from 110.249.155.18 port 48292 Dec 30 01:29:21 host sshd[25867]: input_userauth_request: invalid user gis [preauth] Dec 30 01:29:21 host sshd[25867]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:29:21 host sshd[25867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.249.155.18 Dec 30 01:29:22 host sshd[25872]: Invalid user dbuser from 43.131.29.54 port 58220 Dec 30 01:29:22 host sshd[25872]: input_userauth_request: invalid user dbuser [preauth] Dec 30 01:29:22 host sshd[25872]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:29:22 host sshd[25872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.29.54 Dec 30 01:29:23 host sshd[25872]: Failed password for invalid user dbuser from 43.131.29.54 port 58220 ssh2 Dec 30 01:29:24 host sshd[25867]: Failed password for invalid user gis from 110.249.155.18 port 48292 ssh2 Dec 30 01:29:24 host sshd[25872]: Received disconnect from 43.131.29.54 port 58220:11: Bye Bye [preauth] Dec 30 01:29:24 host sshd[25872]: Disconnected from 43.131.29.54 port 58220 [preauth] Dec 30 01:29:24 host sshd[25867]: Received disconnect from 110.249.155.18 port 48292:11: Bye Bye [preauth] Dec 30 01:29:24 host sshd[25867]: Disconnected from 110.249.155.18 port 48292 [preauth] Dec 30 01:29:24 host sshd[25879]: Invalid user carmen from 175.196.245.105 port 37062 Dec 30 01:29:24 host sshd[25879]: input_userauth_request: invalid user carmen [preauth] Dec 30 01:29:24 host sshd[25879]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:29:24 host sshd[25879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.196.245.105 Dec 30 01:29:25 host sshd[25879]: Failed password for invalid user carmen from 175.196.245.105 port 37062 ssh2 Dec 30 01:29:26 host sshd[25879]: Received disconnect from 175.196.245.105 port 37062:11: Bye Bye [preauth] Dec 30 01:29:26 host sshd[25879]: Disconnected from 175.196.245.105 port 37062 [preauth] Dec 30 01:29:28 host sshd[25938]: User root from 103.117.138.5 not allowed because not listed in AllowUsers Dec 30 01:29:28 host sshd[25938]: input_userauth_request: invalid user root [preauth] Dec 30 01:29:28 host unix_chkpwd[25942]: password check failed for user (root) Dec 30 01:29:28 host sshd[25938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.117.138.5 user=root Dec 30 01:29:28 host sshd[25938]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 01:29:30 host sshd[25938]: Failed password for invalid user root from 103.117.138.5 port 46106 ssh2 Dec 30 01:29:30 host sshd[25938]: Received disconnect from 103.117.138.5 port 46106:11: Bye Bye [preauth] Dec 30 01:29:30 host sshd[25938]: Disconnected from 103.117.138.5 port 46106 [preauth] Dec 30 01:29:35 host sshd[25987]: Invalid user administrator from 197.248.63.75 port 29781 Dec 30 01:29:35 host sshd[25987]: input_userauth_request: invalid user administrator [preauth] Dec 30 01:29:35 host sshd[25987]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:29:35 host sshd[25987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.248.63.75 Dec 30 01:29:37 host sshd[25987]: Failed password for invalid user administrator from 197.248.63.75 port 29781 ssh2 Dec 30 01:29:37 host sshd[25987]: Received disconnect from 197.248.63.75 port 29781:11: Bye Bye [preauth] Dec 30 01:29:37 host sshd[25987]: Disconnected from 197.248.63.75 port 29781 [preauth] Dec 30 01:29:39 host sshd[25995]: Invalid user uftp from 137.184.183.214 port 34008 Dec 30 01:29:39 host sshd[25995]: input_userauth_request: invalid user uftp [preauth] Dec 30 01:29:39 host sshd[25995]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:29:39 host sshd[25995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.183.214 Dec 30 01:29:42 host sshd[25995]: Failed password for invalid user uftp from 137.184.183.214 port 34008 ssh2 Dec 30 01:30:01 host sshd[26072]: User root from 5.75.226.61 not allowed because not listed in AllowUsers Dec 30 01:30:01 host sshd[26072]: input_userauth_request: invalid user root [preauth] Dec 30 01:30:01 host unix_chkpwd[26075]: password check failed for user (root) Dec 30 01:30:01 host sshd[26072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.75.226.61 user=root Dec 30 01:30:01 host sshd[26072]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 01:30:03 host sshd[26072]: Failed password for invalid user root from 5.75.226.61 port 50606 ssh2 Dec 30 01:30:03 host sshd[26101]: Invalid user ventas from 143.198.226.152 port 57700 Dec 30 01:30:03 host sshd[26101]: input_userauth_request: invalid user ventas [preauth] Dec 30 01:30:03 host sshd[26101]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:30:03 host sshd[26101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.226.152 Dec 30 01:30:03 host sshd[26072]: Received disconnect from 5.75.226.61 port 50606:11: Bye Bye [preauth] Dec 30 01:30:03 host sshd[26072]: Disconnected from 5.75.226.61 port 50606 [preauth] Dec 30 01:30:06 host sshd[26169]: Invalid user user1 from 157.245.156.72 port 57036 Dec 30 01:30:06 host sshd[26169]: input_userauth_request: invalid user user1 [preauth] Dec 30 01:30:06 host sshd[26169]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:30:06 host sshd[26169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.156.72 Dec 30 01:30:06 host sshd[26101]: Failed password for invalid user ventas from 143.198.226.152 port 57700 ssh2 Dec 30 01:30:07 host sshd[26169]: Failed password for invalid user user1 from 157.245.156.72 port 57036 ssh2 Dec 30 01:30:07 host sshd[26169]: Received disconnect from 157.245.156.72 port 57036:11: Bye Bye [preauth] Dec 30 01:30:07 host sshd[26169]: Disconnected from 157.245.156.72 port 57036 [preauth] Dec 30 01:30:21 host sshd[26339]: Invalid user alex from 41.89.116.30 port 57012 Dec 30 01:30:21 host sshd[26339]: input_userauth_request: invalid user alex [preauth] Dec 30 01:30:21 host sshd[26339]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:30:21 host sshd[26339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.89.116.30 Dec 30 01:30:23 host sshd[26339]: Failed password for invalid user alex from 41.89.116.30 port 57012 ssh2 Dec 30 01:30:24 host sshd[26339]: Received disconnect from 41.89.116.30 port 57012:11: Bye Bye [preauth] Dec 30 01:30:24 host sshd[26339]: Disconnected from 41.89.116.30 port 57012 [preauth] Dec 30 01:30:51 host sshd[26454]: Invalid user user from 175.196.245.105 port 55758 Dec 30 01:30:51 host sshd[26454]: input_userauth_request: invalid user user [preauth] Dec 30 01:30:51 host sshd[26454]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:30:51 host sshd[26454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.196.245.105 Dec 30 01:30:53 host sshd[26454]: Failed password for invalid user user from 175.196.245.105 port 55758 ssh2 Dec 30 01:30:54 host sshd[26454]: Received disconnect from 175.196.245.105 port 55758:11: Bye Bye [preauth] Dec 30 01:30:54 host sshd[26454]: Disconnected from 175.196.245.105 port 55758 [preauth] Dec 30 01:30:57 host sshd[26499]: User root from 133.130.98.176 not allowed because not listed in AllowUsers Dec 30 01:30:57 host sshd[26499]: input_userauth_request: invalid user root [preauth] Dec 30 01:30:57 host unix_chkpwd[26501]: password check failed for user (root) Dec 30 01:30:57 host sshd[26499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.98.176 user=root Dec 30 01:30:57 host sshd[26499]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 01:30:59 host sshd[26499]: Failed password for invalid user root from 133.130.98.176 port 49574 ssh2 Dec 30 01:30:59 host sshd[26499]: Received disconnect from 133.130.98.176 port 49574:11: Bye Bye [preauth] Dec 30 01:30:59 host sshd[26499]: Disconnected from 133.130.98.176 port 49574 [preauth] Dec 30 01:31:48 host sshd[26643]: Invalid user shen from 72.165.240.194 port 44066 Dec 30 01:31:48 host sshd[26643]: input_userauth_request: invalid user shen [preauth] Dec 30 01:31:48 host sshd[26643]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:31:48 host sshd[26643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.165.240.194 Dec 30 01:31:49 host sshd[26643]: Failed password for invalid user shen from 72.165.240.194 port 44066 ssh2 Dec 30 01:31:49 host sshd[26643]: Received disconnect from 72.165.240.194 port 44066:11: Bye Bye [preauth] Dec 30 01:31:49 host sshd[26643]: Disconnected from 72.165.240.194 port 44066 [preauth] Dec 30 01:31:58 host sshd[26709]: Invalid user alex from 110.249.155.18 port 50070 Dec 30 01:31:58 host sshd[26709]: input_userauth_request: invalid user alex [preauth] Dec 30 01:31:58 host sshd[26709]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:31:58 host sshd[26709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.249.155.18 Dec 30 01:32:00 host sshd[26709]: Failed password for invalid user alex from 110.249.155.18 port 50070 ssh2 Dec 30 01:32:00 host sshd[26709]: Received disconnect from 110.249.155.18 port 50070:11: Bye Bye [preauth] Dec 30 01:32:00 host sshd[26709]: Disconnected from 110.249.155.18 port 50070 [preauth] Dec 30 01:32:00 host sshd[26714]: Invalid user usuario1 from 197.248.63.75 port 60060 Dec 30 01:32:00 host sshd[26714]: input_userauth_request: invalid user usuario1 [preauth] Dec 30 01:32:00 host sshd[26714]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:32:00 host sshd[26714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.248.63.75 Dec 30 01:32:02 host sshd[26714]: Failed password for invalid user usuario1 from 197.248.63.75 port 60060 ssh2 Dec 30 01:32:02 host sshd[26714]: Received disconnect from 197.248.63.75 port 60060:11: Bye Bye [preauth] Dec 30 01:32:02 host sshd[26714]: Disconnected from 197.248.63.75 port 60060 [preauth] Dec 30 01:32:30 host sshd[26818]: User root from 143.198.125.15 not allowed because not listed in AllowUsers Dec 30 01:32:30 host sshd[26818]: input_userauth_request: invalid user root [preauth] Dec 30 01:32:30 host unix_chkpwd[26823]: password check failed for user (root) Dec 30 01:32:30 host sshd[26818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.125.15 user=root Dec 30 01:32:30 host sshd[26818]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 01:32:32 host sshd[26818]: Failed password for invalid user root from 143.198.125.15 port 40610 ssh2 Dec 30 01:32:32 host sshd[26818]: Received disconnect from 143.198.125.15 port 40610:11: Bye Bye [preauth] Dec 30 01:32:32 host sshd[26818]: Disconnected from 143.198.125.15 port 40610 [preauth] Dec 30 01:32:38 host sshd[26842]: User root from 137.184.0.243 not allowed because not listed in AllowUsers Dec 30 01:32:38 host sshd[26842]: input_userauth_request: invalid user root [preauth] Dec 30 01:32:38 host unix_chkpwd[26847]: password check failed for user (root) Dec 30 01:32:38 host sshd[26842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.0.243 user=root Dec 30 01:32:38 host sshd[26842]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 01:32:40 host sshd[26842]: Failed password for invalid user root from 137.184.0.243 port 32770 ssh2 Dec 30 01:32:40 host sshd[26842]: Received disconnect from 137.184.0.243 port 32770:11: Bye Bye [preauth] Dec 30 01:32:40 host sshd[26842]: Disconnected from 137.184.0.243 port 32770 [preauth] Dec 30 01:33:39 host sshd[27031]: Invalid user alumno from 72.165.240.194 port 39502 Dec 30 01:33:39 host sshd[27031]: input_userauth_request: invalid user alumno [preauth] Dec 30 01:33:39 host sshd[27031]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:33:39 host sshd[27031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.165.240.194 Dec 30 01:33:42 host sshd[27031]: Failed password for invalid user alumno from 72.165.240.194 port 39502 ssh2 Dec 30 01:33:47 host sshd[27078]: User root from 197.248.63.75 not allowed because not listed in AllowUsers Dec 30 01:33:47 host sshd[27078]: input_userauth_request: invalid user root [preauth] Dec 30 01:33:47 host unix_chkpwd[27084]: password check failed for user (root) Dec 30 01:33:47 host sshd[27078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.248.63.75 user=root Dec 30 01:33:47 host sshd[27078]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 01:33:49 host sshd[27078]: Failed password for invalid user root from 197.248.63.75 port 5010 ssh2 Dec 30 01:33:50 host sshd[27078]: Received disconnect from 197.248.63.75 port 5010:11: Bye Bye [preauth] Dec 30 01:33:50 host sshd[27078]: Disconnected from 197.248.63.75 port 5010 [preauth] Dec 30 01:34:07 host sshd[27163]: User root from 110.249.155.18 not allowed because not listed in AllowUsers Dec 30 01:34:07 host sshd[27163]: input_userauth_request: invalid user root [preauth] Dec 30 01:34:07 host unix_chkpwd[27167]: password check failed for user (root) Dec 30 01:34:07 host sshd[27163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.249.155.18 user=root Dec 30 01:34:07 host sshd[27163]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 01:34:10 host sshd[27163]: Failed password for invalid user root from 110.249.155.18 port 50106 ssh2 Dec 30 01:34:10 host sshd[27163]: Received disconnect from 110.249.155.18 port 50106:11: Bye Bye [preauth] Dec 30 01:34:10 host sshd[27163]: Disconnected from 110.249.155.18 port 50106 [preauth] Dec 30 01:36:02 host sshd[27637]: Invalid user ev from 45.93.201.90 port 47354 Dec 30 01:36:02 host sshd[27637]: input_userauth_request: invalid user ev [preauth] Dec 30 01:36:02 host sshd[27637]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:36:02 host sshd[27637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 30 01:36:04 host sshd[27637]: Failed password for invalid user ev from 45.93.201.90 port 47354 ssh2 Dec 30 01:36:07 host sshd[27637]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:36:09 host sshd[27637]: Failed password for invalid user ev from 45.93.201.90 port 47354 ssh2 Dec 30 01:36:12 host sshd[27637]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:36:14 host sshd[27637]: Failed password for invalid user ev from 45.93.201.90 port 47354 ssh2 Dec 30 01:36:17 host sshd[27637]: Connection closed by 45.93.201.90 port 47354 [preauth] Dec 30 01:36:17 host sshd[27637]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 30 01:36:26 host sshd[27731]: User root from 137.184.0.243 not allowed because not listed in AllowUsers Dec 30 01:36:26 host sshd[27731]: input_userauth_request: invalid user root [preauth] Dec 30 01:36:26 host unix_chkpwd[27735]: password check failed for user (root) Dec 30 01:36:26 host sshd[27731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.0.243 user=root Dec 30 01:36:26 host sshd[27731]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 01:36:28 host sshd[27731]: Failed password for invalid user root from 137.184.0.243 port 52896 ssh2 Dec 30 01:36:28 host sshd[27731]: Received disconnect from 137.184.0.243 port 52896:11: Bye Bye [preauth] Dec 30 01:36:28 host sshd[27731]: Disconnected from 137.184.0.243 port 52896 [preauth] Dec 30 01:36:34 host sshd[27784]: User root from 143.198.125.15 not allowed because not listed in AllowUsers Dec 30 01:36:34 host sshd[27784]: input_userauth_request: invalid user root [preauth] Dec 30 01:36:34 host unix_chkpwd[27791]: password check failed for user (root) Dec 30 01:36:34 host sshd[27784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.125.15 user=root Dec 30 01:36:34 host sshd[27784]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 01:36:36 host sshd[27784]: Failed password for invalid user root from 143.198.125.15 port 42964 ssh2 Dec 30 01:36:45 host sshd[27848]: User root from 133.130.98.176 not allowed because not listed in AllowUsers Dec 30 01:36:45 host sshd[27848]: input_userauth_request: invalid user root [preauth] Dec 30 01:36:45 host unix_chkpwd[27852]: password check failed for user (root) Dec 30 01:36:45 host sshd[27848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.98.176 user=root Dec 30 01:36:45 host sshd[27848]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 01:36:47 host sshd[27848]: Failed password for invalid user root from 133.130.98.176 port 44014 ssh2 Dec 30 01:36:47 host sshd[27848]: Received disconnect from 133.130.98.176 port 44014:11: Bye Bye [preauth] Dec 30 01:36:47 host sshd[27848]: Disconnected from 133.130.98.176 port 44014 [preauth] Dec 30 01:37:40 host sshd[28075]: User root from 170.55.177.114 not allowed because not listed in AllowUsers Dec 30 01:37:40 host sshd[28075]: input_userauth_request: invalid user root [preauth] Dec 30 01:37:40 host unix_chkpwd[28081]: password check failed for user (root) Dec 30 01:37:40 host sshd[28075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.55.177.114 user=root Dec 30 01:37:40 host sshd[28075]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 01:37:42 host sshd[28075]: Failed password for invalid user root from 170.55.177.114 port 58417 ssh2 Dec 30 01:37:43 host sshd[28075]: Received disconnect from 170.55.177.114 port 58417:11: Bye Bye [preauth] Dec 30 01:37:43 host sshd[28075]: Disconnected from 170.55.177.114 port 58417 [preauth] Dec 30 01:38:10 host sshd[28151]: Invalid user user1 from 92.46.108.20 port 59334 Dec 30 01:38:10 host sshd[28151]: input_userauth_request: invalid user user1 [preauth] Dec 30 01:38:10 host sshd[28151]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:38:10 host sshd[28151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 30 01:38:12 host sshd[28151]: Failed password for invalid user user1 from 92.46.108.20 port 59334 ssh2 Dec 30 01:38:13 host sshd[28151]: Connection closed by 92.46.108.20 port 59334 [preauth] Dec 30 01:41:30 host sshd[28763]: User root from 170.55.177.114 not allowed because not listed in AllowUsers Dec 30 01:41:30 host sshd[28763]: input_userauth_request: invalid user root [preauth] Dec 30 01:41:30 host unix_chkpwd[28768]: password check failed for user (root) Dec 30 01:41:30 host sshd[28763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.55.177.114 user=root Dec 30 01:41:30 host sshd[28763]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 01:41:32 host sshd[28763]: Failed password for invalid user root from 170.55.177.114 port 54364 ssh2 Dec 30 01:46:46 host sshd[30142]: Invalid user sasaki from 162.218.126.136 port 37254 Dec 30 01:46:46 host sshd[30142]: input_userauth_request: invalid user sasaki [preauth] Dec 30 01:46:46 host sshd[30142]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:46:46 host sshd[30142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 30 01:46:48 host sshd[30142]: Failed password for invalid user sasaki from 162.218.126.136 port 37254 ssh2 Dec 30 01:46:48 host sshd[30142]: Connection closed by 162.218.126.136 port 37254 [preauth] Dec 30 01:58:14 host sshd[31728]: Invalid user vmware from 103.13.40.2 port 58598 Dec 30 01:58:14 host sshd[31728]: input_userauth_request: invalid user vmware [preauth] Dec 30 01:58:14 host sshd[31728]: pam_unix(sshd:auth): check pass; user unknown Dec 30 01:58:14 host sshd[31728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 30 01:58:17 host sshd[31728]: Failed password for invalid user vmware from 103.13.40.2 port 58598 ssh2 Dec 30 01:58:17 host sshd[31728]: Connection closed by 103.13.40.2 port 58598 [preauth] Dec 30 02:08:53 host sshd[958]: Invalid user joel from 41.76.172.121 port 9405 Dec 30 02:08:53 host sshd[958]: input_userauth_request: invalid user joel [preauth] Dec 30 02:08:53 host sshd[958]: pam_unix(sshd:auth): check pass; user unknown Dec 30 02:08:53 host sshd[958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.76.172.121 Dec 30 02:08:55 host sshd[958]: Failed password for invalid user joel from 41.76.172.121 port 9405 ssh2 Dec 30 02:08:55 host sshd[958]: Received disconnect from 41.76.172.121 port 9405:11: Bye Bye [preauth] Dec 30 02:08:55 host sshd[958]: Disconnected from 41.76.172.121 port 9405 [preauth] Dec 30 02:13:02 host sshd[1469]: User root from 172.221.206.141 not allowed because not listed in AllowUsers Dec 30 02:13:02 host sshd[1469]: input_userauth_request: invalid user root [preauth] Dec 30 02:13:02 host unix_chkpwd[1489]: password check failed for user (root) Dec 30 02:13:02 host sshd[1469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.221.206.141 user=root Dec 30 02:13:02 host sshd[1469]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 02:13:05 host sshd[1469]: Failed password for invalid user root from 172.221.206.141 port 44678 ssh2 Dec 30 02:13:05 host sshd[1469]: Received disconnect from 172.221.206.141 port 44678:11: Bye Bye [preauth] Dec 30 02:13:05 host sshd[1469]: Disconnected from 172.221.206.141 port 44678 [preauth] Dec 30 02:13:05 host sshd[1492]: Invalid user lenovo from 106.10.122.53 port 57900 Dec 30 02:13:05 host sshd[1492]: input_userauth_request: invalid user lenovo [preauth] Dec 30 02:13:06 host sshd[1492]: pam_unix(sshd:auth): check pass; user unknown Dec 30 02:13:06 host sshd[1492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 30 02:13:07 host sshd[1494]: Invalid user apc from 172.221.206.141 port 44788 Dec 30 02:13:07 host sshd[1494]: input_userauth_request: invalid user apc [preauth] Dec 30 02:13:07 host sshd[1494]: pam_unix(sshd:auth): check pass; user unknown Dec 30 02:13:07 host sshd[1494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.221.206.141 Dec 30 02:13:08 host sshd[1492]: Failed password for invalid user lenovo from 106.10.122.53 port 57900 ssh2 Dec 30 02:13:08 host sshd[1492]: Connection closed by 106.10.122.53 port 57900 [preauth] Dec 30 02:13:10 host sshd[1494]: Failed password for invalid user apc from 172.221.206.141 port 44788 ssh2 Dec 30 02:13:10 host sshd[1494]: Received disconnect from 172.221.206.141 port 44788:11: Bye Bye [preauth] Dec 30 02:13:10 host sshd[1494]: Disconnected from 172.221.206.141 port 44788 [preauth] Dec 30 02:20:10 host sshd[2644]: Invalid user thor from 41.76.172.121 port 5950 Dec 30 02:20:10 host sshd[2644]: input_userauth_request: invalid user thor [preauth] Dec 30 02:20:10 host sshd[2644]: pam_unix(sshd:auth): check pass; user unknown Dec 30 02:20:10 host sshd[2644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.76.172.121 Dec 30 02:20:13 host sshd[2644]: Failed password for invalid user thor from 41.76.172.121 port 5950 ssh2 Dec 30 02:20:13 host sshd[2644]: Received disconnect from 41.76.172.121 port 5950:11: Bye Bye [preauth] Dec 30 02:20:13 host sshd[2644]: Disconnected from 41.76.172.121 port 5950 [preauth] Dec 30 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 30 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 30 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 30 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 30 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 30 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 30 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 30 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 30 02:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 30 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=ugotscom user-4=wwwrmswll user-5=keralaholi user-6=wwwresourcehunte user-7=wwwkaretakers user-8=cochintaxi user-9=dartsimp user-10=a2zgroup user-11=laundryboniface user-12=wwwevmhonda user-13=bonifacegroup user-14=straightcurve user-15=wwwletsstalkfood user-16=kottayamcalldriv user-17=phmetals user-18=gifterman user-19=palco123 user-20=mrsclean user-21=wwwnexidigital user-22=disposeat user-23=wwwkmaorg user-24=remysagr user-25=woodpeck user-26=wwwkapin user-27=wwwtestugo user-28=shalinijames user-29=vfmassets user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 30 02:21:52 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 30 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ESiAEnaVnMaZFQtH.~ Dec 30 02:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ESiAEnaVnMaZFQtH.~' Dec 30 02:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ESiAEnaVnMaZFQtH.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 02:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 30 02:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 30 02:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 02:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 02:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 30 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:21:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 30 02:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 30 02:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 30 02:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 30 02:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 02:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 30 02:21:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 02:22:00 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 30 02:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 30 02:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 30 02:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 30 02:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 30 02:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 30 02:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 02:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 02:25:55 host sshd[3599]: Connection closed by 192.241.234.5 port 58370 [preauth] Dec 30 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 02:29:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:29:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 02:29:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:29:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 02:29:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:29:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 30 02:29:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:29:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 02:29:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:29:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=vfmassets user-3=shalinijames user-4=wwwtestugo user-5=woodpeck user-6=wwwkapin user-7=disposeat user-8=wwwkmaorg user-9=remysagr user-10=wwwnexidigital user-11=mrsclean user-12=palco123 user-13=gifterman user-14=phmetals user-15=kottayamcalldriv user-16=wwwletsstalkfood user-17=straightcurve user-18=bonifacegroup user-19=wwwevmhonda user-20=laundryboniface user-21=a2zgroup user-22=dartsimp user-23=cochintaxi user-24=wwwkaretakers user-25=wwwresourcehunte user-26=keralaholi user-27=wwwrmswll user-28=ugotscom user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 30 02:29:46 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 30 02:29:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:29:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwevmhonda --output=json Dec 30 02:29:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:29:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:29:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color instance info --format=json --check-updates=true Dec 30 02:29:47 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 30 02:29:50 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 30 02:29:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 30 02:29:50 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 30 02:29:51 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 30 02:29:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 30 02:29:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 30 02:29:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 30 02:29:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 30 02:29:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 30 02:29:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 30 02:29:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwevmhonda LangPHP php_get_vhost_versions --output=json Dec 30 02:29:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:29:59 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:29:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 package_manager_get_package_info package-0=ea-php72 --output=json Dec 30 02:29:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:29:59 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:29:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color instance login-url --skip-plugins=false --format=json Dec 30 02:29:59 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 30 02:30:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 30 02:30:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwletsstalkfood --output=json Dec 30 02:30:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:30:00 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:30:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color instance info --format=json --check-updates=true Dec 30 02:30:00 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 02:30:26 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 02:30:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 30 02:30:26 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 02:30:27 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 02:30:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 30 02:30:27 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 02:30:47 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 02:30:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 30 02:30:47 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 02:30:47 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 02:30:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood LangPHP php_get_vhost_versions --output=json Dec 30 02:30:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:30:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:30:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color instance login-url --skip-plugins=false --format=json Dec 30 02:30:48 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 02:30:48 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 02:30:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DomainInfo single_domain_data domain=letsstalkfood.com return_https_redirect_status=1 --output=json Dec 30 02:30:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:30:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:30:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_vhost_ssl_components --output=json Dec 30 02:30:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:30:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:30:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_ssl_vhosts --output=json Dec 30 02:30:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:30:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:30:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood Mime list_redirects --output=json Dec 30 02:30:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:30:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:30:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 30 02:30:49 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 02:30:50 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 02:30:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 30 02:30:50 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 02:30:52 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 02:30:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 30 02:30:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 02:31:45 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 02:31:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 30 02:31:45 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 02:31:51 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 02:31:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/wp-config.php Dec 30 02:31:51 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 02:31:51 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 02:31:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:31:51 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 02:31:51 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 02:31:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/.maintenance Dec 30 02:31:51 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 02:31:51 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 02:31:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color db-prefix get Dec 30 02:31:51 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 02:31:52 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 02:31:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DirectoryPrivacy is_directory_protected dir=/home/wwwletsstalkfood/public_html --output=json Dec 30 02:31:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:31:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:31:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:31:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 02:31:52 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 02:31:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 30 02:31:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 02:31:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 02:31:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 30 02:31:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 02:31:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 02:31:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 30 02:31:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 02:31:55 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 02:31:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 30 02:31:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 02:31:55 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 02:31:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color admin-username is-secure Dec 30 02:31:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 02:31:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 02:31:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:31:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 02:31:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 02:31:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/wp-config.php Dec 30 02:31:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 02:31:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 02:31:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/stat -c %a /home/wwwletsstalkfood/public_html/wp-config.php Dec 30 02:31:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 02:31:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 02:31:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color pingbacks is_disabled Dec 30 02:31:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 02:31:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 02:31:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:31:57 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 02:31:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 02:31:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color security-keys are_keys_correct Dec 30 02:31:57 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 02:31:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 02:31:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=mrsclean --output=json Dec 30 02:31:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:31:58 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:31:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/backup --no-color instance info --format=json --check-updates=true Dec 30 02:31:58 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 30 02:31:58 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 30 02:31:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean DomainInfo single_domain_data domain=mrsclean.co.in return_https_redirect_status=1 --output=json Dec 30 02:31:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:31:58 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:31:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean Mime list_redirects --output=json Dec 30 02:31:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:31:58 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:31:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/public_html/backup/wp-includes/version.php Dec 30 02:31:58 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 30 02:31:58 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 30 02:31:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/public_html/backup/wp-includes/version.php Dec 30 02:31:58 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 30 02:31:58 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 30 02:31:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 30 02:31:58 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 30 02:31:58 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 30 02:31:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean LangPHP php_get_vhost_versions --output=json Dec 30 02:31:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:31:59 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:31:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 30 02:31:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:31:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:31:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/blog --no-color instance info --format=json --check-updates=true Dec 30 02:31:59 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 30 02:31:59 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 30 02:31:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/public_html/blog/wp-includes/version.php Dec 30 02:31:59 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 30 02:31:59 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 30 02:31:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/public_html/blog/wp-includes/version.php Dec 30 02:31:59 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 30 02:31:59 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 30 02:31:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 30 02:31:59 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 30 02:31:59 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 30 02:31:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=shalinijames --output=json Dec 30 02:31:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:31:59 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:31:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color instance info --format=json --check-updates=true Dec 30 02:31:59 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 02:32:07 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 02:32:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_plugins --format=json Dec 30 02:32:07 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 02:32:07 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 02:32:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_themes --format=json Dec 30 02:32:07 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 02:32:08 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 02:32:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 30 02:32:08 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 02:32:08 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 02:32:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames LangPHP php_get_vhost_versions --output=json Dec 30 02:32:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:32:08 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:32:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color instance login-url --skip-plugins=false --format=json Dec 30 02:32:08 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 02:32:09 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 02:32:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DomainInfo single_domain_data domain=shalinijames.com return_https_redirect_status=1 --output=json Dec 30 02:32:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:32:09 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:32:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames Mime list_redirects --output=json Dec 30 02:32:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:32:09 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:32:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 30 02:32:09 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 02:32:11 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 02:32:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_plugins --format=json Dec 30 02:32:11 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 02:32:11 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 02:32:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 30 02:32:11 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 02:32:16 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 02:32:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_themes --format=json Dec 30 02:32:16 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 02:32:16 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 02:32:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/wp-config.php Dec 30 02:32:16 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 02:32:16 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 02:32:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:32:16 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 02:32:17 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 02:32:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/.maintenance Dec 30 02:32:17 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 02:32:17 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 02:32:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color db-prefix get Dec 30 02:32:17 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 02:32:17 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 02:32:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DirectoryPrivacy is_directory_protected dir=/home/shalinijames/public_html --output=json Dec 30 02:32:17 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:32:17 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:32:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:32:17 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 02:32:18 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 02:32:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 30 02:32:18 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 02:32:18 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 02:32:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 30 02:32:18 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 02:32:19 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 02:32:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 30 02:32:19 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 02:32:19 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 02:32:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 30 02:32:19 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 02:32:20 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 02:32:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color admin-username is-secure Dec 30 02:32:20 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 02:32:20 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 02:32:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:32:20 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 02:32:20 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 02:32:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/wp-config.php Dec 30 02:32:20 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 02:32:20 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 02:32:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/stat -c %a /home/shalinijames/public_html/wp-config.php Dec 30 02:32:20 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 02:32:20 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 02:32:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color pingbacks is_disabled Dec 30 02:32:20 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 02:32:21 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:32:21 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 02:32:21 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color security-keys are_keys_correct Dec 30 02:32:21 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 02:32:22 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 02:32:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwtestugo --output=json Dec 30 02:32:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:32:22 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:32:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color instance info --format=json --check-updates=true Dec 30 02:32:22 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_plugins --format=json Dec 30 02:32:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_themes --format=json Dec 30 02:32:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:28 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 30 02:32:28 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:28 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo LangPHP php_get_vhost_versions --output=json Dec 30 02:32:28 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:32:28 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:32:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color instance login-url --skip-plugins=false --format=json Dec 30 02:32:28 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:29 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DomainInfo single_domain_data domain=testugo.in return_https_redirect_status=1 --output=json Dec 30 02:32:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:32:29 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:32:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo Mime list_redirects --output=json Dec 30 02:32:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:32:29 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:32:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 30 02:32:29 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:30 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_plugins --format=json Dec 30 02:32:30 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:30 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 30 02:32:30 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:34 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_themes --format=json Dec 30 02:32:34 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:34 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/wp-config.php Dec 30 02:32:34 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:34 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:32:34 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:35 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/.maintenance Dec 30 02:32:35 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:35 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color db-prefix get Dec 30 02:32:35 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:35 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt1 --output=json Dec 30 02:32:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:32:35 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:32:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:32:35 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:36 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 30 02:32:36 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:36 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 30 02:32:36 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:37 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 30 02:32:37 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:37 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 30 02:32:37 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:38 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color admin-username is-secure Dec 30 02:32:38 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:38 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:32:38 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:38 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/wp-config.php Dec 30 02:32:38 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:38 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/tt1/wp-config.php Dec 30 02:32:38 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:38 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color pingbacks is_disabled Dec 30 02:32:38 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:39 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:32:39 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:39 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color security-keys are_keys_correct Dec 30 02:32:39 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:40 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color instance info --format=json --check-updates=true Dec 30 02:32:40 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:44 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_plugins --format=json Dec 30 02:32:44 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:44 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_themes --format=json Dec 30 02:32:44 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:45 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 30 02:32:45 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:45 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color instance login-url --skip-plugins=false --format=json Dec 30 02:32:45 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:45 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 30 02:32:45 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_plugins --format=json Dec 30 02:32:46 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 30 02:32:46 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_themes --format=json Dec 30 02:32:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/wp-config.php Dec 30 02:32:51 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:51 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:32:51 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:51 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/.maintenance Dec 30 02:32:51 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:51 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color db-prefix get Dec 30 02:32:51 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:51 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt --output=json Dec 30 02:32:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:32:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:32:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:32:52 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:52 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 30 02:32:52 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:52 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 30 02:32:52 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:53 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 30 02:32:53 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:53 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 30 02:32:53 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:54 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color admin-username is-secure Dec 30 02:32:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:54 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:32:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:54 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/wp-config.php Dec 30 02:32:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/tt/wp-config.php Dec 30 02:32:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color pingbacks is_disabled Dec 30 02:32:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:32:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color security-keys are_keys_correct Dec 30 02:32:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:32:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:32:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color instance info --format=json --check-updates=true Dec 30 02:32:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:33:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:33:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_plugins --format=json Dec 30 02:33:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:33:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:33:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_themes --format=json Dec 30 02:33:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:33:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:33:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 30 02:33:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:33:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:33:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color instance login-url --skip-plugins=false --format=json Dec 30 02:33:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:33:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:33:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 30 02:33:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:33:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:33:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_plugins --format=json Dec 30 02:33:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:33:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:33:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 30 02:33:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:33:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:33:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_themes --format=json Dec 30 02:33:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:33:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:33:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/wp-config.php Dec 30 02:33:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:33:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:33:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:33:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:33:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:33:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/.maintenance Dec 30 02:33:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:33:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:33:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color db-prefix get Dec 30 02:33:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:33:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:33:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/HYPE --output=json Dec 30 02:33:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:33:10 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:33:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:33:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:33:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:33:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 30 02:33:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:33:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:33:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 30 02:33:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:33:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:33:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 30 02:33:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:33:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:33:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 30 02:33:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:33:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:33:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color admin-username is-secure Dec 30 02:33:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:33:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:33:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:33:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:33:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:33:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/wp-config.php Dec 30 02:33:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:33:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:33:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/HYPE/wp-config.php Dec 30 02:33:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:33:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:33:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color pingbacks is_disabled Dec 30 02:33:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:33:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:33:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:33:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:33:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:33:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color security-keys are_keys_correct Dec 30 02:33:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:33:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:33:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=ugotscom --output=json Dec 30 02:33:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:33:14 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:33:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/boniface/blog --no-color instance info --format=json --check-updates=true Dec 30 02:33:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DomainInfo single_domain_data domain=ugotechnologies.com return_https_redirect_status=1 --output=json Dec 30 02:33:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:33:15 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom Mime list_redirects --output=json Dec 30 02:33:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:33:15 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/boniface/blog/wp-includes/version.php Dec 30 02:33:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/public_html/boniface/blog/wp-includes/version.php Dec 30 02:33:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 30 02:33:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom LangPHP php_get_vhost_versions --output=json Dec 30 02:33:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:33:15 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color instance info --format=json --check-updates=true Dec 30 02:33:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_plugins --format=json Dec 30 02:33:22 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_themes --format=json Dec 30 02:33:23 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 30 02:33:23 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color instance login-url --skip-plugins=false --format=json Dec 30 02:33:23 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 30 02:33:23 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:25 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_plugins --format=json Dec 30 02:33:25 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:25 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 30 02:33:25 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:30 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_themes --format=json Dec 30 02:33:30 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:30 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php Dec 30 02:33:30 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:30 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:33:30 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:30 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/.maintenance Dec 30 02:33:30 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:30 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color db-prefix get Dec 30 02:33:30 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:31 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --output=json Dec 30 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:33:31 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:31 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 30 02:33:31 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:32 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 30 02:33:32 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:32 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 30 02:33:32 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:33 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 30 02:33:33 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:33 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color admin-username is-secure Dec 30 02:33:33 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:33 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:33:33 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:34 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php Dec 30 02:33:34 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:34 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/stat -c %a /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php Dec 30 02:33:34 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:34 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color pingbacks is_disabled Dec 30 02:33:34 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:34 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:33:34 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:34 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color security-keys are_keys_correct Dec 30 02:33:34 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:35 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color instance info --format=json --check-updates=true Dec 30 02:33:35 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:38 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_plugins --format=json Dec 30 02:33:38 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:39 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_themes --format=json Dec 30 02:33:39 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:39 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 30 02:33:39 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:39 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color instance login-url --skip-plugins=false --format=json Dec 30 02:33:39 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:40 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 30 02:33:40 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:41 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_plugins --format=json Dec 30 02:33:41 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:41 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 30 02:33:41 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:43 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_themes --format=json Dec 30 02:33:43 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:43 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/wp-config.php Dec 30 02:33:43 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:43 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:33:43 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:43 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/.maintenance Dec 30 02:33:43 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:43 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color db-prefix get Dec 30 02:33:43 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:44 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/site --output=json Dec 30 02:33:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:33:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:33:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:33:44 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:44 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 30 02:33:44 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:45 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 30 02:33:45 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:45 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 30 02:33:45 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:45 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 30 02:33:45 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:46 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color admin-username is-secure Dec 30 02:33:46 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:46 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:33:46 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:47 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/wp-config.php Dec 30 02:33:47 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:47 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/stat -c %a /home/ugotscom/public_html/old/site/wp-config.php Dec 30 02:33:47 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:47 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color pingbacks is_disabled Dec 30 02:33:47 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:47 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:33:47 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:47 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color security-keys are_keys_correct Dec 30 02:33:47 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:33:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:33:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=woodpeck --output=json Dec 30 02:33:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:33:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:33:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/woodpeck/public_html/wp --no-color instance info --format=json --check-updates=true Dec 30 02:33:48 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 30 02:33:48 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 30 02:33:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck DomainInfo single_domain_data domain=woodpeckerindia.com return_https_redirect_status=1 --output=json Dec 30 02:33:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:33:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:33:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck Mime list_redirects --output=json Dec 30 02:33:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:33:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:33:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/public_html/wp/wp-includes/version.php Dec 30 02:33:48 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 30 02:33:48 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 30 02:33:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 30 02:33:48 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 30 02:33:48 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 30 02:33:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck LangPHP php_get_vhost_versions --output=json Dec 30 02:33:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:33:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:33:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=palco123 --output=json Dec 30 02:33:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:33:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:33:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color instance info --format=json --check-updates=true Dec 30 02:33:49 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 30 02:33:55 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 30 02:33:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 30 02:33:56 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 30 02:33:56 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 30 02:33:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 30 02:33:56 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 30 02:34:02 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 30 02:34:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 30 02:34:02 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 30 02:34:02 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 30 02:34:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 LangPHP php_get_vhost_versions --output=json Dec 30 02:34:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:02 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color instance login-url --skip-plugins=false --format=json Dec 30 02:34:02 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 30 02:34:03 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 30 02:34:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DomainInfo single_domain_data domain=panlys.com return_https_redirect_status=1 --output=json Dec 30 02:34:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:03 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 Mime list_redirects --output=json Dec 30 02:34:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:03 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 30 02:34:03 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 30 02:34:04 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 30 02:34:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 30 02:34:04 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 30 02:34:05 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 30 02:34:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 30 02:34:05 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 30 02:34:10 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 30 02:34:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 30 02:34:10 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 30 02:34:15 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 30 02:34:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/wp-config.php Dec 30 02:34:15 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 30 02:34:15 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 30 02:34:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:34:15 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 30 02:34:16 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 30 02:34:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/.maintenance Dec 30 02:34:16 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 30 02:34:16 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 30 02:34:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color db-prefix get Dec 30 02:34:16 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 30 02:34:16 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 30 02:34:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DirectoryPrivacy is_directory_protected dir=/home/palco123/public_html --output=json Dec 30 02:34:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:16 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:34:16 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 30 02:34:17 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 30 02:34:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color option get auto_update_core_major Dec 30 02:34:17 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 30 02:34:17 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 30 02:34:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 30 02:34:18 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 30 02:34:18 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 30 02:34:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 30 02:34:18 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 30 02:34:19 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 30 02:34:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color admin-username is-secure Dec 30 02:34:19 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 30 02:34:19 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 30 02:34:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:34:19 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 30 02:34:20 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 30 02:34:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/wp-config.php Dec 30 02:34:20 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 30 02:34:20 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 30 02:34:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/stat -c %a /home/palco123/public_html/wp-config.php Dec 30 02:34:20 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 30 02:34:20 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 30 02:34:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color pingbacks is_disabled Dec 30 02:34:20 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 30 02:34:20 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 30 02:34:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:34:20 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 30 02:34:21 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 30 02:34:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color security-keys are_keys_correct Dec 30 02:34:21 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 30 02:34:21 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 30 02:34:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwresourcehunte --output=json Dec 30 02:34:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:21 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color instance info --format=json --check-updates=true Dec 30 02:34:21 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 02:34:27 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 02:34:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_plugins --format=json Dec 30 02:34:27 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 02:34:28 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 02:34:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_themes --format=json Dec 30 02:34:28 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 02:34:28 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 02:34:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 30 02:34:28 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 02:34:28 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 02:34:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte LangPHP php_get_vhost_versions --output=json Dec 30 02:34:28 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:28 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color instance login-url --skip-plugins=false --format=json Dec 30 02:34:28 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 02:34:29 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 02:34:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DomainInfo single_domain_data domain=resourcehunters.com return_https_redirect_status=1 --output=json Dec 30 02:34:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:29 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte Mime list_redirects --output=json Dec 30 02:34:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:29 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 30 02:34:29 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 02:34:30 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_plugins --format=json Dec 30 02:34:30 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 02:34:30 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 30 02:34:30 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 02:34:34 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 02:34:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_themes --format=json Dec 30 02:34:35 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 02:34:35 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 02:34:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/wp-config.php Dec 30 02:34:35 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 02:34:35 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 02:34:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:34:35 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 02:34:35 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 02:34:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/.maintenance Dec 30 02:34:35 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 02:34:35 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 02:34:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color db-prefix get Dec 30 02:34:35 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 02:34:36 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 02:34:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DirectoryPrivacy is_directory_protected dir=/home/wwwresourcehunte/public_html --output=json Dec 30 02:34:36 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:36 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:34:36 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 02:34:36 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 02:34:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 30 02:34:36 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 02:34:37 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 02:34:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 30 02:34:37 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 02:34:37 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 02:34:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 30 02:34:37 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 02:34:37 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 02:34:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 30 02:34:37 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 02:34:38 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 02:34:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color admin-username is-secure Dec 30 02:34:38 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 02:34:38 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 02:34:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:34:38 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 02:34:38 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 02:34:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/wp-config.php Dec 30 02:34:38 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 02:34:38 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 02:34:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/stat -c %a /home/wwwresourcehunte/public_html/wp-config.php Dec 30 02:34:38 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 02:34:38 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 02:34:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color pingbacks is_disabled Dec 30 02:34:38 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 02:34:39 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 02:34:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 30 02:34:39 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 02:34:39 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 02:34:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color security-keys are_keys_correct Dec 30 02:34:39 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 02:34:39 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 02:34:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=pmcresources WpToolkitNotification send_admin_auto_updates_notification 'available_updates_text=<br/><br/>Updates are available for the following items:<br/><br/>' 'available_updates_list=1. Plugin "Page Builder by SiteOrigin" on (http://ugotechnologies.com/old). Installed version: 2.4.25. Available version: 2.20.3.<br/><br/>' installed_updates_text= installed_updates_list= 'failure_updates_text=Updates were not installed for the following items:<br/><br/>' 'failure_updates_list=1. Website "EVM Honda Cochin" (http://www.evmhonda.com): Failed to reset cache for the instance #1: Fatal error: Uncaught Error: Call to undefined function cardealer_is_wpml_active() in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php:1041#012Stack trace:#012#0 Dec 30 02:34:39 host sudo: wp-toolkit : (command continued) /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-init.php(22): require_once()#012#1 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/cardealer-helper-library.php(183): require_once('"'"'/home/wwwevmhon...'"'"')#012#2 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(287): cdhl_include_admin_files('"'"''"'"')#012#3 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(311): WP_Hook->apply_filters(NULL, Array)#012#4 /home/wwwevmhonda/public_html/wp-includes/plugin.php(478): WP_Hook->do_action(Array)#012#5 /home/wwwevmhonda/public_html/wp-settings.php(546): do_action('"'"'init'"'"')#012#6 /usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/vendor/wp-cli/wp-cli/php/WP_CLI/Runner.php(1356): require('"'"'/home/wwwevmhon...'"'"')#012#7 /usr/local/cpanel/3rdparty/wp-toolkit/plib/ve in Dec 30 02:34:39 host sudo: wp-toolkit : (command continued) /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php on line 1041#012Error: There has been a critical error on your website.Learn more about debugging in WordPress. There has been a critical error on your website.#012<br/><br/>2. Website "/home/mrsclean/public_html/backup" (http://mrsclean.co.in/backup): Failed to reset cache for the instance #5: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012<br/><br/>3. Website "/home/mrsclean/public_html/blog" (http://mrsclean.co.in/blog): Failed to reset cache for the instance #6: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` Dec 30 02:34:39 host sudo: wp-toolkit : (command continued) file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012<br/><br/>4. Website "/home/ugotscom/public_html/boniface/blog" (http://ugotechnologies.com/boniface/blog): Failed to reset cache for the instance #13: Error: Error establishing a database connection.#012<br/><br/>5. Website "/home/woodpeck/public_html/wp" (http://woodpeckerindia.com/wp): Failed to reset cache for the instance #16: /bin/sh: line 0: cd: /home/woodpeck/public_html/wp: No such file or directory#012<br/><br/>' --output=json Dec 30 02:34:39 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:40 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color cli cache clear Dec 30 02:34:40 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 30 02:34:40 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 30 02:34:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color cli cache clear Dec 30 02:34:40 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 02:34:40 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 02:34:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/backup --no-color cli cache clear Dec 30 02:34:40 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 30 02:34:40 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 30 02:34:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/blog --no-color cli cache clear Dec 30 02:34:40 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 30 02:34:40 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 30 02:34:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color cli cache clear Dec 30 02:34:40 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 02:34:41 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 02:34:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color cli cache clear Dec 30 02:34:41 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:34:41 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:34:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color cli cache clear Dec 30 02:34:41 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:34:41 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:34:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color cli cache clear Dec 30 02:34:41 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:34:41 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:34:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/boniface/blog --no-color cli cache clear Dec 30 02:34:41 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:34:41 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:34:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color cli cache clear Dec 30 02:34:41 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:34:42 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:34:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color cli cache clear Dec 30 02:34:42 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:34:42 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:34:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/woodpeck/public_html/wp --no-color cli cache clear Dec 30 02:34:42 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 30 02:34:42 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 30 02:34:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color cli cache clear Dec 30 02:34:42 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 30 02:34:42 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 30 02:34:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color cli cache clear Dec 30 02:34:42 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 02:34:42 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 02:34:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 30 02:34:42 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 30 02:34:43 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 30 02:34:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 30 02:34:43 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 02:34:43 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 02:34:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 30 02:34:43 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 02:34:44 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 02:34:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 30 02:34:44 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:34:44 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:34:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 30 02:34:44 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:34:45 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:34:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 30 02:34:45 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 02:34:45 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 02:34:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 30 02:34:45 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:34:46 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:34:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 30 02:34:46 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 02:34:46 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 02:34:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 30 02:34:46 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 30 02:34:46 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 30 02:34:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 30 02:34:46 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 02:34:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c httpd -v Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/palco123/panlys.com/wp-toolkit.conf Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/palco123/panlys.com/wp-toolkit.conf Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:34:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:34:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:41:10 host sshd[9040]: Invalid user admin from 194.169.175.102 port 63038 Dec 30 02:41:10 host sshd[9040]: input_userauth_request: invalid user admin [preauth] Dec 30 02:41:10 host sshd[9040]: pam_unix(sshd:auth): check pass; user unknown Dec 30 02:41:10 host sshd[9040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 Dec 30 02:41:11 host sshd[9040]: Failed password for invalid user admin from 194.169.175.102 port 63038 ssh2 Dec 30 02:41:11 host sshd[9040]: Received disconnect from 194.169.175.102 port 63038:11: Client disconnecting normally [preauth] Dec 30 02:41:11 host sshd[9040]: Disconnected from 194.169.175.102 port 63038 [preauth] Dec 30 02:46:30 host sshd[10196]: Invalid user kevin from 107.189.30.59 port 51308 Dec 30 02:46:30 host sshd[10196]: input_userauth_request: invalid user kevin [preauth] Dec 30 02:46:30 host sshd[10196]: pam_unix(sshd:auth): check pass; user unknown Dec 30 02:46:30 host sshd[10196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Dec 30 02:46:32 host sshd[10196]: Failed password for invalid user kevin from 107.189.30.59 port 51308 ssh2 Dec 30 02:46:33 host sshd[10196]: Connection closed by 107.189.30.59 port 51308 [preauth] Dec 30 02:53:36 host sshd[11506]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Dec 30 02:53:36 host sshd[11506]: input_userauth_request: invalid user root [preauth] Dec 30 02:53:37 host unix_chkpwd[11509]: password check failed for user (root) Dec 30 02:53:37 host sshd[11506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Dec 30 02:53:37 host sshd[11506]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 02:53:39 host sshd[11506]: Failed password for invalid user root from 162.218.126.136 port 58168 ssh2 Dec 30 02:53:39 host sshd[11506]: Connection closed by 162.218.126.136 port 58168 [preauth] Dec 30 02:57:38 host sshd[12069]: Invalid user from 64.62.197.227 port 29061 Dec 30 02:57:38 host sshd[12069]: input_userauth_request: invalid user [preauth] Dec 30 02:57:42 host sshd[12069]: Connection closed by 64.62.197.227 port 29061 [preauth] Dec 30 02:58:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 02:58:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:58:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:58:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 02:58:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:58:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:58:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 02:58:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:58:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:58:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 30 02:58:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:58:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:58:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 30 02:58:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:58:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:58:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 30 02:58:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:58:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:58:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 30 02:58:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 02:58:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 02:59:51 host sshd[12375]: Invalid user impala from 41.197.31.178 port 39400 Dec 30 02:59:51 host sshd[12375]: input_userauth_request: invalid user impala [preauth] Dec 30 02:59:51 host sshd[12375]: pam_unix(sshd:auth): check pass; user unknown Dec 30 02:59:51 host sshd[12375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 30 02:59:53 host sshd[12375]: Failed password for invalid user impala from 41.197.31.178 port 39400 ssh2 Dec 30 02:59:54 host sshd[12375]: Connection closed by 41.197.31.178 port 39400 [preauth] Dec 30 03:08:51 host sshd[14074]: User root from 179.176.210.40 not allowed because not listed in AllowUsers Dec 30 03:08:51 host sshd[14074]: input_userauth_request: invalid user root [preauth] Dec 30 03:08:51 host unix_chkpwd[14081]: password check failed for user (root) Dec 30 03:08:51 host sshd[14074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.176.210.40 user=root Dec 30 03:08:51 host sshd[14074]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 03:08:53 host sshd[14074]: Failed password for invalid user root from 179.176.210.40 port 39986 ssh2 Dec 30 03:08:54 host sshd[14074]: Received disconnect from 179.176.210.40 port 39986:11: Bye Bye [preauth] Dec 30 03:08:54 host sshd[14074]: Disconnected from 179.176.210.40 port 39986 [preauth] Dec 30 03:12:37 host sshd[15078]: Invalid user prueba from 179.176.210.40 port 37404 Dec 30 03:12:37 host sshd[15078]: input_userauth_request: invalid user prueba [preauth] Dec 30 03:12:37 host sshd[15078]: pam_unix(sshd:auth): check pass; user unknown Dec 30 03:12:37 host sshd[15078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.176.210.40 Dec 30 03:12:39 host sshd[15078]: Failed password for invalid user prueba from 179.176.210.40 port 37404 ssh2 Dec 30 03:12:40 host sshd[15078]: Received disconnect from 179.176.210.40 port 37404:11: Bye Bye [preauth] Dec 30 03:12:40 host sshd[15078]: Disconnected from 179.176.210.40 port 37404 [preauth] Dec 30 03:16:21 host sshd[16126]: Did not receive identification string from 158.255.2.106 port 46422 Dec 30 03:17:38 host sshd[16637]: Did not receive identification string from 158.255.2.106 port 40810 Dec 30 03:17:38 host sshd[16633]: Connection closed by 158.255.2.106 port 40802 [preauth] Dec 30 03:17:38 host sshd[16650]: Protocol major versions differ for 158.255.2.106 port 41064: SSH-2.0-OpenSSH_7.4 vs. SSH-1.5-Nmap-SSH1-Hostkey Dec 30 03:17:38 host sshd[16635]: Invalid user vaajd from 158.255.2.106 port 40814 Dec 30 03:17:38 host sshd[16635]: input_userauth_request: invalid user vaajd [preauth] Dec 30 03:17:39 host sshd[16635]: Connection closed by 158.255.2.106 port 40814 [preauth] Dec 30 03:17:39 host sshd[16661]: Unable to negotiate with 158.255.2.106 port 41242: no matching host key type found. Their offer: ssh-dss [preauth] Dec 30 03:17:40 host sshd[16636]: Connection closed by 158.255.2.106 port 40806 [preauth] Dec 30 03:17:40 host sshd[16670]: Connection closed by 158.255.2.106 port 41422 [preauth] Dec 30 03:17:41 host sshd[16682]: Protocol major versions differ for 158.255.2.106 port 41722: SSH-2.0-OpenSSH_7.4 vs. SSH-1.5-NmapNSE_1.0 Dec 30 03:17:41 host sshd[16681]: Connection closed by 158.255.2.106 port 41718 [preauth] Dec 30 03:17:42 host sshd[16691]: Unable to negotiate with 158.255.2.106 port 42018: no matching host key type found. Their offer: ecdsa-sha2-nistp384 [preauth] Dec 30 03:17:42 host sshd[16696]: Unable to negotiate with 158.255.2.106 port 42172: no matching host key type found. Their offer: ecdsa-sha2-nistp521 [preauth] Dec 30 03:17:43 host sshd[16701]: Connection closed by 158.255.2.106 port 42334 [preauth] Dec 30 03:19:36 host sshd[17154]: Invalid user ew from 45.93.201.90 port 45860 Dec 30 03:19:36 host sshd[17154]: input_userauth_request: invalid user ew [preauth] Dec 30 03:19:36 host sshd[17154]: pam_unix(sshd:auth): check pass; user unknown Dec 30 03:19:36 host sshd[17154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 30 03:19:38 host sshd[17154]: Failed password for invalid user ew from 45.93.201.90 port 45860 ssh2 Dec 30 03:19:41 host sshd[17154]: pam_unix(sshd:auth): check pass; user unknown Dec 30 03:19:43 host sshd[17154]: Failed password for invalid user ew from 45.93.201.90 port 45860 ssh2 Dec 30 03:19:46 host sshd[17154]: pam_unix(sshd:auth): check pass; user unknown Dec 30 03:19:48 host sshd[17154]: Failed password for invalid user ew from 45.93.201.90 port 45860 ssh2 Dec 30 03:19:51 host sshd[17154]: Connection closed by 45.93.201.90 port 45860 [preauth] Dec 30 03:19:51 host sshd[17154]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 30 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 30 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 30 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 30 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 30 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 30 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 03:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 30 03:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 03:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 03:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 30 03:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 03:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 03:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 30 03:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 03:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 30 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=a2zgroup user-2=dartsimp user-3=laundryboniface user-4=cochintaxi user-5=wwwkaretakers user-6=travelboniface user-7=wwwresourcehunte user-8=keralaholi user-9=wwwrmswll user-10=ugotscom user-11=wwwpmcresource user-12=vfmassets user-13=shalinijames user-14=wwwtestugo user-15=pmcresources user-16=remysagr user-17=disposeat user-18=wwwkmaorg user-19=woodpeck user-20=wwwkapin user-21=palco123 user-22=gifterman user-23=phmetals user-24=kottayamcalldriv user-25=mrsclean user-26=wwwnexidigital user-27=bonifacegroup user-28=wwwevmhonda user-29=straightcurve user-30=wwwletsstalkfood feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 30 03:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 30 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-1TSd8Orhmmxe3d0R.~ Dec 30 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-1TSd8Orhmmxe3d0R.~' Dec 30 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-1TSd8Orhmmxe3d0R.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 30 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 03:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 30 03:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 03:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 03:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 03:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 03:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 03:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 03:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 03:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 03:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 03:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 03:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 03:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 30 03:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 03:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 30 03:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 30 03:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 30 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 30 03:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 03:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 03:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 30 03:21:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 03:21:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 30 03:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 03:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 03:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 30 03:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 03:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 03:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 30 03:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 03:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 03:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 30 03:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 03:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 03:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 30 03:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 03:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 03:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 30 03:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 03:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 03:23:25 host sshd[18193]: Invalid user Apps from 103.13.40.2 port 46132 Dec 30 03:23:25 host sshd[18193]: input_userauth_request: invalid user Apps [preauth] Dec 30 03:23:25 host sshd[18193]: pam_unix(sshd:auth): check pass; user unknown Dec 30 03:23:25 host sshd[18193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 30 03:23:27 host sshd[18193]: Failed password for invalid user Apps from 103.13.40.2 port 46132 ssh2 Dec 30 03:23:27 host sshd[18193]: Connection closed by 103.13.40.2 port 46132 [preauth] Dec 30 03:24:23 host sshd[18293]: User root from 146.190.113.237 not allowed because not listed in AllowUsers Dec 30 03:24:23 host sshd[18293]: input_userauth_request: invalid user root [preauth] Dec 30 03:24:23 host unix_chkpwd[18317]: password check failed for user (root) Dec 30 03:24:23 host sshd[18293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.113.237 user=root Dec 30 03:24:23 host sshd[18293]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 03:24:25 host sshd[18293]: Failed password for invalid user root from 146.190.113.237 port 33514 ssh2 Dec 30 03:24:25 host sshd[18293]: Received disconnect from 146.190.113.237 port 33514:11: Bye Bye [preauth] Dec 30 03:24:25 host sshd[18293]: Disconnected from 146.190.113.237 port 33514 [preauth] Dec 30 03:28:57 host sshd[18867]: User root from 146.190.113.237 not allowed because not listed in AllowUsers Dec 30 03:28:57 host sshd[18867]: input_userauth_request: invalid user root [preauth] Dec 30 03:28:57 host unix_chkpwd[18870]: password check failed for user (root) Dec 30 03:28:57 host sshd[18867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.113.237 user=root Dec 30 03:28:57 host sshd[18867]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 03:28:59 host sshd[18867]: Failed password for invalid user root from 146.190.113.237 port 33282 ssh2 Dec 30 03:28:59 host sshd[18867]: Received disconnect from 146.190.113.237 port 33282:11: Bye Bye [preauth] Dec 30 03:28:59 host sshd[18867]: Disconnected from 146.190.113.237 port 33282 [preauth] Dec 30 03:38:34 host sshd[20280]: Invalid user student1 from 106.10.122.53 port 49738 Dec 30 03:38:34 host sshd[20280]: input_userauth_request: invalid user student1 [preauth] Dec 30 03:38:34 host sshd[20280]: pam_unix(sshd:auth): check pass; user unknown Dec 30 03:38:34 host sshd[20280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 30 03:38:36 host sshd[20280]: Failed password for invalid user student1 from 106.10.122.53 port 49738 ssh2 Dec 30 03:38:36 host sshd[20280]: Connection closed by 106.10.122.53 port 49738 [preauth] Dec 30 03:56:12 host sshd[23016]: User root from 202.175.179.218 not allowed because not listed in AllowUsers Dec 30 03:56:12 host sshd[23016]: input_userauth_request: invalid user root [preauth] Dec 30 03:56:12 host unix_chkpwd[23019]: password check failed for user (root) Dec 30 03:56:12 host sshd[23016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.175.179.218 user=root Dec 30 03:56:12 host sshd[23016]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 03:56:14 host sshd[23016]: Failed password for invalid user root from 202.175.179.218 port 59315 ssh2 Dec 30 03:56:14 host sshd[23016]: Received disconnect from 202.175.179.218 port 59315:11: Bye Bye [preauth] Dec 30 03:56:14 host sshd[23016]: Disconnected from 202.175.179.218 port 59315 [preauth] Dec 30 03:57:02 host sshd[23126]: User root from 222.119.64.11 not allowed because not listed in AllowUsers Dec 30 03:57:02 host sshd[23126]: input_userauth_request: invalid user root [preauth] Dec 30 03:57:02 host unix_chkpwd[23139]: password check failed for user (root) Dec 30 03:57:02 host sshd[23126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.119.64.11 user=root Dec 30 03:57:02 host sshd[23126]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 03:57:05 host sshd[23126]: Failed password for invalid user root from 222.119.64.11 port 40796 ssh2 Dec 30 03:57:05 host sshd[23126]: Received disconnect from 222.119.64.11 port 40796:11: Bye Bye [preauth] Dec 30 03:57:05 host sshd[23126]: Disconnected from 222.119.64.11 port 40796 [preauth] Dec 30 03:59:18 host sshd[23576]: User root from 89.46.96.165 not allowed because not listed in AllowUsers Dec 30 03:59:18 host sshd[23576]: input_userauth_request: invalid user root [preauth] Dec 30 03:59:18 host unix_chkpwd[23579]: password check failed for user (root) Dec 30 03:59:18 host sshd[23576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.46.96.165 user=root Dec 30 03:59:18 host sshd[23576]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 03:59:20 host sshd[23576]: Failed password for invalid user root from 89.46.96.165 port 40460 ssh2 Dec 30 03:59:20 host sshd[23576]: Received disconnect from 89.46.96.165 port 40460:11: Bye Bye [preauth] Dec 30 03:59:20 host sshd[23576]: Disconnected from 89.46.96.165 port 40460 [preauth] Dec 30 04:01:01 host sshd[23812]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Dec 30 04:01:01 host sshd[23812]: input_userauth_request: invalid user root [preauth] Dec 30 04:01:01 host unix_chkpwd[23840]: password check failed for user (root) Dec 30 04:01:01 host sshd[23812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Dec 30 04:01:01 host sshd[23812]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 04:01:03 host sshd[23812]: Failed password for invalid user root from 162.218.126.136 port 32878 ssh2 Dec 30 04:01:04 host sshd[23812]: Connection closed by 162.218.126.136 port 32878 [preauth] Dec 30 04:01:11 host sshd[23853]: User root from 218.208.209.217 not allowed because not listed in AllowUsers Dec 30 04:01:11 host sshd[23853]: input_userauth_request: invalid user root [preauth] Dec 30 04:01:11 host unix_chkpwd[23856]: password check failed for user (root) Dec 30 04:01:11 host sshd[23853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.208.209.217 user=root Dec 30 04:01:11 host sshd[23853]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 04:01:14 host sshd[23853]: Failed password for invalid user root from 218.208.209.217 port 39833 ssh2 Dec 30 04:01:14 host sshd[23853]: Received disconnect from 218.208.209.217 port 39833:11: Bye Bye [preauth] Dec 30 04:01:14 host sshd[23853]: Disconnected from 218.208.209.217 port 39833 [preauth] Dec 30 04:01:43 host sshd[23921]: User root from 202.175.179.218 not allowed because not listed in AllowUsers Dec 30 04:01:43 host sshd[23921]: input_userauth_request: invalid user root [preauth] Dec 30 04:01:43 host unix_chkpwd[23925]: password check failed for user (root) Dec 30 04:01:43 host sshd[23921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.175.179.218 user=root Dec 30 04:01:43 host sshd[23921]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 04:01:46 host sshd[23921]: Failed password for invalid user root from 202.175.179.218 port 59950 ssh2 Dec 30 04:01:46 host sshd[23921]: Received disconnect from 202.175.179.218 port 59950:11: Bye Bye [preauth] Dec 30 04:01:46 host sshd[23921]: Disconnected from 202.175.179.218 port 59950 [preauth] Dec 30 04:02:27 host sshd[24058]: User root from 157.245.154.129 not allowed because not listed in AllowUsers Dec 30 04:02:27 host sshd[24058]: input_userauth_request: invalid user root [preauth] Dec 30 04:02:27 host unix_chkpwd[24060]: password check failed for user (root) Dec 30 04:02:27 host sshd[24058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.154.129 user=root Dec 30 04:02:27 host sshd[24058]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 04:02:28 host sshd[24058]: Failed password for invalid user root from 157.245.154.129 port 52164 ssh2 Dec 30 04:02:28 host sshd[24058]: Received disconnect from 157.245.154.129 port 52164:11: Bye Bye [preauth] Dec 30 04:02:28 host sshd[24058]: Disconnected from 157.245.154.129 port 52164 [preauth] Dec 30 04:02:51 host sshd[24095]: User root from 89.46.96.165 not allowed because not listed in AllowUsers Dec 30 04:02:51 host sshd[24095]: input_userauth_request: invalid user root [preauth] Dec 30 04:02:51 host unix_chkpwd[24100]: password check failed for user (root) Dec 30 04:02:51 host sshd[24095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.46.96.165 user=root Dec 30 04:02:51 host sshd[24095]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 04:02:53 host sshd[24095]: Failed password for invalid user root from 89.46.96.165 port 40656 ssh2 Dec 30 04:02:53 host sshd[24095]: Received disconnect from 89.46.96.165 port 40656:11: Bye Bye [preauth] Dec 30 04:02:53 host sshd[24095]: Disconnected from 89.46.96.165 port 40656 [preauth] Dec 30 04:03:15 host sshd[24174]: User root from 218.208.209.217 not allowed because not listed in AllowUsers Dec 30 04:03:15 host sshd[24174]: input_userauth_request: invalid user root [preauth] Dec 30 04:03:15 host unix_chkpwd[24184]: password check failed for user (root) Dec 30 04:03:15 host sshd[24174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.208.209.217 user=root Dec 30 04:03:15 host sshd[24174]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 04:03:17 host sshd[24174]: Failed password for invalid user root from 218.208.209.217 port 12174 ssh2 Dec 30 04:03:17 host sshd[24174]: Received disconnect from 218.208.209.217 port 12174:11: Bye Bye [preauth] Dec 30 04:03:17 host sshd[24174]: Disconnected from 218.208.209.217 port 12174 [preauth] Dec 30 04:04:00 host sshd[24399]: User root from 157.245.154.129 not allowed because not listed in AllowUsers Dec 30 04:04:00 host sshd[24399]: input_userauth_request: invalid user root [preauth] Dec 30 04:04:00 host unix_chkpwd[24402]: password check failed for user (root) Dec 30 04:04:00 host sshd[24399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.154.129 user=root Dec 30 04:04:00 host sshd[24399]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 04:04:02 host sshd[24399]: Failed password for invalid user root from 157.245.154.129 port 49396 ssh2 Dec 30 04:04:02 host sshd[24399]: Received disconnect from 157.245.154.129 port 49396:11: Bye Bye [preauth] Dec 30 04:04:02 host sshd[24399]: Disconnected from 157.245.154.129 port 49396 [preauth] Dec 30 04:04:25 host sshd[24493]: User root from 222.119.64.11 not allowed because not listed in AllowUsers Dec 30 04:04:25 host sshd[24493]: input_userauth_request: invalid user root [preauth] Dec 30 04:04:25 host unix_chkpwd[24498]: password check failed for user (root) Dec 30 04:04:25 host sshd[24493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.119.64.11 user=root Dec 30 04:04:25 host sshd[24493]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 04:04:27 host sshd[24493]: Failed password for invalid user root from 222.119.64.11 port 39550 ssh2 Dec 30 04:08:50 host sshd[25037]: Invalid user zn from 92.46.108.20 port 46682 Dec 30 04:08:50 host sshd[25037]: input_userauth_request: invalid user zn [preauth] Dec 30 04:08:51 host sshd[25037]: pam_unix(sshd:auth): check pass; user unknown Dec 30 04:08:51 host sshd[25037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 30 04:08:53 host sshd[25037]: Failed password for invalid user zn from 92.46.108.20 port 46682 ssh2 Dec 30 04:08:54 host sshd[25037]: Connection closed by 92.46.108.20 port 46682 [preauth] Dec 30 04:12:44 host sshd[25606]: User root from 87.197.152.170 not allowed because not listed in AllowUsers Dec 30 04:12:44 host sshd[25606]: input_userauth_request: invalid user root [preauth] Dec 30 04:12:44 host unix_chkpwd[25609]: password check failed for user (root) Dec 30 04:12:44 host sshd[25606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.197.152.170 user=root Dec 30 04:12:44 host sshd[25606]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 04:12:47 host sshd[25606]: Failed password for invalid user root from 87.197.152.170 port 56800 ssh2 Dec 30 04:12:47 host sshd[25606]: Received disconnect from 87.197.152.170 port 56800:11: Bye Bye [preauth] Dec 30 04:12:47 host sshd[25606]: Disconnected from 87.197.152.170 port 56800 [preauth] Dec 30 04:13:28 host sshd[25719]: User root from 188.166.41.217 not allowed because not listed in AllowUsers Dec 30 04:13:28 host sshd[25719]: input_userauth_request: invalid user root [preauth] Dec 30 04:13:28 host unix_chkpwd[25723]: password check failed for user (root) Dec 30 04:13:28 host sshd[25719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.41.217 user=root Dec 30 04:13:28 host sshd[25719]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 04:13:30 host sshd[25719]: Failed password for invalid user root from 188.166.41.217 port 46764 ssh2 Dec 30 04:13:30 host sshd[25719]: Received disconnect from 188.166.41.217 port 46764:11: Bye Bye [preauth] Dec 30 04:13:30 host sshd[25719]: Disconnected from 188.166.41.217 port 46764 [preauth] Dec 30 04:13:52 host sshd[25752]: User root from 45.13.58.103 not allowed because not listed in AllowUsers Dec 30 04:13:52 host sshd[25752]: input_userauth_request: invalid user root [preauth] Dec 30 04:13:52 host unix_chkpwd[25755]: password check failed for user (root) Dec 30 04:13:52 host sshd[25752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.13.58.103 user=root Dec 30 04:13:52 host sshd[25752]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 04:13:54 host sshd[25752]: Failed password for invalid user root from 45.13.58.103 port 39606 ssh2 Dec 30 04:13:55 host sshd[25752]: Received disconnect from 45.13.58.103 port 39606:11: Bye Bye [preauth] Dec 30 04:13:55 host sshd[25752]: Disconnected from 45.13.58.103 port 39606 [preauth] Dec 30 04:14:35 host sshd[25952]: User root from 95.165.138.108 not allowed because not listed in AllowUsers Dec 30 04:14:35 host sshd[25952]: input_userauth_request: invalid user root [preauth] Dec 30 04:14:35 host unix_chkpwd[25955]: password check failed for user (root) Dec 30 04:14:35 host sshd[25952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.165.138.108 user=root Dec 30 04:14:35 host sshd[25952]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 04:14:37 host sshd[25952]: Failed password for invalid user root from 95.165.138.108 port 41166 ssh2 Dec 30 04:14:38 host sshd[25952]: Received disconnect from 95.165.138.108 port 41166:11: Bye Bye [preauth] Dec 30 04:14:38 host sshd[25952]: Disconnected from 95.165.138.108 port 41166 [preauth] Dec 30 04:14:54 host sshd[25979]: User root from 137.184.8.233 not allowed because not listed in AllowUsers Dec 30 04:14:54 host sshd[25979]: input_userauth_request: invalid user root [preauth] Dec 30 04:14:54 host unix_chkpwd[25982]: password check failed for user (root) Dec 30 04:14:54 host sshd[25979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.8.233 user=root Dec 30 04:14:54 host sshd[25979]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 04:14:56 host sshd[25979]: Failed password for invalid user root from 137.184.8.233 port 39594 ssh2 Dec 30 04:14:56 host sshd[25979]: Received disconnect from 137.184.8.233 port 39594:11: Bye Bye [preauth] Dec 30 04:14:56 host sshd[25979]: Disconnected from 137.184.8.233 port 39594 [preauth] Dec 30 04:14:59 host sshd[25987]: User root from 142.44.160.183 not allowed because not listed in AllowUsers Dec 30 04:14:59 host sshd[25987]: input_userauth_request: invalid user root [preauth] Dec 30 04:14:59 host unix_chkpwd[25992]: password check failed for user (root) Dec 30 04:14:59 host sshd[25987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.183 user=root Dec 30 04:14:59 host sshd[25987]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 04:15:02 host sshd[25987]: Failed password for invalid user root from 142.44.160.183 port 33380 ssh2 Dec 30 04:15:02 host sshd[25987]: Received disconnect from 142.44.160.183 port 33380:11: Bye Bye [preauth] Dec 30 04:15:02 host sshd[25987]: Disconnected from 142.44.160.183 port 33380 [preauth] Dec 30 04:15:51 host sshd[26137]: User root from 43.134.176.134 not allowed because not listed in AllowUsers Dec 30 04:15:51 host sshd[26137]: input_userauth_request: invalid user root [preauth] Dec 30 04:15:51 host unix_chkpwd[26140]: password check failed for user (root) Dec 30 04:15:51 host sshd[26137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.176.134 user=root Dec 30 04:15:51 host sshd[26137]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 04:15:53 host sshd[26137]: Failed password for invalid user root from 43.134.176.134 port 57836 ssh2 Dec 30 04:15:53 host sshd[26137]: Received disconnect from 43.134.176.134 port 57836:11: Bye Bye [preauth] Dec 30 04:15:53 host sshd[26137]: Disconnected from 43.134.176.134 port 57836 [preauth] Dec 30 04:16:03 host sshd[26167]: User root from 23.94.201.247 not allowed because not listed in AllowUsers Dec 30 04:16:03 host sshd[26167]: input_userauth_request: invalid user root [preauth] Dec 30 04:16:03 host unix_chkpwd[26172]: password check failed for user (root) Dec 30 04:16:03 host sshd[26167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.94.201.247 user=root Dec 30 04:16:03 host sshd[26167]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 04:16:05 host sshd[26167]: Failed password for invalid user root from 23.94.201.247 port 58412 ssh2 Dec 30 04:16:05 host sshd[26167]: Received disconnect from 23.94.201.247 port 58412:11: Bye Bye [preauth] Dec 30 04:16:05 host sshd[26167]: Disconnected from 23.94.201.247 port 58412 [preauth] Dec 30 04:16:26 host sshd[26237]: User root from 5.78.51.65 not allowed because not listed in AllowUsers Dec 30 04:16:26 host sshd[26237]: input_userauth_request: invalid user root [preauth] Dec 30 04:16:26 host unix_chkpwd[26241]: password check failed for user (root) Dec 30 04:16:26 host sshd[26237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.78.51.65 user=root Dec 30 04:16:26 host sshd[26237]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 04:16:27 host sshd[26237]: Failed password for invalid user root from 5.78.51.65 port 58042 ssh2 Dec 30 04:16:28 host sshd[26237]: Received disconnect from 5.78.51.65 port 58042:11: Bye Bye [preauth] Dec 30 04:16:28 host sshd[26237]: Disconnected from 5.78.51.65 port 58042 [preauth] Dec 30 04:16:41 host sshd[26260]: User root from 162.241.114.54 not allowed because not listed in AllowUsers Dec 30 04:16:41 host sshd[26260]: input_userauth_request: invalid user root [preauth] Dec 30 04:16:42 host unix_chkpwd[26267]: password check failed for user (root) Dec 30 04:16:42 host sshd[26260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.114.54 user=root Dec 30 04:16:42 host sshd[26260]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 04:16:42 host sshd[26265]: User root from 34.80.102.160 not allowed because not listed in AllowUsers Dec 30 04:16:42 host sshd[26265]: input_userauth_request: invalid user root [preauth] Dec 30 04:16:42 host unix_chkpwd[26268]: password check failed for user (root) Dec 30 04:16:42 host sshd[26265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.80.102.160 user=root Dec 30 04:16:42 host sshd[26265]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 04:16:43 host sshd[26260]: Failed password for invalid user root from 162.241.114.54 port 45844 ssh2 Dec 30 04:16:43 host sshd[26260]: Received disconnect from 162.241.114.54 port 45844:11: Bye Bye [preauth] Dec 30 04:16:43 host sshd[26260]: Disconnected from 162.241.114.54 port 45844 [preauth] Dec 30 04:16:44 host sshd[26265]: Failed password for invalid user root from 34.80.102.160 port 54292 ssh2 Dec 30 04:16:44 host sshd[26265]: Received disconnect from 34.80.102.160 port 54292:11: Bye Bye [preauth] Dec 30 04:16:44 host sshd[26265]: Disconnected from 34.80.102.160 port 54292 [preauth] Dec 30 04:17:25 host sshd[26369]: User root from 198.100.155.70 not allowed because not listed in AllowUsers Dec 30 04:17:25 host sshd[26369]: input_userauth_request: invalid user root [preauth] Dec 30 04:17:25 host unix_chkpwd[26376]: password check failed for user (root) Dec 30 04:17:25 host sshd[26369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.100.155.70 user=root Dec 30 04:17:25 host sshd[26369]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 04:17:27 host sshd[26369]: Failed password for invalid user root from 198.100.155.70 port 44324 ssh2 Dec 30 04:17:27 host sshd[26369]: Received disconnect from 198.100.155.70 port 44324:11: Bye Bye [preauth] Dec 30 04:17:27 host sshd[26369]: Disconnected from 198.100.155.70 port 44324 [preauth] Dec 30 04:17:31 host sshd[26387]: User root from 87.197.152.170 not allowed because not listed in AllowUsers Dec 30 04:17:31 host sshd[26387]: input_userauth_request: invalid user root [preauth] Dec 30 04:17:31 host unix_chkpwd[26390]: password check failed for user (root) Dec 30 04:17:31 host sshd[26387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.197.152.170 user=root Dec 30 04:17:31 host sshd[26387]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 04:17:34 host sshd[26387]: Failed password for invalid user root from 87.197.152.170 port 53938 ssh2 Dec 30 04:17:34 host sshd[26387]: Received disconnect from 87.197.152.170 port 53938:11: Bye Bye [preauth] Dec 30 04:17:34 host sshd[26387]: Disconnected from 87.197.152.170 port 53938 [preauth] Dec 30 04:18:00 host sshd[26473]: User root from 188.166.41.217 not allowed because not listed in AllowUsers Dec 30 04:18:00 host sshd[26473]: input_userauth_request: invalid user root [preauth] Dec 30 04:18:00 host unix_chkpwd[26477]: password check failed for user (root) Dec 30 04:18:00 host sshd[26473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.41.217 user=root Dec 30 04:18:00 host sshd[26473]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 04:18:02 host sshd[26473]: Failed password for invalid user root from 188.166.41.217 port 32862 ssh2 Dec 30 04:18:18 host sshd[26547]: User root from 142.44.160.183 not allowed because not listed in AllowUsers Dec 30 04:18:18 host sshd[26547]: input_userauth_request: invalid user root [preauth] Dec 30 04:18:18 host unix_chkpwd[26550]: password check failed for user (root) Dec 30 04:18:18 host sshd[26547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.183 user=root Dec 30 04:18:18 host sshd[26547]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 04:18:20 host sshd[26547]: Failed password for invalid user root from 142.44.160.183 port 56364 ssh2 Dec 30 04:18:21 host sshd[26547]: Received disconnect from 142.44.160.183 port 56364:11: Bye Bye [preauth] Dec 30 04:18:21 host sshd[26547]: Disconnected from 142.44.160.183 port 56364 [preauth] Dec 30 04:18:21 host sshd[26552]: User root from 45.13.58.103 not allowed because not listed in AllowUsers Dec 30 04:18:21 host sshd[26552]: input_userauth_request: invalid user root [preauth] Dec 30 04:18:21 host unix_chkpwd[26555]: password check failed for user (root) Dec 30 04:18:21 host sshd[26552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.13.58.103 user=root Dec 30 04:18:21 host sshd[26552]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 04:18:23 host sshd[26552]: Failed password for invalid user root from 45.13.58.103 port 48168 ssh2 Dec 30 04:18:34 host sshd[26686]: User root from 162.241.114.54 not allowed because not listed in AllowUsers Dec 30 04:18:34 host sshd[26686]: input_userauth_request: invalid user root [preauth] Dec 30 04:18:34 host unix_chkpwd[26689]: password check failed for user (root) Dec 30 04:18:34 host sshd[26686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.114.54 user=root Dec 30 04:18:34 host sshd[26686]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 04:18:36 host sshd[26686]: Failed password for invalid user root from 162.241.114.54 port 50770 ssh2 Dec 30 04:18:36 host sshd[26686]: Received disconnect from 162.241.114.54 port 50770:11: Bye Bye [preauth] Dec 30 04:18:36 host sshd[26686]: Disconnected from 162.241.114.54 port 50770 [preauth] Dec 30 04:18:39 host sshd[26729]: User root from 23.94.201.247 not allowed because not listed in AllowUsers Dec 30 04:18:39 host sshd[26729]: input_userauth_request: invalid user root [preauth] Dec 30 04:18:39 host unix_chkpwd[26739]: password check failed for user (root) Dec 30 04:18:39 host sshd[26729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.94.201.247 user=root Dec 30 04:18:39 host sshd[26729]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 04:18:41 host sshd[26729]: Failed password for invalid user root from 23.94.201.247 port 39432 ssh2 Dec 30 04:18:41 host sshd[26729]: Received disconnect from 23.94.201.247 port 39432:11: Bye Bye [preauth] Dec 30 04:18:41 host sshd[26729]: Disconnected from 23.94.201.247 port 39432 [preauth] Dec 30 04:18:52 host sshd[26786]: User root from 198.100.155.70 not allowed because not listed in AllowUsers Dec 30 04:18:52 host sshd[26786]: input_userauth_request: invalid user root [preauth] Dec 30 04:18:52 host unix_chkpwd[26789]: password check failed for user (root) Dec 30 04:18:52 host sshd[26786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.100.155.70 user=root Dec 30 04:18:52 host sshd[26786]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 04:18:54 host sshd[26786]: Failed password for invalid user root from 198.100.155.70 port 45756 ssh2 Dec 30 04:18:54 host sshd[26786]: Received disconnect from 198.100.155.70 port 45756:11: Bye Bye [preauth] Dec 30 04:18:54 host sshd[26786]: Disconnected from 198.100.155.70 port 45756 [preauth] Dec 30 04:19:02 host sshd[26846]: User root from 34.80.102.160 not allowed because not listed in AllowUsers Dec 30 04:19:02 host sshd[26846]: input_userauth_request: invalid user root [preauth] Dec 30 04:19:02 host unix_chkpwd[26849]: password check failed for user (root) Dec 30 04:19:02 host sshd[26846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.80.102.160 user=root Dec 30 04:19:02 host sshd[26846]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 04:19:02 host sshd[26844]: User root from 95.165.138.108 not allowed because not listed in AllowUsers Dec 30 04:19:02 host sshd[26844]: input_userauth_request: invalid user root [preauth] Dec 30 04:19:02 host unix_chkpwd[26850]: password check failed for user (root) Dec 30 04:19:02 host sshd[26844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.165.138.108 user=root Dec 30 04:19:02 host sshd[26844]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 04:19:04 host sshd[26846]: Failed password for invalid user root from 34.80.102.160 port 60958 ssh2 Dec 30 04:19:04 host sshd[26846]: Received disconnect from 34.80.102.160 port 60958:11: Bye Bye [preauth] Dec 30 04:19:04 host sshd[26846]: Disconnected from 34.80.102.160 port 60958 [preauth] Dec 30 04:19:04 host sshd[26844]: Failed password for invalid user root from 95.165.138.108 port 37126 ssh2 Dec 30 04:19:04 host sshd[26844]: Received disconnect from 95.165.138.108 port 37126:11: Bye Bye [preauth] Dec 30 04:19:04 host sshd[26844]: Disconnected from 95.165.138.108 port 37126 [preauth] Dec 30 04:19:05 host sshd[26852]: User root from 137.184.8.233 not allowed because not listed in AllowUsers Dec 30 04:19:05 host sshd[26852]: input_userauth_request: invalid user root [preauth] Dec 30 04:19:05 host unix_chkpwd[26856]: password check failed for user (root) Dec 30 04:19:05 host sshd[26852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.8.233 user=root Dec 30 04:19:05 host sshd[26852]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 04:19:07 host sshd[26852]: Failed password for invalid user root from 137.184.8.233 port 39758 ssh2 Dec 30 04:19:22 host sshd[27100]: User root from 43.134.176.134 not allowed because not listed in AllowUsers Dec 30 04:19:22 host sshd[27100]: input_userauth_request: invalid user root [preauth] Dec 30 04:19:23 host unix_chkpwd[27102]: password check failed for user (root) Dec 30 04:19:23 host sshd[27100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.176.134 user=root Dec 30 04:19:23 host sshd[27100]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 04:19:25 host sshd[27100]: Failed password for invalid user root from 43.134.176.134 port 34854 ssh2 Dec 30 04:19:25 host sshd[27100]: Received disconnect from 43.134.176.134 port 34854:11: Bye Bye [preauth] Dec 30 04:19:25 host sshd[27100]: Disconnected from 43.134.176.134 port 34854 [preauth] Dec 30 04:19:27 host sshd[27131]: User root from 5.78.51.65 not allowed because not listed in AllowUsers Dec 30 04:19:27 host sshd[27131]: input_userauth_request: invalid user root [preauth] Dec 30 04:19:27 host unix_chkpwd[27167]: password check failed for user (root) Dec 30 04:19:27 host sshd[27131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.78.51.65 user=root Dec 30 04:19:27 host sshd[27131]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 04:19:30 host sshd[27131]: Failed password for invalid user root from 5.78.51.65 port 40766 ssh2 Dec 30 04:19:30 host sshd[27131]: Received disconnect from 5.78.51.65 port 40766:11: Bye Bye [preauth] Dec 30 04:19:30 host sshd[27131]: Disconnected from 5.78.51.65 port 40766 [preauth] Dec 30 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 30 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 30 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 30 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 30 04:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 04:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 04:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 30 04:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 04:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 04:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 30 04:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 04:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 04:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 30 04:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 04:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 04:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 30 04:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 04:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 04:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 30 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=bonifacegroup user-2=wwwevmhonda user-3=straightcurve user-4=wwwletsstalkfood user-5=palco123 user-6=gifterman user-7=kottayamcalldriv user-8=phmetals user-9=wwwnexidigital user-10=mrsclean user-11=wwwkmaorg user-12=disposeat user-13=remysagr user-14=woodpeck user-15=wwwkapin user-16=vfmassets user-17=shalinijames user-18=wwwtestugo user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=keralaholi user-23=wwwresourcehunte user-24=wwwrmswll user-25=ugotscom user-26=wwwkaretakers user-27=cochintaxi user-28=a2zgroup user-29=dartsimp user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 30 04:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 30 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-EJfP1jxzfmSh5GE2.~ Dec 30 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-EJfP1jxzfmSh5GE2.~' Dec 30 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-EJfP1jxzfmSh5GE2.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 30 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 30 04:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 04:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 04:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 04:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 04:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 04:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 04:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 04:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 04:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 04:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 04:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 04:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 30 04:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 04:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 04:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 04:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 30 04:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 30 04:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 30 04:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 30 04:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 04:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 30 04:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 04:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 04:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 30 04:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 04:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 04:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 30 04:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 04:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 30 04:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 04:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 30 04:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 04:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 04:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 30 04:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 04:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 04:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 30 04:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 04:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 04:44:04 host sshd[31390]: Invalid user jboss from 41.197.31.178 port 44754 Dec 30 04:44:04 host sshd[31390]: input_userauth_request: invalid user jboss [preauth] Dec 30 04:44:04 host sshd[31390]: pam_unix(sshd:auth): check pass; user unknown Dec 30 04:44:04 host sshd[31390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 30 04:44:06 host sshd[31390]: Failed password for invalid user jboss from 41.197.31.178 port 44754 ssh2 Dec 30 04:44:07 host sshd[31390]: Connection closed by 41.197.31.178 port 44754 [preauth] Dec 30 04:49:03 host sshd[32351]: Invalid user user from 103.13.40.2 port 60874 Dec 30 04:49:03 host sshd[32351]: input_userauth_request: invalid user user [preauth] Dec 30 04:49:03 host sshd[32351]: pam_unix(sshd:auth): check pass; user unknown Dec 30 04:49:03 host sshd[32351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 30 04:49:05 host sshd[32351]: Failed password for invalid user user from 103.13.40.2 port 60874 ssh2 Dec 30 04:49:05 host sshd[32351]: Connection closed by 103.13.40.2 port 60874 [preauth] Dec 30 05:04:19 host sshd[2471]: Invalid user amber from 106.10.122.53 port 40100 Dec 30 05:04:19 host sshd[2471]: input_userauth_request: invalid user amber [preauth] Dec 30 05:04:19 host sshd[2471]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:04:19 host sshd[2471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 30 05:04:21 host sshd[2471]: Failed password for invalid user amber from 106.10.122.53 port 40100 ssh2 Dec 30 05:04:21 host sshd[2471]: Connection closed by 106.10.122.53 port 40100 [preauth] Dec 30 05:06:26 host sshd[2781]: Invalid user ex from 45.93.201.90 port 35334 Dec 30 05:06:26 host sshd[2781]: input_userauth_request: invalid user ex [preauth] Dec 30 05:06:26 host sshd[2781]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:06:26 host sshd[2781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 30 05:06:28 host sshd[2781]: Failed password for invalid user ex from 45.93.201.90 port 35334 ssh2 Dec 30 05:06:31 host sshd[2781]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:06:33 host sshd[2781]: Failed password for invalid user ex from 45.93.201.90 port 35334 ssh2 Dec 30 05:06:36 host sshd[2781]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:06:38 host sshd[2781]: Failed password for invalid user ex from 45.93.201.90 port 35334 ssh2 Dec 30 05:06:42 host sshd[2781]: Connection closed by 45.93.201.90 port 35334 [preauth] Dec 30 05:06:42 host sshd[2781]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 30 05:11:15 host sshd[3483]: User root from 51.178.90.17 not allowed because not listed in AllowUsers Dec 30 05:11:15 host sshd[3483]: input_userauth_request: invalid user root [preauth] Dec 30 05:11:15 host unix_chkpwd[3487]: password check failed for user (root) Dec 30 05:11:15 host sshd[3483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.90.17 user=root Dec 30 05:11:15 host sshd[3483]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 05:11:17 host sshd[3483]: Failed password for invalid user root from 51.178.90.17 port 36180 ssh2 Dec 30 05:11:17 host sshd[3483]: Received disconnect from 51.178.90.17 port 36180:11: Bye Bye [preauth] Dec 30 05:11:17 host sshd[3483]: Disconnected from 51.178.90.17 port 36180 [preauth] Dec 30 05:11:24 host sshd[3525]: Invalid user alex from 202.47.118.117 port 42620 Dec 30 05:11:24 host sshd[3525]: input_userauth_request: invalid user alex [preauth] Dec 30 05:11:24 host sshd[3525]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:11:24 host sshd[3525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.47.118.117 Dec 30 05:11:26 host sshd[3525]: Failed password for invalid user alex from 202.47.118.117 port 42620 ssh2 Dec 30 05:11:26 host sshd[3525]: Received disconnect from 202.47.118.117 port 42620:11: Bye Bye [preauth] Dec 30 05:11:26 host sshd[3525]: Disconnected from 202.47.118.117 port 42620 [preauth] Dec 30 05:12:03 host sshd[3600]: Invalid user adsl from 107.172.201.220 port 58458 Dec 30 05:12:03 host sshd[3600]: input_userauth_request: invalid user adsl [preauth] Dec 30 05:12:03 host sshd[3600]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:12:03 host sshd[3600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.172.201.220 Dec 30 05:12:05 host sshd[3600]: Failed password for invalid user adsl from 107.172.201.220 port 58458 ssh2 Dec 30 05:12:05 host sshd[3600]: Received disconnect from 107.172.201.220 port 58458:11: Bye Bye [preauth] Dec 30 05:12:05 host sshd[3600]: Disconnected from 107.172.201.220 port 58458 [preauth] Dec 30 05:13:20 host sshd[3746]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Dec 30 05:13:20 host sshd[3746]: input_userauth_request: invalid user root [preauth] Dec 30 05:13:20 host unix_chkpwd[3750]: password check failed for user (root) Dec 30 05:13:20 host sshd[3746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Dec 30 05:13:20 host sshd[3746]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 05:13:23 host sshd[3746]: Failed password for invalid user root from 162.218.126.136 port 52864 ssh2 Dec 30 05:13:23 host sshd[3746]: Connection closed by 162.218.126.136 port 52864 [preauth] Dec 30 05:14:29 host sshd[3925]: User root from 152.228.164.249 not allowed because not listed in AllowUsers Dec 30 05:14:29 host sshd[3925]: input_userauth_request: invalid user root [preauth] Dec 30 05:14:29 host unix_chkpwd[3932]: password check failed for user (root) Dec 30 05:14:29 host sshd[3925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.228.164.249 user=root Dec 30 05:14:29 host sshd[3925]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 05:14:31 host sshd[3925]: Failed password for invalid user root from 152.228.164.249 port 50566 ssh2 Dec 30 05:14:31 host sshd[3925]: Received disconnect from 152.228.164.249 port 50566:11: Bye Bye [preauth] Dec 30 05:14:31 host sshd[3925]: Disconnected from 152.228.164.249 port 50566 [preauth] Dec 30 05:15:14 host sshd[4036]: User root from 68.183.179.188 not allowed because not listed in AllowUsers Dec 30 05:15:14 host sshd[4036]: input_userauth_request: invalid user root [preauth] Dec 30 05:15:14 host unix_chkpwd[4039]: password check failed for user (root) Dec 30 05:15:14 host sshd[4036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.179.188 user=root Dec 30 05:15:14 host sshd[4036]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 05:15:16 host sshd[4036]: Failed password for invalid user root from 68.183.179.188 port 63758 ssh2 Dec 30 05:15:16 host sshd[4036]: Received disconnect from 68.183.179.188 port 63758:11: Bye Bye [preauth] Dec 30 05:15:16 host sshd[4036]: Disconnected from 68.183.179.188 port 63758 [preauth] Dec 30 05:15:29 host sshd[4240]: Invalid user nathaniel from 190.191.28.41 port 37239 Dec 30 05:15:29 host sshd[4240]: input_userauth_request: invalid user nathaniel [preauth] Dec 30 05:15:29 host sshd[4240]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:15:29 host sshd[4240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.191.28.41 Dec 30 05:15:31 host sshd[4240]: Failed password for invalid user nathaniel from 190.191.28.41 port 37239 ssh2 Dec 30 05:15:31 host sshd[4240]: Received disconnect from 190.191.28.41 port 37239:11: Bye Bye [preauth] Dec 30 05:15:31 host sshd[4240]: Disconnected from 190.191.28.41 port 37239 [preauth] Dec 30 05:15:34 host sshd[4286]: Invalid user user1 from 165.22.99.177 port 47554 Dec 30 05:15:34 host sshd[4286]: input_userauth_request: invalid user user1 [preauth] Dec 30 05:15:34 host sshd[4286]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:15:34 host sshd[4286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.99.177 Dec 30 05:15:36 host sshd[4286]: Failed password for invalid user user1 from 165.22.99.177 port 47554 ssh2 Dec 30 05:15:36 host sshd[4286]: Received disconnect from 165.22.99.177 port 47554:11: Bye Bye [preauth] Dec 30 05:15:36 host sshd[4286]: Disconnected from 165.22.99.177 port 47554 [preauth] Dec 30 05:15:38 host sshd[4302]: Invalid user ubuntu from 197.14.11.24 port 49262 Dec 30 05:15:38 host sshd[4302]: input_userauth_request: invalid user ubuntu [preauth] Dec 30 05:15:38 host sshd[4302]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:15:38 host sshd[4302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.14.11.24 Dec 30 05:15:40 host sshd[4302]: Failed password for invalid user ubuntu from 197.14.11.24 port 49262 ssh2 Dec 30 05:15:40 host sshd[4302]: Received disconnect from 197.14.11.24 port 49262:11: Bye Bye [preauth] Dec 30 05:15:40 host sshd[4302]: Disconnected from 197.14.11.24 port 49262 [preauth] Dec 30 05:15:49 host sshd[4317]: Invalid user nmrsu from 124.160.96.249 port 22130 Dec 30 05:15:49 host sshd[4317]: input_userauth_request: invalid user nmrsu [preauth] Dec 30 05:15:49 host sshd[4317]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:15:49 host sshd[4317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.96.249 Dec 30 05:15:52 host sshd[4317]: Failed password for invalid user nmrsu from 124.160.96.249 port 22130 ssh2 Dec 30 05:15:52 host sshd[4317]: Received disconnect from 124.160.96.249 port 22130:11: Bye Bye [preauth] Dec 30 05:15:52 host sshd[4317]: Disconnected from 124.160.96.249 port 22130 [preauth] Dec 30 05:15:55 host sshd[4330]: Invalid user admin from 122.165.93.92 port 55252 Dec 30 05:15:55 host sshd[4330]: input_userauth_request: invalid user admin [preauth] Dec 30 05:15:55 host sshd[4330]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:15:55 host sshd[4330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.165.93.92 Dec 30 05:15:57 host sshd[4330]: Failed password for invalid user admin from 122.165.93.92 port 55252 ssh2 Dec 30 05:15:57 host sshd[4330]: Received disconnect from 122.165.93.92 port 55252:11: Bye Bye [preauth] Dec 30 05:15:57 host sshd[4330]: Disconnected from 122.165.93.92 port 55252 [preauth] Dec 30 05:16:01 host sshd[4338]: Invalid user frappe from 41.242.141.201 port 35722 Dec 30 05:16:01 host sshd[4338]: input_userauth_request: invalid user frappe [preauth] Dec 30 05:16:01 host sshd[4338]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:16:01 host sshd[4338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.242.141.201 Dec 30 05:16:03 host sshd[4338]: Failed password for invalid user frappe from 41.242.141.201 port 35722 ssh2 Dec 30 05:16:03 host sshd[4338]: Received disconnect from 41.242.141.201 port 35722:11: Bye Bye [preauth] Dec 30 05:16:03 host sshd[4338]: Disconnected from 41.242.141.201 port 35722 [preauth] Dec 30 05:16:52 host sshd[4485]: User root from 51.178.90.17 not allowed because not listed in AllowUsers Dec 30 05:16:52 host sshd[4485]: input_userauth_request: invalid user root [preauth] Dec 30 05:16:52 host unix_chkpwd[4491]: password check failed for user (root) Dec 30 05:16:52 host sshd[4485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.90.17 user=root Dec 30 05:16:52 host sshd[4485]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 05:16:55 host sshd[4485]: Failed password for invalid user root from 51.178.90.17 port 34210 ssh2 Dec 30 05:16:55 host sshd[4526]: Invalid user 1234 from 159.223.53.3 port 57460 Dec 30 05:16:55 host sshd[4526]: input_userauth_request: invalid user 1234 [preauth] Dec 30 05:16:55 host sshd[4526]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:16:55 host sshd[4526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.53.3 Dec 30 05:16:57 host sshd[4526]: Failed password for invalid user 1234 from 159.223.53.3 port 57460 ssh2 Dec 30 05:16:57 host sshd[4526]: Received disconnect from 159.223.53.3 port 57460:11: Bye Bye [preauth] Dec 30 05:16:57 host sshd[4526]: Disconnected from 159.223.53.3 port 57460 [preauth] Dec 30 05:17:13 host sshd[4561]: User root from 209.97.187.12 not allowed because not listed in AllowUsers Dec 30 05:17:13 host sshd[4561]: input_userauth_request: invalid user root [preauth] Dec 30 05:17:13 host unix_chkpwd[4565]: password check failed for user (root) Dec 30 05:17:13 host sshd[4561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.187.12 user=root Dec 30 05:17:13 host sshd[4561]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 05:17:15 host sshd[4561]: Failed password for invalid user root from 209.97.187.12 port 43642 ssh2 Dec 30 05:17:16 host sshd[4561]: Received disconnect from 209.97.187.12 port 43642:11: Bye Bye [preauth] Dec 30 05:17:16 host sshd[4561]: Disconnected from 209.97.187.12 port 43642 [preauth] Dec 30 05:17:43 host sshd[4650]: User root from 211.252.87.118 not allowed because not listed in AllowUsers Dec 30 05:17:43 host sshd[4650]: input_userauth_request: invalid user root [preauth] Dec 30 05:17:43 host unix_chkpwd[4654]: password check failed for user (root) Dec 30 05:17:43 host sshd[4650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.252.87.118 user=root Dec 30 05:17:43 host sshd[4650]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 05:17:45 host sshd[4650]: Failed password for invalid user root from 211.252.87.118 port 43438 ssh2 Dec 30 05:17:46 host sshd[4650]: Received disconnect from 211.252.87.118 port 43438:11: Bye Bye [preauth] Dec 30 05:17:46 host sshd[4650]: Disconnected from 211.252.87.118 port 43438 [preauth] Dec 30 05:17:55 host sshd[4675]: Invalid user test from 157.245.152.31 port 47320 Dec 30 05:17:55 host sshd[4675]: input_userauth_request: invalid user test [preauth] Dec 30 05:17:55 host sshd[4675]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:17:55 host sshd[4675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.152.31 Dec 30 05:17:57 host sshd[4675]: Failed password for invalid user test from 157.245.152.31 port 47320 ssh2 Dec 30 05:17:57 host sshd[4675]: Received disconnect from 157.245.152.31 port 47320:11: Bye Bye [preauth] Dec 30 05:17:57 host sshd[4675]: Disconnected from 157.245.152.31 port 47320 [preauth] Dec 30 05:18:01 host sshd[4685]: Invalid user drcomadmin from 107.172.201.220 port 38838 Dec 30 05:18:01 host sshd[4685]: input_userauth_request: invalid user drcomadmin [preauth] Dec 30 05:18:01 host sshd[4685]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:18:01 host sshd[4685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.172.201.220 Dec 30 05:18:03 host sshd[4685]: Failed password for invalid user drcomadmin from 107.172.201.220 port 38838 ssh2 Dec 30 05:18:04 host sshd[4685]: Received disconnect from 107.172.201.220 port 38838:11: Bye Bye [preauth] Dec 30 05:18:04 host sshd[4685]: Disconnected from 107.172.201.220 port 38838 [preauth] Dec 30 05:18:12 host sshd[4731]: Invalid user alpha from 202.47.118.117 port 45612 Dec 30 05:18:12 host sshd[4731]: input_userauth_request: invalid user alpha [preauth] Dec 30 05:18:12 host sshd[4731]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:18:12 host sshd[4731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.47.118.117 Dec 30 05:18:14 host sshd[4731]: Failed password for invalid user alpha from 202.47.118.117 port 45612 ssh2 Dec 30 05:18:14 host sshd[4731]: Received disconnect from 202.47.118.117 port 45612:11: Bye Bye [preauth] Dec 30 05:18:14 host sshd[4731]: Disconnected from 202.47.118.117 port 45612 [preauth] Dec 30 05:18:18 host sshd[4755]: User root from 68.183.179.188 not allowed because not listed in AllowUsers Dec 30 05:18:18 host sshd[4755]: input_userauth_request: invalid user root [preauth] Dec 30 05:18:18 host unix_chkpwd[4757]: password check failed for user (root) Dec 30 05:18:18 host sshd[4755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.179.188 user=root Dec 30 05:18:18 host sshd[4755]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 05:18:20 host sshd[4755]: Failed password for invalid user root from 68.183.179.188 port 38660 ssh2 Dec 30 05:18:21 host sshd[4796]: Invalid user sir from 165.22.99.177 port 56744 Dec 30 05:18:21 host sshd[4796]: input_userauth_request: invalid user sir [preauth] Dec 30 05:18:21 host sshd[4796]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:18:21 host sshd[4796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.99.177 Dec 30 05:18:22 host sshd[4796]: Failed password for invalid user sir from 165.22.99.177 port 56744 ssh2 Dec 30 05:18:22 host sshd[4796]: Received disconnect from 165.22.99.177 port 56744:11: Bye Bye [preauth] Dec 30 05:18:22 host sshd[4796]: Disconnected from 165.22.99.177 port 56744 [preauth] Dec 30 05:18:48 host sshd[4849]: User root from 41.242.141.201 not allowed because not listed in AllowUsers Dec 30 05:18:48 host sshd[4849]: input_userauth_request: invalid user root [preauth] Dec 30 05:18:48 host unix_chkpwd[4852]: password check failed for user (root) Dec 30 05:18:48 host sshd[4849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.242.141.201 user=root Dec 30 05:18:48 host sshd[4849]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 05:18:50 host sshd[4849]: Failed password for invalid user root from 41.242.141.201 port 43844 ssh2 Dec 30 05:18:51 host sshd[4849]: Received disconnect from 41.242.141.201 port 43844:11: Bye Bye [preauth] Dec 30 05:18:51 host sshd[4849]: Disconnected from 41.242.141.201 port 43844 [preauth] Dec 30 05:18:52 host sshd[4857]: User root from 23.96.83.144 not allowed because not listed in AllowUsers Dec 30 05:18:52 host sshd[4857]: input_userauth_request: invalid user root [preauth] Dec 30 05:18:52 host unix_chkpwd[4860]: password check failed for user (root) Dec 30 05:18:52 host sshd[4857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.96.83.144 user=root Dec 30 05:18:52 host sshd[4857]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 05:18:54 host sshd[4857]: Failed password for invalid user root from 23.96.83.144 port 49268 ssh2 Dec 30 05:18:54 host sshd[4857]: Received disconnect from 23.96.83.144 port 49268:11: Bye Bye [preauth] Dec 30 05:18:54 host sshd[4857]: Disconnected from 23.96.83.144 port 49268 [preauth] Dec 30 05:18:54 host sshd[4862]: Invalid user brainy from 137.184.81.127 port 59076 Dec 30 05:18:54 host sshd[4862]: input_userauth_request: invalid user brainy [preauth] Dec 30 05:18:54 host sshd[4862]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:18:54 host sshd[4862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.81.127 Dec 30 05:18:56 host sshd[4862]: Failed password for invalid user brainy from 137.184.81.127 port 59076 ssh2 Dec 30 05:18:56 host sshd[4862]: Received disconnect from 137.184.81.127 port 59076:11: Bye Bye [preauth] Dec 30 05:18:56 host sshd[4862]: Disconnected from 137.184.81.127 port 59076 [preauth] Dec 30 05:19:08 host sshd[4938]: User root from 107.172.201.220 not allowed because not listed in AllowUsers Dec 30 05:19:08 host sshd[4938]: input_userauth_request: invalid user root [preauth] Dec 30 05:19:08 host unix_chkpwd[4942]: password check failed for user (root) Dec 30 05:19:08 host sshd[4938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.172.201.220 user=root Dec 30 05:19:08 host sshd[4938]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 05:19:11 host sshd[4938]: Failed password for invalid user root from 107.172.201.220 port 42240 ssh2 Dec 30 05:19:11 host sshd[4938]: Received disconnect from 107.172.201.220 port 42240:11: Bye Bye [preauth] Dec 30 05:19:11 host sshd[4938]: Disconnected from 107.172.201.220 port 42240 [preauth] Dec 30 05:19:22 host sshd[4992]: User root from 159.223.53.3 not allowed because not listed in AllowUsers Dec 30 05:19:22 host sshd[4992]: input_userauth_request: invalid user root [preauth] Dec 30 05:19:22 host unix_chkpwd[4995]: password check failed for user (root) Dec 30 05:19:22 host sshd[4992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.53.3 user=root Dec 30 05:19:22 host sshd[4992]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 05:19:24 host sshd[4992]: Failed password for invalid user root from 159.223.53.3 port 34631 ssh2 Dec 30 05:19:24 host sshd[4992]: Received disconnect from 159.223.53.3 port 34631:11: Bye Bye [preauth] Dec 30 05:19:24 host sshd[4992]: Disconnected from 159.223.53.3 port 34631 [preauth] Dec 30 05:19:37 host sshd[5063]: Invalid user username from 193.169.255.30 port 56192 Dec 30 05:19:37 host sshd[5063]: input_userauth_request: invalid user username [preauth] Dec 30 05:19:37 host sshd[5063]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:19:37 host sshd[5063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.169.255.30 Dec 30 05:19:39 host sshd[5069]: User root from 202.47.118.117 not allowed because not listed in AllowUsers Dec 30 05:19:39 host sshd[5069]: input_userauth_request: invalid user root [preauth] Dec 30 05:19:39 host unix_chkpwd[5071]: password check failed for user (root) Dec 30 05:19:39 host sshd[5069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.47.118.117 user=root Dec 30 05:19:39 host sshd[5069]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 05:19:39 host sshd[5063]: Failed password for invalid user username from 193.169.255.30 port 56192 ssh2 Dec 30 05:19:40 host sshd[5069]: Failed password for invalid user root from 202.47.118.117 port 41436 ssh2 Dec 30 05:19:40 host sshd[5069]: Received disconnect from 202.47.118.117 port 41436:11: Bye Bye [preauth] Dec 30 05:19:40 host sshd[5069]: Disconnected from 202.47.118.117 port 41436 [preauth] Dec 30 05:19:42 host sshd[5063]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:19:44 host sshd[5063]: Failed password for invalid user username from 193.169.255.30 port 56192 ssh2 Dec 30 05:19:46 host sshd[5116]: User root from 152.228.164.249 not allowed because not listed in AllowUsers Dec 30 05:19:46 host sshd[5116]: input_userauth_request: invalid user root [preauth] Dec 30 05:19:46 host unix_chkpwd[5119]: password check failed for user (root) Dec 30 05:19:46 host sshd[5116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.228.164.249 user=root Dec 30 05:19:46 host sshd[5116]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 05:19:47 host sshd[5063]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:19:48 host sshd[5116]: Failed password for invalid user root from 152.228.164.249 port 58720 ssh2 Dec 30 05:19:48 host sshd[5116]: Received disconnect from 152.228.164.249 port 58720:11: Bye Bye [preauth] Dec 30 05:19:48 host sshd[5116]: Disconnected from 152.228.164.249 port 58720 [preauth] Dec 30 05:19:49 host sshd[5063]: Failed password for invalid user username from 193.169.255.30 port 56192 ssh2 Dec 30 05:19:53 host sshd[5063]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:19:54 host sshd[5063]: Failed password for invalid user username from 193.169.255.30 port 56192 ssh2 Dec 30 05:19:56 host sshd[5165]: Invalid user leandro from 165.22.99.177 port 57502 Dec 30 05:19:56 host sshd[5165]: input_userauth_request: invalid user leandro [preauth] Dec 30 05:19:56 host sshd[5165]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:19:56 host sshd[5165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.99.177 Dec 30 05:19:57 host sshd[5063]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:19:58 host sshd[5165]: Failed password for invalid user leandro from 165.22.99.177 port 57502 ssh2 Dec 30 05:19:59 host sshd[5165]: Received disconnect from 165.22.99.177 port 57502:11: Bye Bye [preauth] Dec 30 05:19:59 host sshd[5165]: Disconnected from 165.22.99.177 port 57502 [preauth] Dec 30 05:19:59 host sshd[5063]: Failed password for invalid user username from 193.169.255.30 port 56192 ssh2 Dec 30 05:20:29 host sshd[5327]: User root from 209.97.187.12 not allowed because not listed in AllowUsers Dec 30 05:20:29 host sshd[5327]: input_userauth_request: invalid user root [preauth] Dec 30 05:20:29 host unix_chkpwd[5331]: password check failed for user (root) Dec 30 05:20:29 host sshd[5327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.187.12 user=root Dec 30 05:20:29 host sshd[5327]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 05:20:31 host sshd[5327]: Failed password for invalid user root from 209.97.187.12 port 58666 ssh2 Dec 30 05:20:31 host sshd[5327]: Received disconnect from 209.97.187.12 port 58666:11: Bye Bye [preauth] Dec 30 05:20:31 host sshd[5327]: Disconnected from 209.97.187.12 port 58666 [preauth] Dec 30 05:20:46 host sshd[5493]: User root from 197.14.11.24 not allowed because not listed in AllowUsers Dec 30 05:20:46 host sshd[5493]: input_userauth_request: invalid user root [preauth] Dec 30 05:20:46 host unix_chkpwd[5497]: password check failed for user (root) Dec 30 05:20:46 host sshd[5493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.14.11.24 user=root Dec 30 05:20:46 host sshd[5493]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 05:20:48 host sshd[5493]: Failed password for invalid user root from 197.14.11.24 port 49157 ssh2 Dec 30 05:20:48 host sshd[5493]: Received disconnect from 197.14.11.24 port 49157:11: Bye Bye [preauth] Dec 30 05:20:48 host sshd[5493]: Disconnected from 197.14.11.24 port 49157 [preauth] Dec 30 05:20:51 host sshd[5541]: Invalid user sga from 122.165.93.92 port 50370 Dec 30 05:20:51 host sshd[5541]: input_userauth_request: invalid user sga [preauth] Dec 30 05:20:51 host sshd[5541]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:20:51 host sshd[5541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.165.93.92 Dec 30 05:20:53 host sshd[5541]: Failed password for invalid user sga from 122.165.93.92 port 50370 ssh2 Dec 30 05:20:53 host sshd[5541]: Received disconnect from 122.165.93.92 port 50370:11: Bye Bye [preauth] Dec 30 05:20:53 host sshd[5541]: Disconnected from 122.165.93.92 port 50370 [preauth] Dec 30 05:21:03 host sshd[5583]: Invalid user admin from 137.184.81.127 port 37912 Dec 30 05:21:03 host sshd[5583]: input_userauth_request: invalid user admin [preauth] Dec 30 05:21:03 host sshd[5583]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:21:03 host sshd[5583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.81.127 Dec 30 05:21:06 host sshd[5583]: Failed password for invalid user admin from 137.184.81.127 port 37912 ssh2 Dec 30 05:21:06 host sshd[5583]: Received disconnect from 137.184.81.127 port 37912:11: Bye Bye [preauth] Dec 30 05:21:06 host sshd[5583]: Disconnected from 137.184.81.127 port 37912 [preauth] Dec 30 05:21:15 host sshd[5605]: Invalid user soft from 157.245.152.31 port 36700 Dec 30 05:21:15 host sshd[5605]: input_userauth_request: invalid user soft [preauth] Dec 30 05:21:15 host sshd[5605]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:21:15 host sshd[5605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.152.31 Dec 30 05:21:17 host sshd[5605]: Failed password for invalid user soft from 157.245.152.31 port 36700 ssh2 Dec 30 05:21:17 host sshd[5605]: Received disconnect from 157.245.152.31 port 36700:11: Bye Bye [preauth] Dec 30 05:21:17 host sshd[5605]: Disconnected from 157.245.152.31 port 36700 [preauth] Dec 30 05:21:46 host sshd[5677]: Invalid user sinusbot from 211.252.87.118 port 43604 Dec 30 05:21:46 host sshd[5677]: input_userauth_request: invalid user sinusbot [preauth] Dec 30 05:21:46 host sshd[5677]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:21:46 host sshd[5677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.252.87.118 Dec 30 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 30 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 30 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 30 05:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 30 05:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 30 05:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 30 05:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 30 05:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 30 05:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:47 host sshd[5677]: Failed password for invalid user sinusbot from 211.252.87.118 port 43604 ssh2 Dec 30 05:21:48 host sshd[5677]: Received disconnect from 211.252.87.118 port 43604:11: Bye Bye [preauth] Dec 30 05:21:48 host sshd[5677]: Disconnected from 211.252.87.118 port 43604 [preauth] Dec 30 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 05:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 30 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwevmhonda user-2=bonifacegroup user-3=wwwletsstalkfood user-4=straightcurve user-5=phmetals user-6=kottayamcalldriv user-7=palco123 user-8=gifterman user-9=wwwnexidigital user-10=mrsclean user-11=wwwkmaorg user-12=disposeat user-13=remysagr user-14=woodpeck user-15=wwwkapin user-16=shalinijames user-17=wwwtestugo user-18=vfmassets user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=ugotscom user-23=keralaholi user-24=wwwresourcehunte user-25=wwwrmswll user-26=cochintaxi user-27=wwwkaretakers user-28=a2zgroup user-29=dartsimp user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 30 05:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 30 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 30 05:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 05:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=evmhonda.com --output=json Dec 30 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/test -e /home/wwwevmhonda/wordpress-backups Dec 30 05:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 30 05:21:49 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 30 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && find -H /home/wwwevmhonda/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 30 05:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 30 05:21:49 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 30 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=letsstalkfood.com --output=json Dec 30 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/wordpress-backups Dec 30 05:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 05:21:49 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && find -H /home/wwwletsstalkfood/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 30 05:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 05:21:49 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=mrsclean.co.in --output=json Dec 30 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Dec 30 05:21:49 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 30 05:21:49 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 30 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 30 05:21:49 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 30 05:21:49 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 30 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Dec 30 05:21:49 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 30 05:21:49 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 30 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 30 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=shalinijames.com --output=json Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/wordpress-backups Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && find -H /home/shalinijames/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=testugo.in --output=json Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=ugotechnologies.com --output=json Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=woodpeckerindia.com --output=json Dec 30 05:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/wordpress-backups Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 30 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && find -H /home/woodpeck/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 30 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=panlys.com --output=json Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/wordpress-backups Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 30 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && find -H /home/palco123/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 30 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=resourcehunters.com --output=json Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/wordpress-backups Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && find -H /home/wwwresourcehunte/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /var/cpanel/licenseid_credentials.json Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/cat /home/wwwevmhonda/.wp-toolkit-identifier Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 30 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=bonifacegroup ; COMMAND=/bin/cat /home/bonifacegroup/.wp-toolkit-identifier Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session opened for user bonifacegroup by (uid=0) Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session closed for user bonifacegroup Dec 30 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/cat /home/wwwletsstalkfood/.wp-toolkit-identifier Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=straightcurve ; COMMAND=/bin/cat /home/straightcurve/.wp-toolkit-identifier Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session opened for user straightcurve by (uid=0) Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session closed for user straightcurve Dec 30 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=phmetals ; COMMAND=/bin/cat /home/phmetals/.wp-toolkit-identifier Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session opened for user phmetals by (uid=0) Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session closed for user phmetals Dec 30 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=kottayamcalldriv ; COMMAND=/bin/cat /home/kottayamcalldriv/.wp-toolkit-identifier Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session opened for user kottayamcalldriv by (uid=0) Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session closed for user kottayamcalldriv Dec 30 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/cat /home/palco123/.wp-toolkit-identifier Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 30 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=gifterman ; COMMAND=/bin/cat /home/gifterman/.wp-toolkit-identifier Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session opened for user gifterman by (uid=0) Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session closed for user gifterman Dec 30 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwnexidigital ; COMMAND=/bin/cat /home/wwwnexidigital/.wp-toolkit-identifier Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwnexidigital by (uid=0) Dec 30 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwnexidigital Dec 30 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/.wp-toolkit-identifier Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 30 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkmaorg ; COMMAND=/bin/cat /home/wwwkmaorg/.wp-toolkit-identifier Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwkmaorg by (uid=0) Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwkmaorg Dec 30 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=disposeat ; COMMAND=/bin/cat /home/disposeat/.wp-toolkit-identifier Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session opened for user disposeat by (uid=0) Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session closed for user disposeat Dec 30 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=remysagr ; COMMAND=/bin/cat /home/remysagr/.wp-toolkit-identifier Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session opened for user remysagr by (uid=0) Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session closed for user remysagr Dec 30 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/cat /home/woodpeck/.wp-toolkit-identifier Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 30 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkapin ; COMMAND=/bin/cat /home/wwwkapin/.wp-toolkit-identifier Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwkapin by (uid=0) Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwkapin Dec 30 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/cat /home/shalinijames/.wp-toolkit-identifier Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/cat /home/wwwtestugo/.wp-toolkit-identifier Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=vfmassets ; COMMAND=/bin/cat /home/vfmassets/.wp-toolkit-identifier Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session opened for user vfmassets by (uid=0) Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session closed for user vfmassets Dec 30 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=pmcresources ; COMMAND=/bin/cat /home/pmcresources/.wp-toolkit-identifier Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session opened for user pmcresources by (uid=0) Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session closed for user pmcresources Dec 30 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwpmcresource ; COMMAND=/bin/cat /home/wwwpmcresource/.wp-toolkit-identifier Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwpmcresource by (uid=0) Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwpmcresource Dec 30 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=travelboniface ; COMMAND=/bin/cat /home/travelboniface/.wp-toolkit-identifier Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session opened for user travelboniface by (uid=0) Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session closed for user travelboniface Dec 30 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 30 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 30 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-YONj6H06b35WNAF0.wp-toolkit-identifier Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 30 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-YONj6H06b35WNAF0.wp-toolkit-identifier Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 30 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/cat /home/wwwresourcehunte/.wp-toolkit-identifier Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwrmswll ; COMMAND=/bin/cat /home/wwwrmswll/.wp-toolkit-identifier Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwrmswll by (uid=0) Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwrmswll Dec 30 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=cochintaxi ; COMMAND=/bin/cat /home/cochintaxi/.wp-toolkit-identifier Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session opened for user cochintaxi by (uid=0) Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session closed for user cochintaxi Dec 30 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkaretakers ; COMMAND=/bin/cat /home/wwwkaretakers/.wp-toolkit-identifier Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwkaretakers by (uid=0) Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwkaretakers Dec 30 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=a2zgroup ; COMMAND=/bin/cat /home/a2zgroup/.wp-toolkit-identifier Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session opened for user a2zgroup by (uid=0) Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session closed for user a2zgroup Dec 30 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=dartsimp ; COMMAND=/bin/cat /home/dartsimp/.wp-toolkit-identifier Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session opened for user dartsimp by (uid=0) Dec 30 05:21:52 host sudo: pam_unix(sudo:session): session closed for user dartsimp Dec 30 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=laundryboniface ; COMMAND=/bin/cat /home/laundryboniface/.wp-toolkit-identifier Dec 30 05:21:53 host sudo: pam_unix(sudo:session): session opened for user laundryboniface by (uid=0) Dec 30 05:21:53 host sudo: pam_unix(sudo:session): session closed for user laundryboniface Dec 30 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Dec 30 05:21:53 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 30 05:21:53 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 30 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Dec 30 05:21:53 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 30 05:21:53 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 30 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-dDG877DjjpxvN82m.wp-toolkit-identifier Dec 30 05:21:53 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 30 05:21:53 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 30 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-dDG877DjjpxvN82m.wp-toolkit-identifier Dec 30 05:21:53 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 30 05:21:53 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 30 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_shared_ip --output=json Dec 30 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_public_ip ip=167.71.234.10 --output=json Dec 30 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fR0Qv30ifwfYqxHW.~ Dec 30 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fR0Qv30ifwfYqxHW.~' Dec 30 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fR0Qv30ifwfYqxHW.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 30 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 30 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 30 05:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 30 05:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 30 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 30 05:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 05:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 30 05:22:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 05:22:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 30 05:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 05:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 30 05:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 05:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 30 05:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 05:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 05:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 30 05:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 05:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 05:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 30 05:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 05:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 05:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 30 05:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 05:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 05:22:15 host sshd[6393]: Invalid user test from 137.184.81.127 port 38376 Dec 30 05:22:15 host sshd[6393]: input_userauth_request: invalid user test [preauth] Dec 30 05:22:15 host sshd[6393]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:22:15 host sshd[6393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.81.127 Dec 30 05:22:17 host sshd[6393]: Failed password for invalid user test from 137.184.81.127 port 38376 ssh2 Dec 30 05:22:17 host sshd[6393]: Received disconnect from 137.184.81.127 port 38376:11: Bye Bye [preauth] Dec 30 05:22:17 host sshd[6393]: Disconnected from 137.184.81.127 port 38376 [preauth] Dec 30 05:22:18 host sshd[6400]: Invalid user testftp from 190.191.28.41 port 45397 Dec 30 05:22:18 host sshd[6400]: input_userauth_request: invalid user testftp [preauth] Dec 30 05:22:18 host sshd[6400]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:22:18 host sshd[6400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.191.28.41 Dec 30 05:22:20 host sshd[6400]: Failed password for invalid user testftp from 190.191.28.41 port 45397 ssh2 Dec 30 05:22:20 host sshd[6400]: Received disconnect from 190.191.28.41 port 45397:11: Bye Bye [preauth] Dec 30 05:22:20 host sshd[6400]: Disconnected from 190.191.28.41 port 45397 [preauth] Dec 30 05:22:24 host sshd[6470]: Invalid user li from 122.165.93.92 port 50808 Dec 30 05:22:24 host sshd[6470]: input_userauth_request: invalid user li [preauth] Dec 30 05:22:24 host sshd[6470]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:22:24 host sshd[6470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.165.93.92 Dec 30 05:22:26 host sshd[6470]: Failed password for invalid user li from 122.165.93.92 port 50808 ssh2 Dec 30 05:22:26 host sshd[6470]: Received disconnect from 122.165.93.92 port 50808:11: Bye Bye [preauth] Dec 30 05:22:26 host sshd[6470]: Disconnected from 122.165.93.92 port 50808 [preauth] Dec 30 05:22:45 host sshd[6529]: Invalid user li from 157.245.152.31 port 44600 Dec 30 05:22:45 host sshd[6529]: input_userauth_request: invalid user li [preauth] Dec 30 05:22:45 host sshd[6529]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:22:45 host sshd[6529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.152.31 Dec 30 05:22:47 host sshd[6529]: Failed password for invalid user li from 157.245.152.31 port 44600 ssh2 Dec 30 05:22:47 host sshd[6529]: Received disconnect from 157.245.152.31 port 44600:11: Bye Bye [preauth] Dec 30 05:22:47 host sshd[6529]: Disconnected from 157.245.152.31 port 44600 [preauth] Dec 30 05:23:58 host sshd[6755]: Invalid user bocloud from 190.191.28.41 port 33140 Dec 30 05:23:58 host sshd[6755]: input_userauth_request: invalid user bocloud [preauth] Dec 30 05:23:58 host sshd[6755]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:23:58 host sshd[6755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.191.28.41 Dec 30 05:24:00 host sshd[6755]: Failed password for invalid user bocloud from 190.191.28.41 port 33140 ssh2 Dec 30 05:24:13 host sshd[6815]: Invalid user oracle from 23.96.83.144 port 45922 Dec 30 05:24:13 host sshd[6815]: input_userauth_request: invalid user oracle [preauth] Dec 30 05:24:13 host sshd[6815]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:24:13 host sshd[6815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.96.83.144 Dec 30 05:24:16 host sshd[6815]: Failed password for invalid user oracle from 23.96.83.144 port 45922 ssh2 Dec 30 05:24:16 host sshd[6815]: Received disconnect from 23.96.83.144 port 45922:11: Bye Bye [preauth] Dec 30 05:24:16 host sshd[6815]: Disconnected from 23.96.83.144 port 45922 [preauth] Dec 30 05:30:28 host sshd[7862]: Invalid user test from 124.160.96.249 port 27446 Dec 30 05:30:28 host sshd[7862]: input_userauth_request: invalid user test [preauth] Dec 30 05:30:28 host sshd[7862]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:30:28 host sshd[7862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.96.249 Dec 30 05:30:30 host sshd[7862]: Failed password for invalid user test from 124.160.96.249 port 27446 ssh2 Dec 30 05:30:30 host sshd[7862]: Received disconnect from 124.160.96.249 port 27446:11: Bye Bye [preauth] Dec 30 05:30:30 host sshd[7862]: Disconnected from 124.160.96.249 port 27446 [preauth] Dec 30 05:30:57 host sshd[7897]: Invalid user toor from 124.160.96.249 port 40631 Dec 30 05:30:57 host sshd[7897]: input_userauth_request: invalid user toor [preauth] Dec 30 05:30:57 host sshd[7897]: pam_unix(sshd:auth): check pass; user unknown Dec 30 05:30:57 host sshd[7897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.96.249 Dec 30 05:30:59 host sshd[7897]: Failed password for invalid user toor from 124.160.96.249 port 40631 ssh2 Dec 30 05:30:59 host sshd[7897]: Received disconnect from 124.160.96.249 port 40631:11: Bye Bye [preauth] Dec 30 05:30:59 host sshd[7897]: Disconnected from 124.160.96.249 port 40631 [preauth] Dec 30 05:54:12 host sshd[11578]: User root from 162.55.47.218 not allowed because not listed in AllowUsers Dec 30 05:54:12 host sshd[11578]: input_userauth_request: invalid user root [preauth] Dec 30 05:54:12 host unix_chkpwd[11581]: password check failed for user (root) Dec 30 05:54:12 host sshd[11578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.55.47.218 user=root Dec 30 05:54:12 host sshd[11578]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 05:54:14 host sshd[11578]: Failed password for invalid user root from 162.55.47.218 port 38790 ssh2 Dec 30 05:54:15 host sshd[11578]: Received disconnect from 162.55.47.218 port 38790:11: Bye Bye [preauth] Dec 30 05:54:15 host sshd[11578]: Disconnected from 162.55.47.218 port 38790 [preauth] Dec 30 05:54:45 host sshd[11649]: User root from 192.3.139.42 not allowed because not listed in AllowUsers Dec 30 05:54:45 host sshd[11649]: input_userauth_request: invalid user root [preauth] Dec 30 05:54:45 host unix_chkpwd[11653]: password check failed for user (root) Dec 30 05:54:45 host sshd[11649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.139.42 user=root Dec 30 05:54:45 host sshd[11649]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 05:54:47 host sshd[11649]: Failed password for invalid user root from 192.3.139.42 port 48780 ssh2 Dec 30 05:54:47 host sshd[11649]: Received disconnect from 192.3.139.42 port 48780:11: Bye Bye [preauth] Dec 30 05:54:47 host sshd[11649]: Disconnected from 192.3.139.42 port 48780 [preauth] Dec 30 05:55:33 host sshd[11787]: User root from 143.110.188.7 not allowed because not listed in AllowUsers Dec 30 05:55:33 host sshd[11787]: input_userauth_request: invalid user root [preauth] Dec 30 05:55:33 host unix_chkpwd[11789]: password check failed for user (root) Dec 30 05:55:33 host sshd[11787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.188.7 user=root Dec 30 05:55:33 host sshd[11787]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 05:55:35 host sshd[11787]: Failed password for invalid user root from 143.110.188.7 port 59194 ssh2 Dec 30 05:55:35 host sshd[11787]: Received disconnect from 143.110.188.7 port 59194:11: Bye Bye [preauth] Dec 30 05:55:35 host sshd[11787]: Disconnected from 143.110.188.7 port 59194 [preauth] Dec 30 05:55:52 host sshd[11822]: User root from 128.199.90.73 not allowed because not listed in AllowUsers Dec 30 05:55:52 host sshd[11822]: input_userauth_request: invalid user root [preauth] Dec 30 05:55:52 host unix_chkpwd[11824]: password check failed for user (root) Dec 30 05:55:52 host sshd[11822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.90.73 user=root Dec 30 05:55:52 host sshd[11822]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 05:55:54 host sshd[11822]: Failed password for invalid user root from 128.199.90.73 port 58020 ssh2 Dec 30 05:55:54 host sshd[11822]: Received disconnect from 128.199.90.73 port 58020:11: Bye Bye [preauth] Dec 30 05:55:54 host sshd[11822]: Disconnected from 128.199.90.73 port 58020 [preauth] Dec 30 05:56:12 host sshd[11866]: User root from 197.5.145.102 not allowed because not listed in AllowUsers Dec 30 05:56:12 host sshd[11866]: input_userauth_request: invalid user root [preauth] Dec 30 05:56:12 host unix_chkpwd[11875]: password check failed for user (root) Dec 30 05:56:12 host sshd[11866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.102 user=root Dec 30 05:56:12 host sshd[11866]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 05:56:15 host sshd[11866]: Failed password for invalid user root from 197.5.145.102 port 26375 ssh2 Dec 30 05:56:15 host sshd[11866]: Received disconnect from 197.5.145.102 port 26375:11: Bye Bye [preauth] Dec 30 05:56:15 host sshd[11866]: Disconnected from 197.5.145.102 port 26375 [preauth] Dec 30 05:56:35 host sshd[11938]: User root from 143.110.188.7 not allowed because not listed in AllowUsers Dec 30 05:56:35 host sshd[11938]: input_userauth_request: invalid user root [preauth] Dec 30 05:56:35 host unix_chkpwd[11940]: password check failed for user (root) Dec 30 05:56:35 host sshd[11938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.188.7 user=root Dec 30 05:56:35 host sshd[11938]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 05:56:38 host sshd[11938]: Failed password for invalid user root from 143.110.188.7 port 42752 ssh2 Dec 30 05:56:38 host sshd[11938]: Received disconnect from 143.110.188.7 port 42752:11: Bye Bye [preauth] Dec 30 05:56:38 host sshd[11938]: Disconnected from 143.110.188.7 port 42752 [preauth] Dec 30 05:56:42 host sshd[12031]: User root from 104.131.249.57 not allowed because not listed in AllowUsers Dec 30 05:56:42 host sshd[12031]: input_userauth_request: invalid user root [preauth] Dec 30 05:56:43 host unix_chkpwd[12050]: password check failed for user (root) Dec 30 05:56:43 host sshd[12031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.249.57 user=root Dec 30 05:56:43 host sshd[12031]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 05:56:44 host sshd[12031]: Failed password for invalid user root from 104.131.249.57 port 36955 ssh2 Dec 30 05:56:44 host sshd[12031]: Received disconnect from 104.131.249.57 port 36955:11: Bye Bye [preauth] Dec 30 05:56:44 host sshd[12031]: Disconnected from 104.131.249.57 port 36955 [preauth] Dec 30 05:56:55 host sshd[12111]: User root from 192.99.247.60 not allowed because not listed in AllowUsers Dec 30 05:56:55 host sshd[12111]: input_userauth_request: invalid user root [preauth] Dec 30 05:56:55 host unix_chkpwd[12116]: password check failed for user (root) Dec 30 05:56:55 host sshd[12111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.247.60 user=root Dec 30 05:56:55 host sshd[12111]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 05:56:57 host sshd[12111]: Failed password for invalid user root from 192.99.247.60 port 49772 ssh2 Dec 30 05:56:57 host sshd[12111]: Received disconnect from 192.99.247.60 port 49772:11: Bye Bye [preauth] Dec 30 05:56:57 host sshd[12111]: Disconnected from 192.99.247.60 port 49772 [preauth] Dec 30 05:57:12 host sshd[12162]: User root from 201.163.162.179 not allowed because not listed in AllowUsers Dec 30 05:57:12 host sshd[12162]: input_userauth_request: invalid user root [preauth] Dec 30 05:57:12 host unix_chkpwd[12165]: password check failed for user (root) Dec 30 05:57:12 host sshd[12162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.163.162.179 user=root Dec 30 05:57:12 host sshd[12162]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 05:57:14 host sshd[12162]: Failed password for invalid user root from 201.163.162.179 port 34842 ssh2 Dec 30 05:57:14 host sshd[12162]: Received disconnect from 201.163.162.179 port 34842:11: Bye Bye [preauth] Dec 30 05:57:14 host sshd[12162]: Disconnected from 201.163.162.179 port 34842 [preauth] Dec 30 05:58:36 host sshd[12379]: User root from 211.44.198.209 not allowed because not listed in AllowUsers Dec 30 05:58:36 host sshd[12379]: input_userauth_request: invalid user root [preauth] Dec 30 05:58:36 host unix_chkpwd[12383]: password check failed for user (root) Dec 30 05:58:36 host sshd[12379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.44.198.209 user=root Dec 30 05:58:36 host sshd[12379]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 05:58:37 host sshd[12379]: Failed password for invalid user root from 211.44.198.209 port 31141 ssh2 Dec 30 05:58:38 host sshd[12379]: Received disconnect from 211.44.198.209 port 31141:11: Bye Bye [preauth] Dec 30 05:58:38 host sshd[12379]: Disconnected from 211.44.198.209 port 31141 [preauth] Dec 30 05:59:25 host sshd[12538]: User root from 192.3.139.42 not allowed because not listed in AllowUsers Dec 30 05:59:25 host sshd[12538]: input_userauth_request: invalid user root [preauth] Dec 30 05:59:25 host unix_chkpwd[12547]: password check failed for user (root) Dec 30 05:59:25 host sshd[12538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.139.42 user=root Dec 30 05:59:25 host sshd[12538]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 05:59:25 host sshd[12542]: User root from 162.55.47.218 not allowed because not listed in AllowUsers Dec 30 05:59:25 host sshd[12542]: input_userauth_request: invalid user root [preauth] Dec 30 05:59:25 host unix_chkpwd[12548]: password check failed for user (root) Dec 30 05:59:25 host sshd[12542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.55.47.218 user=root Dec 30 05:59:25 host sshd[12542]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 05:59:27 host sshd[12538]: Failed password for invalid user root from 192.3.139.42 port 45500 ssh2 Dec 30 05:59:27 host sshd[12542]: Failed password for invalid user root from 162.55.47.218 port 38274 ssh2 Dec 30 05:59:27 host sshd[12538]: Received disconnect from 192.3.139.42 port 45500:11: Bye Bye [preauth] Dec 30 05:59:27 host sshd[12538]: Disconnected from 192.3.139.42 port 45500 [preauth] Dec 30 05:59:27 host sshd[12542]: Received disconnect from 162.55.47.218 port 38274:11: Bye Bye [preauth] Dec 30 05:59:27 host sshd[12542]: Disconnected from 162.55.47.218 port 38274 [preauth] Dec 30 05:59:55 host sshd[12674]: User root from 192.99.247.60 not allowed because not listed in AllowUsers Dec 30 05:59:55 host sshd[12674]: input_userauth_request: invalid user root [preauth] Dec 30 05:59:55 host unix_chkpwd[12680]: password check failed for user (root) Dec 30 05:59:55 host sshd[12674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.247.60 user=root Dec 30 05:59:55 host sshd[12674]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 05:59:58 host sshd[12674]: Failed password for invalid user root from 192.99.247.60 port 50178 ssh2 Dec 30 05:59:58 host sshd[12674]: Received disconnect from 192.99.247.60 port 50178:11: Bye Bye [preauth] Dec 30 05:59:58 host sshd[12674]: Disconnected from 192.99.247.60 port 50178 [preauth] Dec 30 06:00:04 host sshd[12765]: User root from 197.5.145.102 not allowed because not listed in AllowUsers Dec 30 06:00:04 host sshd[12765]: input_userauth_request: invalid user root [preauth] Dec 30 06:00:04 host unix_chkpwd[12768]: password check failed for user (root) Dec 30 06:00:04 host sshd[12765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.102 user=root Dec 30 06:00:04 host sshd[12765]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 06:00:06 host sshd[12765]: Failed password for invalid user root from 197.5.145.102 port 26376 ssh2 Dec 30 06:00:27 host sshd[12868]: User root from 128.199.90.73 not allowed because not listed in AllowUsers Dec 30 06:00:27 host sshd[12868]: input_userauth_request: invalid user root [preauth] Dec 30 06:00:27 host unix_chkpwd[12871]: password check failed for user (root) Dec 30 06:00:27 host sshd[12868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.90.73 user=root Dec 30 06:00:27 host sshd[12868]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 06:00:29 host sshd[12868]: Failed password for invalid user root from 128.199.90.73 port 49982 ssh2 Dec 30 06:00:29 host sshd[12868]: Received disconnect from 128.199.90.73 port 49982:11: Bye Bye [preauth] Dec 30 06:00:29 host sshd[12868]: Disconnected from 128.199.90.73 port 49982 [preauth] Dec 30 06:00:41 host sshd[12920]: User root from 211.44.198.209 not allowed because not listed in AllowUsers Dec 30 06:00:41 host sshd[12920]: input_userauth_request: invalid user root [preauth] Dec 30 06:00:41 host unix_chkpwd[12924]: password check failed for user (root) Dec 30 06:00:41 host sshd[12920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.44.198.209 user=root Dec 30 06:00:41 host sshd[12920]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 06:00:43 host sshd[12920]: Failed password for invalid user root from 211.44.198.209 port 38170 ssh2 Dec 30 06:00:43 host sshd[12920]: Received disconnect from 211.44.198.209 port 38170:11: Bye Bye [preauth] Dec 30 06:00:43 host sshd[12920]: Disconnected from 211.44.198.209 port 38170 [preauth] Dec 30 06:00:55 host sshd[12968]: User root from 201.163.162.179 not allowed because not listed in AllowUsers Dec 30 06:00:55 host sshd[12968]: input_userauth_request: invalid user root [preauth] Dec 30 06:00:55 host unix_chkpwd[12972]: password check failed for user (root) Dec 30 06:00:55 host sshd[12968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.163.162.179 user=root Dec 30 06:00:55 host sshd[12968]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 06:00:57 host sshd[12968]: Failed password for invalid user root from 201.163.162.179 port 47080 ssh2 Dec 30 06:01:12 host sshd[13054]: User root from 165.154.253.219 not allowed because not listed in AllowUsers Dec 30 06:01:12 host sshd[13054]: input_userauth_request: invalid user root [preauth] Dec 30 06:01:12 host unix_chkpwd[13057]: password check failed for user (root) Dec 30 06:01:12 host sshd[13054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.154.253.219 user=root Dec 30 06:01:12 host sshd[13054]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 06:01:15 host sshd[13054]: Failed password for invalid user root from 165.154.253.219 port 58262 ssh2 Dec 30 06:01:15 host sshd[13054]: Received disconnect from 165.154.253.219 port 58262:11: Bye Bye [preauth] Dec 30 06:01:15 host sshd[13054]: Disconnected from 165.154.253.219 port 58262 [preauth] Dec 30 06:01:59 host sshd[13135]: User root from 104.131.249.57 not allowed because not listed in AllowUsers Dec 30 06:01:59 host sshd[13135]: input_userauth_request: invalid user root [preauth] Dec 30 06:01:59 host unix_chkpwd[13138]: password check failed for user (root) Dec 30 06:01:59 host sshd[13135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.249.57 user=root Dec 30 06:01:59 host sshd[13135]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 06:02:01 host sshd[13135]: Failed password for invalid user root from 104.131.249.57 port 48598 ssh2 Dec 30 06:03:37 host sshd[13530]: User root from 165.154.253.219 not allowed because not listed in AllowUsers Dec 30 06:03:37 host sshd[13530]: input_userauth_request: invalid user root [preauth] Dec 30 06:03:37 host unix_chkpwd[13534]: password check failed for user (root) Dec 30 06:03:37 host sshd[13530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.154.253.219 user=root Dec 30 06:03:37 host sshd[13530]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 06:03:40 host sshd[13530]: Failed password for invalid user root from 165.154.253.219 port 57938 ssh2 Dec 30 06:03:40 host sshd[13530]: Received disconnect from 165.154.253.219 port 57938:11: Bye Bye [preauth] Dec 30 06:03:40 host sshd[13530]: Disconnected from 165.154.253.219 port 57938 [preauth] Dec 30 06:05:08 host sshd[13735]: User root from 112.5.88.63 not allowed because not listed in AllowUsers Dec 30 06:05:08 host sshd[13735]: input_userauth_request: invalid user root [preauth] Dec 30 06:05:08 host unix_chkpwd[13770]: password check failed for user (root) Dec 30 06:05:08 host sshd[13735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.5.88.63 user=root Dec 30 06:05:08 host sshd[13735]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 06:05:10 host sshd[13735]: Failed password for invalid user root from 112.5.88.63 port 39837 ssh2 Dec 30 06:05:10 host sshd[13735]: Received disconnect from 112.5.88.63 port 39837:11: Bye Bye [preauth] Dec 30 06:05:10 host sshd[13735]: Disconnected from 112.5.88.63 port 39837 [preauth] Dec 30 06:06:02 host sshd[13899]: User root from 51.250.77.245 not allowed because not listed in AllowUsers Dec 30 06:06:02 host sshd[13899]: input_userauth_request: invalid user root [preauth] Dec 30 06:06:02 host unix_chkpwd[13905]: password check failed for user (root) Dec 30 06:06:02 host sshd[13899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.77.245 user=root Dec 30 06:06:02 host sshd[13899]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 06:06:04 host sshd[13899]: Failed password for invalid user root from 51.250.77.245 port 57510 ssh2 Dec 30 06:06:04 host sshd[13899]: Received disconnect from 51.250.77.245 port 57510:11: Bye Bye [preauth] Dec 30 06:06:04 host sshd[13899]: Disconnected from 51.250.77.245 port 57510 [preauth] Dec 30 06:06:55 host sshd[14012]: User root from 88.149.212.167 not allowed because not listed in AllowUsers Dec 30 06:06:55 host sshd[14012]: input_userauth_request: invalid user root [preauth] Dec 30 06:06:55 host unix_chkpwd[14016]: password check failed for user (root) Dec 30 06:06:55 host sshd[14012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.149.212.167 user=root Dec 30 06:06:55 host sshd[14012]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 06:06:57 host sshd[14012]: Failed password for invalid user root from 88.149.212.167 port 52706 ssh2 Dec 30 06:06:58 host sshd[14012]: Received disconnect from 88.149.212.167 port 52706:11: Bye Bye [preauth] Dec 30 06:06:58 host sshd[14012]: Disconnected from 88.149.212.167 port 52706 [preauth] Dec 30 06:08:47 host sshd[14393]: User root from 88.149.212.167 not allowed because not listed in AllowUsers Dec 30 06:08:47 host sshd[14393]: input_userauth_request: invalid user root [preauth] Dec 30 06:08:47 host unix_chkpwd[14397]: password check failed for user (root) Dec 30 06:08:47 host sshd[14393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.149.212.167 user=root Dec 30 06:08:47 host sshd[14393]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 06:08:48 host sshd[14393]: Failed password for invalid user root from 88.149.212.167 port 52628 ssh2 Dec 30 06:08:49 host sshd[14393]: Received disconnect from 88.149.212.167 port 52628:11: Bye Bye [preauth] Dec 30 06:08:49 host sshd[14393]: Disconnected from 88.149.212.167 port 52628 [preauth] Dec 30 06:09:51 host sshd[14596]: User root from 51.250.77.245 not allowed because not listed in AllowUsers Dec 30 06:09:51 host sshd[14596]: input_userauth_request: invalid user root [preauth] Dec 30 06:09:51 host unix_chkpwd[14603]: password check failed for user (root) Dec 30 06:09:51 host sshd[14596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.77.245 user=root Dec 30 06:09:51 host sshd[14596]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 06:09:54 host sshd[14596]: Failed password for invalid user root from 51.250.77.245 port 36856 ssh2 Dec 30 06:09:54 host sshd[14596]: Received disconnect from 51.250.77.245 port 36856:11: Bye Bye [preauth] Dec 30 06:09:54 host sshd[14596]: Disconnected from 51.250.77.245 port 36856 [preauth] Dec 30 06:14:32 host sshd[15456]: User root from 112.5.88.63 not allowed because not listed in AllowUsers Dec 30 06:14:32 host sshd[15456]: input_userauth_request: invalid user root [preauth] Dec 30 06:14:32 host unix_chkpwd[15499]: password check failed for user (root) Dec 30 06:14:32 host sshd[15456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.5.88.63 user=root Dec 30 06:14:32 host sshd[15456]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 06:14:34 host sshd[15456]: Failed password for invalid user root from 112.5.88.63 port 22579 ssh2 Dec 30 06:14:36 host sshd[15456]: Received disconnect from 112.5.88.63 port 22579:11: Bye Bye [preauth] Dec 30 06:14:36 host sshd[15456]: Disconnected from 112.5.88.63 port 22579 [preauth] Dec 30 06:14:56 host sshd[15589]: Connection closed by 172.105.128.12 port 38284 [preauth] Dec 30 06:14:58 host sshd[15595]: Connection closed by 172.105.128.12 port 64318 [preauth] Dec 30 06:15:00 host sshd[15600]: Connection closed by 172.105.128.12 port 64326 [preauth] Dec 30 06:20:47 host sshd[16681]: Invalid user user1 from 162.218.126.136 port 33874 Dec 30 06:20:47 host sshd[16681]: input_userauth_request: invalid user user1 [preauth] Dec 30 06:20:47 host sshd[16681]: pam_unix(sshd:auth): check pass; user unknown Dec 30 06:20:47 host sshd[16681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 30 06:20:49 host sshd[16681]: Failed password for invalid user user1 from 162.218.126.136 port 33874 ssh2 Dec 30 06:20:49 host sshd[16681]: Connection closed by 162.218.126.136 port 33874 [preauth] Dec 30 06:20:49 host sshd[16690]: Invalid user mas from 103.13.40.2 port 44806 Dec 30 06:20:49 host sshd[16690]: input_userauth_request: invalid user mas [preauth] Dec 30 06:20:49 host sshd[16690]: pam_unix(sshd:auth): check pass; user unknown Dec 30 06:20:49 host sshd[16690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 30 06:20:52 host sshd[16690]: Failed password for invalid user mas from 103.13.40.2 port 44806 ssh2 Dec 30 06:20:52 host sshd[16690]: Connection closed by 103.13.40.2 port 44806 [preauth] Dec 30 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 30 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 06:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 06:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 30 06:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 06:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 06:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 30 06:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 06:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 06:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 30 06:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 06:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 06:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 30 06:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 06:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 06:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 30 06:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 06:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 06:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 30 06:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 06:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 06:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 30 06:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 06:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 30 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=woodpeck user-2=wwwkapin user-3=wwwkmaorg user-4=disposeat user-5=remysagr user-6=pmcresources user-7=vfmassets user-8=wwwtestugo user-9=shalinijames user-10=wwwletsstalkfood user-11=straightcurve user-12=bonifacegroup user-13=wwwevmhonda user-14=mrsclean user-15=wwwnexidigital user-16=gifterman user-17=palco123 user-18=kottayamcalldriv user-19=phmetals user-20=cochintaxi user-21=wwwkaretakers user-22=laundryboniface user-23=dartsimp user-24=a2zgroup user-25=wwwpmcresource user-26=wwwrmswll user-27=keralaholi user-28=wwwresourcehunte user-29=ugotscom user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 30 06:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 30 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cD4BToK6hikpFvxR.~ Dec 30 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cD4BToK6hikpFvxR.~' Dec 30 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cD4BToK6hikpFvxR.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 30 06:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 06:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 06:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 30 06:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 06:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 06:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 06:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 06:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 06:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 06:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 06:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 06:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 06:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 06:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 06:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 30 06:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 06:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 06:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 06:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 06:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 30 06:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 30 06:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 30 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 30 06:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 06:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 30 06:21:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 06:21:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 06:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 30 06:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 06:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 30 06:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 06:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 06:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 30 06:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 06:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 06:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 30 06:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 06:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 06:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 30 06:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 06:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 06:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 30 06:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 06:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 06:29:00 host sshd[18102]: Invalid user lll from 41.197.31.178 port 36160 Dec 30 06:29:00 host sshd[18102]: input_userauth_request: invalid user lll [preauth] Dec 30 06:29:00 host sshd[18102]: pam_unix(sshd:auth): check pass; user unknown Dec 30 06:29:00 host sshd[18102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 30 06:29:02 host sshd[18102]: Failed password for invalid user lll from 41.197.31.178 port 36160 ssh2 Dec 30 06:29:03 host sshd[18102]: Connection closed by 41.197.31.178 port 36160 [preauth] Dec 30 06:30:06 host sshd[18294]: Invalid user samba from 106.10.122.53 port 37386 Dec 30 06:30:06 host sshd[18294]: input_userauth_request: invalid user samba [preauth] Dec 30 06:30:06 host sshd[18294]: pam_unix(sshd:auth): check pass; user unknown Dec 30 06:30:06 host sshd[18294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 30 06:30:08 host sshd[18294]: Failed password for invalid user samba from 106.10.122.53 port 37386 ssh2 Dec 30 06:30:08 host sshd[18294]: Connection closed by 106.10.122.53 port 37386 [preauth] Dec 30 06:43:48 host sshd[20483]: Invalid user jenkins from 92.46.108.20 port 48318 Dec 30 06:43:48 host sshd[20483]: input_userauth_request: invalid user jenkins [preauth] Dec 30 06:43:49 host sshd[20483]: pam_unix(sshd:auth): check pass; user unknown Dec 30 06:43:49 host sshd[20483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 30 06:43:51 host sshd[20483]: Failed password for invalid user jenkins from 92.46.108.20 port 48318 ssh2 Dec 30 06:43:52 host sshd[20483]: Connection closed by 92.46.108.20 port 48318 [preauth] Dec 30 06:50:18 host sshd[21573]: Invalid user ey from 45.93.201.90 port 59948 Dec 30 06:50:18 host sshd[21573]: input_userauth_request: invalid user ey [preauth] Dec 30 06:50:18 host sshd[21573]: pam_unix(sshd:auth): check pass; user unknown Dec 30 06:50:18 host sshd[21573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 30 06:50:20 host sshd[21573]: Failed password for invalid user ey from 45.93.201.90 port 59948 ssh2 Dec 30 06:50:23 host sshd[21573]: pam_unix(sshd:auth): check pass; user unknown Dec 30 06:50:25 host sshd[21573]: Failed password for invalid user ey from 45.93.201.90 port 59948 ssh2 Dec 30 06:50:28 host sshd[21573]: pam_unix(sshd:auth): check pass; user unknown Dec 30 06:50:30 host sshd[21573]: Failed password for invalid user ey from 45.93.201.90 port 59948 ssh2 Dec 30 06:50:33 host sshd[21573]: Connection closed by 45.93.201.90 port 59948 [preauth] Dec 30 06:50:33 host sshd[21573]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 30 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 07:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 30 07:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 07:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 07:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 30 07:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 07:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 07:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 30 07:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 07:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 07:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 30 07:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 07:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 07:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 30 07:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 07:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 07:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 30 07:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 07:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 07:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 30 07:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 07:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 07:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 30 07:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 07:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 30 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=bonifacegroup user-2=wwwevmhonda user-3=wwwletsstalkfood user-4=straightcurve user-5=palco123 user-6=gifterman user-7=kottayamcalldriv user-8=phmetals user-9=wwwnexidigital user-10=mrsclean user-11=wwwkmaorg user-12=disposeat user-13=remysagr user-14=woodpeck user-15=wwwkapin user-16=vfmassets user-17=shalinijames user-18=wwwtestugo user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=wwwresourcehunte user-23=keralaholi user-24=wwwrmswll user-25=ugotscom user-26=wwwkaretakers user-27=cochintaxi user-28=a2zgroup user-29=dartsimp user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 30 07:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 30 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bewZsHQrG6WFaiqQ.~ Dec 30 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bewZsHQrG6WFaiqQ.~' Dec 30 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bewZsHQrG6WFaiqQ.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 07:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 30 07:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 07:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 30 07:21:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 07:21:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 30 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 07:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 07:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 30 07:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 30 07:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 30 07:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 30 07:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 07:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 07:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 30 07:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 07:22:04 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 07:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 30 07:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 07:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 07:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 30 07:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 07:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 07:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 30 07:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 07:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 07:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 30 07:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 07:22:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 07:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 30 07:22:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 07:22:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 07:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 30 07:22:15 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 07:22:16 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 07:27:39 host sshd[27693]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Dec 30 07:27:39 host sshd[27693]: input_userauth_request: invalid user root [preauth] Dec 30 07:27:39 host unix_chkpwd[27697]: password check failed for user (root) Dec 30 07:27:39 host sshd[27693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Dec 30 07:27:39 host sshd[27693]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 07:27:41 host sshd[27693]: Failed password for invalid user root from 162.218.126.136 port 41084 ssh2 Dec 30 07:27:42 host sshd[27693]: Connection closed by 162.218.126.136 port 41084 [preauth] Dec 30 07:38:08 host sshd[29295]: Invalid user jason from 107.189.30.59 port 37768 Dec 30 07:38:08 host sshd[29295]: input_userauth_request: invalid user jason [preauth] Dec 30 07:38:08 host sshd[29295]: pam_unix(sshd:auth): check pass; user unknown Dec 30 07:38:08 host sshd[29295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Dec 30 07:38:10 host sshd[29295]: Failed password for invalid user jason from 107.189.30.59 port 37768 ssh2 Dec 30 07:38:11 host sshd[29295]: Connection closed by 107.189.30.59 port 37768 [preauth] Dec 30 07:53:22 host sshd[31921]: Invalid user db2inst1 from 103.13.40.2 port 49276 Dec 30 07:53:22 host sshd[31921]: input_userauth_request: invalid user db2inst1 [preauth] Dec 30 07:53:22 host sshd[31921]: pam_unix(sshd:auth): check pass; user unknown Dec 30 07:53:22 host sshd[31921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 30 07:53:25 host sshd[31921]: Failed password for invalid user db2inst1 from 103.13.40.2 port 49276 ssh2 Dec 30 07:53:25 host sshd[31921]: Connection closed by 103.13.40.2 port 49276 [preauth] Dec 30 07:55:41 host sshd[32346]: Invalid user mzc from 106.10.122.53 port 55138 Dec 30 07:55:41 host sshd[32346]: input_userauth_request: invalid user mzc [preauth] Dec 30 07:55:42 host sshd[32346]: pam_unix(sshd:auth): check pass; user unknown Dec 30 07:55:42 host sshd[32346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 30 07:55:43 host sshd[32346]: Failed password for invalid user mzc from 106.10.122.53 port 55138 ssh2 Dec 30 07:55:43 host sshd[32346]: Connection closed by 106.10.122.53 port 55138 [preauth] Dec 30 08:01:16 host sshd[860]: Invalid user git from 31.41.244.124 port 26883 Dec 30 08:01:16 host sshd[860]: input_userauth_request: invalid user git [preauth] Dec 30 08:01:16 host sshd[860]: pam_unix(sshd:auth): check pass; user unknown Dec 30 08:01:16 host sshd[860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Dec 30 08:01:19 host sshd[860]: Failed password for invalid user git from 31.41.244.124 port 26883 ssh2 Dec 30 08:01:19 host sshd[860]: Received disconnect from 31.41.244.124 port 26883:11: Client disconnecting normally [preauth] Dec 30 08:01:19 host sshd[860]: Disconnected from 31.41.244.124 port 26883 [preauth] Dec 30 08:01:20 host sshd[867]: Invalid user PlcmSpIp from 31.41.244.124 port 30785 Dec 30 08:01:20 host sshd[867]: input_userauth_request: invalid user PlcmSpIp [preauth] Dec 30 08:01:20 host sshd[867]: pam_unix(sshd:auth): check pass; user unknown Dec 30 08:01:20 host sshd[867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Dec 30 08:01:22 host sshd[867]: Failed password for invalid user PlcmSpIp from 31.41.244.124 port 30785 ssh2 Dec 30 08:01:22 host sshd[867]: Received disconnect from 31.41.244.124 port 30785:11: Client disconnecting normally [preauth] Dec 30 08:01:22 host sshd[867]: Disconnected from 31.41.244.124 port 30785 [preauth] Dec 30 08:01:24 host sshd[872]: User root from 31.41.244.124 not allowed because not listed in AllowUsers Dec 30 08:01:24 host sshd[872]: input_userauth_request: invalid user root [preauth] Dec 30 08:01:24 host unix_chkpwd[910]: password check failed for user (root) Dec 30 08:01:24 host sshd[872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 user=root Dec 30 08:01:24 host sshd[872]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 08:01:27 host sshd[872]: Failed password for invalid user root from 31.41.244.124 port 36849 ssh2 Dec 30 08:13:18 host sshd[2683]: Invalid user user1 from 41.197.31.178 port 44616 Dec 30 08:13:18 host sshd[2683]: input_userauth_request: invalid user user1 [preauth] Dec 30 08:13:18 host sshd[2683]: pam_unix(sshd:auth): check pass; user unknown Dec 30 08:13:18 host sshd[2683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 30 08:13:20 host sshd[2683]: Failed password for invalid user user1 from 41.197.31.178 port 44616 ssh2 Dec 30 08:13:20 host sshd[2683]: Connection closed by 41.197.31.178 port 44616 [preauth] Dec 30 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 08:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 08:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 08:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 08:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 30 08:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 08:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 08:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 30 08:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 08:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 08:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 30 08:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 08:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 08:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 30 08:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 08:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 08:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 30 08:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 08:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 08:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 30 08:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 08:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 08:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 30 08:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 08:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 08:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 30 08:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 08:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 08:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 08:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 30 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=travelboniface user-2=keralaholi user-3=wwwresourcehunte user-4=wwwrmswll user-5=ugotscom user-6=wwwpmcresource user-7=a2zgroup user-8=dartsimp user-9=laundryboniface user-10=wwwkaretakers user-11=cochintaxi user-12=palco123 user-13=gifterman user-14=phmetals user-15=kottayamcalldriv user-16=mrsclean user-17=wwwnexidigital user-18=bonifacegroup user-19=wwwevmhonda user-20=straightcurve user-21=wwwletsstalkfood user-22=vfmassets user-23=shalinijames user-24=wwwtestugo user-25=pmcresources user-26=wwwkmaorg user-27=disposeat user-28=remysagr user-29=wwwkapin user-30=woodpeck feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 30 08:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 30 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-4n6VbxRMJAHMGNOt.~ Dec 30 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-4n6VbxRMJAHMGNOt.~' Dec 30 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-4n6VbxRMJAHMGNOt.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 30 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 08:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 30 08:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 08:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 08:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 08:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 08:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 08:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 08:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 08:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 08:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 08:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 08:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 08:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 30 08:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 30 08:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 30 08:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 30 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 30 08:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 08:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 08:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 30 08:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 08:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 08:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 30 08:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 08:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 30 08:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 08:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 30 08:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 08:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 08:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 30 08:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 08:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 08:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 30 08:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 08:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 08:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 30 08:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 08:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 08:23:13 host sshd[4422]: User root from 62.210.113.123 not allowed because not listed in AllowUsers Dec 30 08:23:13 host sshd[4422]: input_userauth_request: invalid user root [preauth] Dec 30 08:23:13 host unix_chkpwd[4425]: password check failed for user (root) Dec 30 08:23:13 host sshd[4422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.113.123 user=root Dec 30 08:23:13 host sshd[4422]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 08:23:14 host sshd[4422]: Failed password for invalid user root from 62.210.113.123 port 40520 ssh2 Dec 30 08:23:15 host sshd[4422]: Received disconnect from 62.210.113.123 port 40520:11: Bye Bye [preauth] Dec 30 08:23:15 host sshd[4422]: Disconnected from 62.210.113.123 port 40520 [preauth] Dec 30 08:25:12 host sshd[4654]: User root from 94.131.102.242 not allowed because not listed in AllowUsers Dec 30 08:25:12 host sshd[4654]: input_userauth_request: invalid user root [preauth] Dec 30 08:25:12 host unix_chkpwd[4658]: password check failed for user (root) Dec 30 08:25:12 host sshd[4654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.131.102.242 user=root Dec 30 08:25:12 host sshd[4654]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 08:25:14 host sshd[4654]: Failed password for invalid user root from 94.131.102.242 port 42872 ssh2 Dec 30 08:25:15 host sshd[4654]: Received disconnect from 94.131.102.242 port 42872:11: Bye Bye [preauth] Dec 30 08:25:15 host sshd[4654]: Disconnected from 94.131.102.242 port 42872 [preauth] Dec 30 08:26:22 host sshd[4831]: User root from 62.210.113.123 not allowed because not listed in AllowUsers Dec 30 08:26:22 host sshd[4831]: input_userauth_request: invalid user root [preauth] Dec 30 08:26:22 host unix_chkpwd[4835]: password check failed for user (root) Dec 30 08:26:22 host sshd[4831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.113.123 user=root Dec 30 08:26:22 host sshd[4831]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 08:26:24 host sshd[4831]: Failed password for invalid user root from 62.210.113.123 port 43932 ssh2 Dec 30 08:26:24 host sshd[4831]: Received disconnect from 62.210.113.123 port 43932:11: Bye Bye [preauth] Dec 30 08:26:24 host sshd[4831]: Disconnected from 62.210.113.123 port 43932 [preauth] Dec 30 08:27:51 host sshd[5072]: User root from 94.131.102.242 not allowed because not listed in AllowUsers Dec 30 08:27:51 host sshd[5072]: input_userauth_request: invalid user root [preauth] Dec 30 08:27:51 host unix_chkpwd[5075]: password check failed for user (root) Dec 30 08:27:51 host sshd[5072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.131.102.242 user=root Dec 30 08:27:51 host sshd[5072]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 08:27:53 host sshd[5072]: Failed password for invalid user root from 94.131.102.242 port 47068 ssh2 Dec 30 08:27:53 host sshd[5072]: Received disconnect from 94.131.102.242 port 47068:11: Bye Bye [preauth] Dec 30 08:27:53 host sshd[5072]: Disconnected from 94.131.102.242 port 47068 [preauth] Dec 30 08:29:42 host sshd[5485]: Connection closed by 45.83.66.61 port 51412 [preauth] Dec 30 08:29:45 host sshd[5489]: Invalid user sentry from 85.237.57.253 port 37427 Dec 30 08:29:45 host sshd[5489]: input_userauth_request: invalid user sentry [preauth] Dec 30 08:29:45 host sshd[5489]: pam_unix(sshd:auth): check pass; user unknown Dec 30 08:29:45 host sshd[5489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.237.57.253 Dec 30 08:29:47 host sshd[5489]: Failed password for invalid user sentry from 85.237.57.253 port 37427 ssh2 Dec 30 08:29:47 host sshd[5489]: Received disconnect from 85.237.57.253 port 37427:11: Bye Bye [preauth] Dec 30 08:29:47 host sshd[5489]: Disconnected from 85.237.57.253 port 37427 [preauth] Dec 30 08:31:02 host sshd[5679]: Invalid user test from 189.44.15.154 port 34222 Dec 30 08:31:02 host sshd[5679]: input_userauth_request: invalid user test [preauth] Dec 30 08:31:02 host sshd[5679]: pam_unix(sshd:auth): check pass; user unknown Dec 30 08:31:02 host sshd[5679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.44.15.154 Dec 30 08:31:04 host sshd[5679]: Failed password for invalid user test from 189.44.15.154 port 34222 ssh2 Dec 30 08:31:04 host sshd[5679]: Received disconnect from 189.44.15.154 port 34222:11: Bye Bye [preauth] Dec 30 08:31:04 host sshd[5679]: Disconnected from 189.44.15.154 port 34222 [preauth] Dec 30 08:34:31 host sshd[6229]: Invalid user user from 162.218.126.136 port 53998 Dec 30 08:34:31 host sshd[6229]: input_userauth_request: invalid user user [preauth] Dec 30 08:34:31 host sshd[6229]: pam_unix(sshd:auth): check pass; user unknown Dec 30 08:34:31 host sshd[6229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 30 08:34:33 host sshd[6229]: Failed password for invalid user user from 162.218.126.136 port 53998 ssh2 Dec 30 08:34:33 host sshd[6229]: Connection closed by 162.218.126.136 port 53998 [preauth] Dec 30 08:34:50 host sshd[6261]: Invalid user ez from 45.93.201.90 port 53174 Dec 30 08:34:50 host sshd[6261]: input_userauth_request: invalid user ez [preauth] Dec 30 08:34:50 host sshd[6261]: pam_unix(sshd:auth): check pass; user unknown Dec 30 08:34:50 host sshd[6261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 30 08:34:52 host sshd[6261]: Failed password for invalid user ez from 45.93.201.90 port 53174 ssh2 Dec 30 08:34:55 host sshd[6261]: pam_unix(sshd:auth): check pass; user unknown Dec 30 08:34:57 host sshd[6261]: Failed password for invalid user ez from 45.93.201.90 port 53174 ssh2 Dec 30 08:35:00 host sshd[6261]: pam_unix(sshd:auth): check pass; user unknown Dec 30 08:35:02 host sshd[6261]: Failed password for invalid user ez from 45.93.201.90 port 53174 ssh2 Dec 30 08:35:05 host sshd[6261]: Connection closed by 45.93.201.90 port 53174 [preauth] Dec 30 08:35:05 host sshd[6261]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 30 08:36:50 host sshd[6540]: Invalid user test from 85.237.57.253 port 60668 Dec 30 08:36:50 host sshd[6540]: input_userauth_request: invalid user test [preauth] Dec 30 08:36:50 host sshd[6540]: pam_unix(sshd:auth): check pass; user unknown Dec 30 08:36:50 host sshd[6540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.237.57.253 Dec 30 08:36:52 host sshd[6540]: Failed password for invalid user test from 85.237.57.253 port 60668 ssh2 Dec 30 08:36:52 host sshd[6540]: Received disconnect from 85.237.57.253 port 60668:11: Bye Bye [preauth] Dec 30 08:36:52 host sshd[6540]: Disconnected from 85.237.57.253 port 60668 [preauth] Dec 30 08:37:32 host sshd[6640]: Invalid user marvin from 189.44.15.154 port 59995 Dec 30 08:37:32 host sshd[6640]: input_userauth_request: invalid user marvin [preauth] Dec 30 08:37:32 host sshd[6640]: pam_unix(sshd:auth): check pass; user unknown Dec 30 08:37:32 host sshd[6640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.44.15.154 Dec 30 08:37:33 host sshd[6640]: Failed password for invalid user marvin from 189.44.15.154 port 59995 ssh2 Dec 30 08:37:34 host sshd[6640]: Received disconnect from 189.44.15.154 port 59995:11: Bye Bye [preauth] Dec 30 08:37:34 host sshd[6640]: Disconnected from 189.44.15.154 port 59995 [preauth] Dec 30 08:38:11 host sshd[6703]: User root from 85.237.57.253 not allowed because not listed in AllowUsers Dec 30 08:38:11 host sshd[6703]: input_userauth_request: invalid user root [preauth] Dec 30 08:38:11 host unix_chkpwd[6710]: password check failed for user (root) Dec 30 08:38:11 host sshd[6703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.237.57.253 user=root Dec 30 08:38:11 host sshd[6703]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 08:38:13 host sshd[6703]: Failed password for invalid user root from 85.237.57.253 port 55034 ssh2 Dec 30 08:38:13 host sshd[6703]: Received disconnect from 85.237.57.253 port 55034:11: Bye Bye [preauth] Dec 30 08:38:13 host sshd[6703]: Disconnected from 85.237.57.253 port 55034 [preauth] Dec 30 08:38:49 host sshd[6917]: User root from 189.44.15.154 not allowed because not listed in AllowUsers Dec 30 08:38:49 host sshd[6917]: input_userauth_request: invalid user root [preauth] Dec 30 08:38:49 host unix_chkpwd[6927]: password check failed for user (root) Dec 30 08:38:49 host sshd[6917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.44.15.154 user=root Dec 30 08:38:49 host sshd[6917]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 08:38:51 host sshd[6917]: Failed password for invalid user root from 189.44.15.154 port 42299 ssh2 Dec 30 08:38:51 host sshd[6917]: Received disconnect from 189.44.15.154 port 42299:11: Bye Bye [preauth] Dec 30 08:38:51 host sshd[6917]: Disconnected from 189.44.15.154 port 42299 [preauth] Dec 30 08:50:37 host sshd[8730]: Did not receive identification string from 92.255.85.115 port 7448 Dec 30 09:11:00 host sshd[12362]: Bad protocol version identification 'GET http://www.google.com/intl/zh-CN/ HTTP/1.1' from 141.101.17.63 port 54034 Dec 30 09:11:01 host sshd[12365]: Bad protocol version identification 'CONNECT www.google.com:443 HTTP/1.0' from 141.101.17.63 port 54368 Dec 30 09:11:01 host sshd[12375]: Did not receive identification string from 141.101.17.63 port 54707 Dec 30 09:11:02 host sshd[12377]: Did not receive identification string from 141.101.17.63 port 55003 Dec 30 09:18:37 host sshd[13533]: Invalid user user1 from 92.46.108.20 port 44634 Dec 30 09:18:37 host sshd[13533]: input_userauth_request: invalid user user1 [preauth] Dec 30 09:18:38 host sshd[13533]: pam_unix(sshd:auth): check pass; user unknown Dec 30 09:18:38 host sshd[13533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 30 09:18:40 host sshd[13533]: Failed password for invalid user user1 from 92.46.108.20 port 44634 ssh2 Dec 30 09:18:41 host sshd[13533]: Connection closed by 92.46.108.20 port 44634 [preauth] Dec 30 09:21:25 host sshd[13948]: User root from 106.10.122.53 not allowed because not listed in AllowUsers Dec 30 09:21:25 host sshd[13948]: input_userauth_request: invalid user root [preauth] Dec 30 09:21:25 host unix_chkpwd[13952]: password check failed for user (root) Dec 30 09:21:25 host sshd[13948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 user=root Dec 30 09:21:25 host sshd[13948]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 09:21:26 host sshd[13948]: Failed password for invalid user root from 106.10.122.53 port 49418 ssh2 Dec 30 09:21:26 host sshd[13948]: Connection closed by 106.10.122.53 port 49418 [preauth] Dec 30 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 09:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 09:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 09:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 09:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 30 09:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 09:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 09:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 30 09:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 09:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 09:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 30 09:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 09:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 09:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 30 09:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 09:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 09:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 30 09:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 09:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 09:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 30 09:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 09:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 09:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 30 09:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 09:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 09:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 30 09:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 09:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 09:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 09:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 09:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 09:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 30 09:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 09:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 09:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=laundryboniface user-4=a2zgroup user-5=dartsimp user-6=wwwpmcresource user-7=ugotscom user-8=keralaholi user-9=wwwresourcehunte user-10=wwwrmswll user-11=travelboniface user-12=woodpeck user-13=wwwkapin user-14=wwwkmaorg user-15=disposeat user-16=remysagr user-17=pmcresources user-18=shalinijames user-19=wwwtestugo user-20=vfmassets user-21=wwwletsstalkfood user-22=straightcurve user-23=wwwevmhonda user-24=bonifacegroup user-25=wwwnexidigital user-26=mrsclean user-27=kottayamcalldriv user-28=phmetals user-29=palco123 user-30=gifterman feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 30 09:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 30 09:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 09:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 09:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 09:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 09:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 09:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GmUOmBC9vsGhtUgn.~ Dec 30 09:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 09:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GmUOmBC9vsGhtUgn.~' Dec 30 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GmUOmBC9vsGhtUgn.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 30 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 30 09:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 09:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 09:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 09:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 09:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 09:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 09:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 09:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 09:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 09:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 09:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 09:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 30 09:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 09:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 09:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 09:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 09:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 09:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 30 09:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 30 09:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 30 09:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 30 09:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 09:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 30 09:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 09:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 09:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 30 09:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 09:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 09:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 30 09:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 09:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 30 09:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 09:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 09:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 30 09:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 09:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 09:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 30 09:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 09:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 09:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 30 09:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 09:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 09:26:01 host sshd[14851]: Invalid user postgres from 103.13.40.2 port 35792 Dec 30 09:26:01 host sshd[14851]: input_userauth_request: invalid user postgres [preauth] Dec 30 09:26:01 host sshd[14851]: pam_unix(sshd:auth): check pass; user unknown Dec 30 09:26:01 host sshd[14851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 30 09:26:04 host sshd[14851]: Failed password for invalid user postgres from 103.13.40.2 port 35792 ssh2 Dec 30 09:26:04 host sshd[14851]: Connection closed by 103.13.40.2 port 35792 [preauth] Dec 30 09:41:29 host sshd[17425]: Invalid user tdatuser from 162.218.126.136 port 57584 Dec 30 09:41:29 host sshd[17425]: input_userauth_request: invalid user tdatuser [preauth] Dec 30 09:41:29 host sshd[17425]: pam_unix(sshd:auth): check pass; user unknown Dec 30 09:41:29 host sshd[17425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 30 09:41:31 host sshd[17425]: Failed password for invalid user tdatuser from 162.218.126.136 port 57584 ssh2 Dec 30 09:41:31 host sshd[17425]: Connection closed by 162.218.126.136 port 57584 [preauth] Dec 30 09:57:49 host sshd[20060]: Invalid user lzq from 41.197.31.178 port 39848 Dec 30 09:57:49 host sshd[20060]: input_userauth_request: invalid user lzq [preauth] Dec 30 09:57:49 host sshd[20060]: pam_unix(sshd:auth): check pass; user unknown Dec 30 09:57:49 host sshd[20060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 30 09:57:51 host sshd[20060]: Failed password for invalid user lzq from 41.197.31.178 port 39848 ssh2 Dec 30 09:57:51 host sshd[20060]: Connection closed by 41.197.31.178 port 39848 [preauth] Dec 30 10:01:24 host sshd[20697]: Invalid user pi from 220.135.146.61 port 34560 Dec 30 10:01:24 host sshd[20697]: input_userauth_request: invalid user pi [preauth] Dec 30 10:01:24 host sshd[20699]: Invalid user pi from 220.135.146.61 port 34566 Dec 30 10:01:24 host sshd[20699]: input_userauth_request: invalid user pi [preauth] Dec 30 10:01:24 host sshd[20697]: pam_unix(sshd:auth): check pass; user unknown Dec 30 10:01:24 host sshd[20697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.146.61 Dec 30 10:01:24 host sshd[20699]: pam_unix(sshd:auth): check pass; user unknown Dec 30 10:01:24 host sshd[20699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.146.61 Dec 30 10:01:26 host sshd[20697]: Failed password for invalid user pi from 220.135.146.61 port 34560 ssh2 Dec 30 10:01:26 host sshd[20699]: Failed password for invalid user pi from 220.135.146.61 port 34566 ssh2 Dec 30 10:01:26 host sshd[20697]: Connection closed by 220.135.146.61 port 34560 [preauth] Dec 30 10:01:27 host sshd[20699]: Connection closed by 220.135.146.61 port 34566 [preauth] Dec 30 10:11:08 host sshd[22161]: Invalid user bzrx1098ui from 92.255.85.115 port 52294 Dec 30 10:11:08 host sshd[22161]: input_userauth_request: invalid user bzrx1098ui [preauth] Dec 30 10:11:09 host sshd[22161]: pam_unix(sshd:auth): check pass; user unknown Dec 30 10:11:09 host sshd[22161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115 Dec 30 10:11:11 host sshd[22161]: Failed password for invalid user bzrx1098ui from 92.255.85.115 port 52294 ssh2 Dec 30 10:11:11 host sshd[22161]: Connection reset by 92.255.85.115 port 52294 [preauth] Dec 30 10:20:37 host sshd[23783]: Invalid user f from 45.93.201.90 port 39280 Dec 30 10:20:37 host sshd[23783]: input_userauth_request: invalid user f [preauth] Dec 30 10:20:37 host sshd[23783]: pam_unix(sshd:auth): check pass; user unknown Dec 30 10:20:37 host sshd[23783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 30 10:20:39 host sshd[23783]: Failed password for invalid user f from 45.93.201.90 port 39280 ssh2 Dec 30 10:20:42 host sshd[23783]: pam_unix(sshd:auth): check pass; user unknown Dec 30 10:20:43 host sshd[23783]: Failed password for invalid user f from 45.93.201.90 port 39280 ssh2 Dec 30 10:20:46 host sshd[23783]: pam_unix(sshd:auth): check pass; user unknown Dec 30 10:20:49 host sshd[23783]: Failed password for invalid user f from 45.93.201.90 port 39280 ssh2 Dec 30 10:20:52 host sshd[23783]: Connection closed by 45.93.201.90 port 39280 [preauth] Dec 30 10:20:52 host sshd[23783]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 30 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 10:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 10:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 10:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 10:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 10:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 10:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 30 10:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 10:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 10:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 30 10:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 10:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 10:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 30 10:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 10:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 10:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 30 10:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 10:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 10:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 30 10:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 10:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 10:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 30 10:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 10:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 10:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 30 10:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 10:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 10:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 30 10:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 10:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 30 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=a2zgroup user-3=dartsimp user-4=wwwkaretakers user-5=cochintaxi user-6=ugotscom user-7=wwwresourcehunte user-8=keralaholi user-9=wwwrmswll user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=shalinijames user-14=wwwtestugo user-15=vfmassets user-16=woodpeck user-17=wwwkapin user-18=wwwkmaorg user-19=disposeat user-20=remysagr user-21=wwwnexidigital user-22=mrsclean user-23=phmetals user-24=kottayamcalldriv user-25=palco123 user-26=gifterman user-27=wwwletsstalkfood user-28=straightcurve user-29=wwwevmhonda user-30=bonifacegroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 30 10:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 30 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-mN9erNwcIjf1Tbil.~ Dec 30 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-mN9erNwcIjf1Tbil.~' Dec 30 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-mN9erNwcIjf1Tbil.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 30 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 30 10:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 10:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 10:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 10:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 10:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 10:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 10:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 10:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 10:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 10:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 10:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 10:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 30 10:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 10:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 10:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 10:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 10:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 10:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 30 10:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 30 10:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 30 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 30 10:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 10:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 30 10:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 10:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 10:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 30 10:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 10:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 30 10:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 10:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 30 10:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 10:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 10:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 30 10:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 10:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 10:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 30 10:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 10:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 10:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 30 10:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 10:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 10:22:09 host sshd[24197]: Invalid user telecomadmin from 92.255.85.115 port 48363 Dec 30 10:22:09 host sshd[24197]: input_userauth_request: invalid user telecomadmin [preauth] Dec 30 10:22:09 host sshd[24197]: pam_unix(sshd:auth): check pass; user unknown Dec 30 10:22:09 host sshd[24197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115 Dec 30 10:22:11 host sshd[24197]: Failed password for invalid user telecomadmin from 92.255.85.115 port 48363 ssh2 Dec 30 10:22:11 host sshd[24197]: Connection reset by 92.255.85.115 port 48363 [preauth] Dec 30 10:32:23 host sshd[25718]: Invalid user admin from 92.255.85.115 port 27203 Dec 30 10:32:23 host sshd[25718]: input_userauth_request: invalid user admin [preauth] Dec 30 10:32:23 host sshd[25718]: pam_unix(sshd:auth): check pass; user unknown Dec 30 10:32:23 host sshd[25718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115 Dec 30 10:32:26 host sshd[25718]: Failed password for invalid user admin from 92.255.85.115 port 27203 ssh2 Dec 30 10:34:03 host sshd[25997]: User root from 211.44.212.27 not allowed because not listed in AllowUsers Dec 30 10:34:03 host sshd[25997]: input_userauth_request: invalid user root [preauth] Dec 30 10:34:03 host unix_chkpwd[25999]: password check failed for user (root) Dec 30 10:34:03 host sshd[25997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.44.212.27 user=root Dec 30 10:34:03 host sshd[25997]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 10:34:05 host sshd[25997]: Failed password for invalid user root from 211.44.212.27 port 58940 ssh2 Dec 30 10:34:05 host sshd[25997]: Received disconnect from 211.44.212.27 port 58940:11: Bye Bye [preauth] Dec 30 10:34:05 host sshd[25997]: Disconnected from 211.44.212.27 port 58940 [preauth] Dec 30 10:35:15 host sshd[26186]: Invalid user test1 from 203.51.24.173 port 36555 Dec 30 10:35:15 host sshd[26186]: input_userauth_request: invalid user test1 [preauth] Dec 30 10:35:15 host sshd[26186]: pam_unix(sshd:auth): check pass; user unknown Dec 30 10:35:15 host sshd[26186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.51.24.173 Dec 30 10:35:18 host sshd[26186]: Failed password for invalid user test1 from 203.51.24.173 port 36555 ssh2 Dec 30 10:35:18 host sshd[26186]: Received disconnect from 203.51.24.173 port 36555:11: Bye Bye [preauth] Dec 30 10:35:18 host sshd[26186]: Disconnected from 203.51.24.173 port 36555 [preauth] Dec 30 10:37:18 host sshd[26617]: User root from 180.64.115.229 not allowed because not listed in AllowUsers Dec 30 10:37:18 host sshd[26617]: input_userauth_request: invalid user root [preauth] Dec 30 10:37:18 host unix_chkpwd[26619]: password check failed for user (root) Dec 30 10:37:18 host sshd[26617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.64.115.229 user=root Dec 30 10:37:18 host sshd[26617]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 10:37:20 host sshd[26617]: Failed password for invalid user root from 180.64.115.229 port 44556 ssh2 Dec 30 10:37:20 host sshd[26617]: Received disconnect from 180.64.115.229 port 44556:11: Bye Bye [preauth] Dec 30 10:37:20 host sshd[26617]: Disconnected from 180.64.115.229 port 44556 [preauth] Dec 30 10:37:50 host sshd[26701]: Invalid user ss from 79.137.248.63 port 51618 Dec 30 10:37:50 host sshd[26701]: input_userauth_request: invalid user ss [preauth] Dec 30 10:37:50 host sshd[26701]: pam_unix(sshd:auth): check pass; user unknown Dec 30 10:37:50 host sshd[26701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.248.63 Dec 30 10:37:52 host sshd[26701]: Failed password for invalid user ss from 79.137.248.63 port 51618 ssh2 Dec 30 10:37:52 host sshd[26701]: Received disconnect from 79.137.248.63 port 51618:11: Bye Bye [preauth] Dec 30 10:37:52 host sshd[26701]: Disconnected from 79.137.248.63 port 51618 [preauth] Dec 30 10:38:39 host sshd[26826]: Invalid user mc from 159.65.205.178 port 36730 Dec 30 10:38:39 host sshd[26826]: input_userauth_request: invalid user mc [preauth] Dec 30 10:38:39 host sshd[26826]: pam_unix(sshd:auth): check pass; user unknown Dec 30 10:38:39 host sshd[26826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.205.178 Dec 30 10:38:40 host sshd[26826]: Failed password for invalid user mc from 159.65.205.178 port 36730 ssh2 Dec 30 10:38:40 host sshd[26826]: Received disconnect from 159.65.205.178 port 36730:11: Bye Bye [preauth] Dec 30 10:38:40 host sshd[26826]: Disconnected from 159.65.205.178 port 36730 [preauth] Dec 30 10:38:48 host sshd[26841]: User root from 211.44.212.27 not allowed because not listed in AllowUsers Dec 30 10:38:48 host sshd[26841]: input_userauth_request: invalid user root [preauth] Dec 30 10:38:48 host unix_chkpwd[26843]: password check failed for user (root) Dec 30 10:38:48 host sshd[26841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.44.212.27 user=root Dec 30 10:38:48 host sshd[26841]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 10:38:50 host sshd[26841]: Failed password for invalid user root from 211.44.212.27 port 52366 ssh2 Dec 30 10:38:50 host sshd[26841]: Received disconnect from 211.44.212.27 port 52366:11: Bye Bye [preauth] Dec 30 10:38:50 host sshd[26841]: Disconnected from 211.44.212.27 port 52366 [preauth] Dec 30 10:40:35 host sshd[27160]: User root from 179.12.248.188 not allowed because not listed in AllowUsers Dec 30 10:40:35 host sshd[27160]: input_userauth_request: invalid user root [preauth] Dec 30 10:40:36 host unix_chkpwd[27164]: password check failed for user (root) Dec 30 10:40:36 host sshd[27160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.12.248.188 user=root Dec 30 10:40:36 host sshd[27160]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 10:40:38 host sshd[27160]: Failed password for invalid user root from 179.12.248.188 port 56350 ssh2 Dec 30 10:40:38 host sshd[27160]: Received disconnect from 179.12.248.188 port 56350:11: Bye Bye [preauth] Dec 30 10:40:38 host sshd[27160]: Disconnected from 179.12.248.188 port 56350 [preauth] Dec 30 10:40:45 host sshd[27179]: User root from 178.21.8.243 not allowed because not listed in AllowUsers Dec 30 10:40:45 host sshd[27179]: input_userauth_request: invalid user root [preauth] Dec 30 10:40:45 host unix_chkpwd[27182]: password check failed for user (root) Dec 30 10:40:45 host sshd[27179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.21.8.243 user=root Dec 30 10:40:45 host sshd[27179]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 10:40:46 host sshd[27179]: Failed password for invalid user root from 178.21.8.243 port 43722 ssh2 Dec 30 10:40:46 host sshd[27179]: Received disconnect from 178.21.8.243 port 43722:11: Bye Bye [preauth] Dec 30 10:40:46 host sshd[27179]: Disconnected from 178.21.8.243 port 43722 [preauth] Dec 30 10:41:37 host sshd[27291]: User root from 203.51.24.173 not allowed because not listed in AllowUsers Dec 30 10:41:37 host sshd[27291]: input_userauth_request: invalid user root [preauth] Dec 30 10:41:37 host unix_chkpwd[27294]: password check failed for user (root) Dec 30 10:41:37 host sshd[27291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.51.24.173 user=root Dec 30 10:41:37 host sshd[27291]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 10:41:39 host sshd[27291]: Failed password for invalid user root from 203.51.24.173 port 34198 ssh2 Dec 30 10:41:39 host sshd[27291]: Received disconnect from 203.51.24.173 port 34198:11: Bye Bye [preauth] Dec 30 10:41:39 host sshd[27291]: Disconnected from 203.51.24.173 port 34198 [preauth] Dec 30 10:41:51 host sshd[27452]: Invalid user ruben from 137.184.93.208 port 55456 Dec 30 10:41:51 host sshd[27452]: input_userauth_request: invalid user ruben [preauth] Dec 30 10:41:51 host sshd[27452]: pam_unix(sshd:auth): check pass; user unknown Dec 30 10:41:51 host sshd[27452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.93.208 Dec 30 10:41:54 host sshd[27452]: Failed password for invalid user ruben from 137.184.93.208 port 55456 ssh2 Dec 30 10:41:54 host sshd[27452]: Received disconnect from 137.184.93.208 port 55456:11: Bye Bye [preauth] Dec 30 10:41:54 host sshd[27452]: Disconnected from 137.184.93.208 port 55456 [preauth] Dec 30 10:42:41 host sshd[27578]: User root from 159.65.205.178 not allowed because not listed in AllowUsers Dec 30 10:42:41 host sshd[27578]: input_userauth_request: invalid user root [preauth] Dec 30 10:42:41 host unix_chkpwd[27581]: password check failed for user (root) Dec 30 10:42:41 host sshd[27578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.205.178 user=root Dec 30 10:42:41 host sshd[27578]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 10:42:43 host sshd[27578]: Failed password for invalid user root from 159.65.205.178 port 55358 ssh2 Dec 30 10:42:43 host sshd[27578]: Received disconnect from 159.65.205.178 port 55358:11: Bye Bye [preauth] Dec 30 10:42:43 host sshd[27578]: Disconnected from 159.65.205.178 port 55358 [preauth] Dec 30 10:43:01 host sshd[27645]: User root from 79.137.248.63 not allowed because not listed in AllowUsers Dec 30 10:43:01 host sshd[27645]: input_userauth_request: invalid user root [preauth] Dec 30 10:43:01 host unix_chkpwd[27662]: password check failed for user (root) Dec 30 10:43:01 host sshd[27645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.248.63 user=root Dec 30 10:43:01 host sshd[27645]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 10:43:03 host sshd[27645]: Failed password for invalid user root from 79.137.248.63 port 46030 ssh2 Dec 30 10:43:03 host sshd[27645]: Received disconnect from 79.137.248.63 port 46030:11: Bye Bye [preauth] Dec 30 10:43:03 host sshd[27645]: Disconnected from 79.137.248.63 port 46030 [preauth] Dec 30 10:43:11 host sshd[27707]: Invalid user david from 14.240.133.240 port 41768 Dec 30 10:43:11 host sshd[27707]: input_userauth_request: invalid user david [preauth] Dec 30 10:43:11 host sshd[27707]: pam_unix(sshd:auth): check pass; user unknown Dec 30 10:43:11 host sshd[27707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.240.133.240 Dec 30 10:43:13 host sshd[27707]: Failed password for invalid user david from 14.240.133.240 port 41768 ssh2 Dec 30 10:43:13 host sshd[27707]: Received disconnect from 14.240.133.240 port 41768:11: Bye Bye [preauth] Dec 30 10:43:13 host sshd[27707]: Disconnected from 14.240.133.240 port 41768 [preauth] Dec 30 10:43:19 host sshd[27721]: Invalid user test from 180.64.115.229 port 53332 Dec 30 10:43:19 host sshd[27721]: input_userauth_request: invalid user test [preauth] Dec 30 10:43:19 host sshd[27721]: pam_unix(sshd:auth): check pass; user unknown Dec 30 10:43:19 host sshd[27721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.64.115.229 Dec 30 10:43:21 host sshd[27721]: Failed password for invalid user test from 180.64.115.229 port 53332 ssh2 Dec 30 10:43:21 host sshd[27721]: Received disconnect from 180.64.115.229 port 53332:11: Bye Bye [preauth] Dec 30 10:43:21 host sshd[27721]: Disconnected from 180.64.115.229 port 53332 [preauth] Dec 30 10:43:22 host sshd[27726]: User root from 137.184.93.208 not allowed because not listed in AllowUsers Dec 30 10:43:22 host sshd[27726]: input_userauth_request: invalid user root [preauth] Dec 30 10:43:23 host unix_chkpwd[27730]: password check failed for user (root) Dec 30 10:43:23 host sshd[27726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.93.208 user=root Dec 30 10:43:23 host sshd[27726]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 10:43:24 host sshd[27726]: Failed password for invalid user root from 137.184.93.208 port 58638 ssh2 Dec 30 10:43:25 host sshd[27726]: Received disconnect from 137.184.93.208 port 58638:11: Bye Bye [preauth] Dec 30 10:43:25 host sshd[27726]: Disconnected from 137.184.93.208 port 58638 [preauth] Dec 30 10:43:58 host sshd[27850]: Invalid user applprod from 178.21.8.243 port 52464 Dec 30 10:43:58 host sshd[27850]: input_userauth_request: invalid user applprod [preauth] Dec 30 10:43:58 host sshd[27850]: pam_unix(sshd:auth): check pass; user unknown Dec 30 10:43:58 host sshd[27850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.21.8.243 Dec 30 10:44:00 host sshd[27850]: Failed password for invalid user applprod from 178.21.8.243 port 52464 ssh2 Dec 30 10:44:00 host sshd[27850]: Received disconnect from 178.21.8.243 port 52464:11: Bye Bye [preauth] Dec 30 10:44:00 host sshd[27850]: Disconnected from 178.21.8.243 port 52464 [preauth] Dec 30 10:44:53 host sshd[28099]: User root from 14.240.133.240 not allowed because not listed in AllowUsers Dec 30 10:44:53 host sshd[28099]: input_userauth_request: invalid user root [preauth] Dec 30 10:44:53 host unix_chkpwd[28103]: password check failed for user (root) Dec 30 10:44:53 host sshd[28099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.240.133.240 user=root Dec 30 10:44:53 host sshd[28099]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 10:44:55 host sshd[28099]: Failed password for invalid user root from 14.240.133.240 port 53314 ssh2 Dec 30 10:44:55 host sshd[28099]: Received disconnect from 14.240.133.240 port 53314:11: Bye Bye [preauth] Dec 30 10:44:55 host sshd[28099]: Disconnected from 14.240.133.240 port 53314 [preauth] Dec 30 10:45:15 host sshd[28194]: User root from 179.12.248.188 not allowed because not listed in AllowUsers Dec 30 10:45:15 host sshd[28194]: input_userauth_request: invalid user root [preauth] Dec 30 10:45:15 host unix_chkpwd[28211]: password check failed for user (root) Dec 30 10:45:15 host sshd[28194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.12.248.188 user=root Dec 30 10:45:15 host sshd[28194]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 10:45:17 host sshd[28194]: Failed password for invalid user root from 179.12.248.188 port 37172 ssh2 Dec 30 10:45:18 host sshd[28194]: Received disconnect from 179.12.248.188 port 37172:11: Bye Bye [preauth] Dec 30 10:45:18 host sshd[28194]: Disconnected from 179.12.248.188 port 37172 [preauth] Dec 30 10:46:17 host sshd[28384]: User root from 115.75.142.7 not allowed because not listed in AllowUsers Dec 30 10:46:17 host sshd[28384]: input_userauth_request: invalid user root [preauth] Dec 30 10:46:17 host unix_chkpwd[28388]: password check failed for user (root) Dec 30 10:46:17 host sshd[28384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.75.142.7 user=root Dec 30 10:46:17 host sshd[28384]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 10:46:19 host sshd[28384]: Failed password for invalid user root from 115.75.142.7 port 59866 ssh2 Dec 30 10:46:20 host sshd[28384]: Received disconnect from 115.75.142.7 port 59866:11: Bye Bye [preauth] Dec 30 10:46:20 host sshd[28384]: Disconnected from 115.75.142.7 port 59866 [preauth] Dec 30 10:46:49 host sshd[28562]: Invalid user wentian from 106.10.122.53 port 51788 Dec 30 10:46:49 host sshd[28562]: input_userauth_request: invalid user wentian [preauth] Dec 30 10:46:49 host sshd[28562]: pam_unix(sshd:auth): check pass; user unknown Dec 30 10:46:49 host sshd[28562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 30 10:46:50 host sshd[28562]: Failed password for invalid user wentian from 106.10.122.53 port 51788 ssh2 Dec 30 10:46:51 host sshd[28562]: Connection closed by 106.10.122.53 port 51788 [preauth] Dec 30 10:47:46 host sshd[28673]: User root from 115.75.142.7 not allowed because not listed in AllowUsers Dec 30 10:47:46 host sshd[28673]: input_userauth_request: invalid user root [preauth] Dec 30 10:47:46 host unix_chkpwd[28675]: password check failed for user (root) Dec 30 10:47:46 host sshd[28673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.75.142.7 user=root Dec 30 10:47:46 host sshd[28673]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 10:47:48 host sshd[28673]: Failed password for invalid user root from 115.75.142.7 port 34412 ssh2 Dec 30 10:47:48 host sshd[28673]: Received disconnect from 115.75.142.7 port 34412:11: Bye Bye [preauth] Dec 30 10:47:48 host sshd[28673]: Disconnected from 115.75.142.7 port 34412 [preauth] Dec 30 10:48:53 host sshd[28829]: Invalid user service from 162.218.126.136 port 34724 Dec 30 10:48:53 host sshd[28829]: input_userauth_request: invalid user service [preauth] Dec 30 10:48:53 host sshd[28829]: pam_unix(sshd:auth): check pass; user unknown Dec 30 10:48:53 host sshd[28829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 30 10:48:54 host sshd[28829]: Failed password for invalid user service from 162.218.126.136 port 34724 ssh2 Dec 30 10:48:55 host sshd[28829]: Connection closed by 162.218.126.136 port 34724 [preauth] Dec 30 10:52:17 host sshd[29274]: Did not receive identification string from 149.129.220.104 port 61000 Dec 30 10:59:01 host sshd[30331]: Invalid user user from 103.13.40.2 port 42626 Dec 30 10:59:01 host sshd[30331]: input_userauth_request: invalid user user [preauth] Dec 30 10:59:01 host sshd[30331]: pam_unix(sshd:auth): check pass; user unknown Dec 30 10:59:01 host sshd[30331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 30 10:59:03 host sshd[30331]: Failed password for invalid user user from 103.13.40.2 port 42626 ssh2 Dec 30 10:59:03 host sshd[30331]: Connection closed by 103.13.40.2 port 42626 [preauth] Dec 30 11:06:56 host sshd[31500]: User root from 4.240.104.65 not allowed because not listed in AllowUsers Dec 30 11:06:56 host sshd[31500]: input_userauth_request: invalid user root [preauth] Dec 30 11:06:57 host unix_chkpwd[31503]: password check failed for user (root) Dec 30 11:06:57 host sshd[31500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.240.104.65 user=root Dec 30 11:06:57 host sshd[31500]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 11:06:59 host sshd[31500]: Failed password for invalid user root from 4.240.104.65 port 51752 ssh2 Dec 30 11:06:59 host sshd[31500]: Received disconnect from 4.240.104.65 port 51752:11: Bye Bye [preauth] Dec 30 11:06:59 host sshd[31500]: Disconnected from 4.240.104.65 port 51752 [preauth] Dec 30 11:08:30 host sshd[31703]: User root from 70.37.75.157 not allowed because not listed in AllowUsers Dec 30 11:08:30 host sshd[31703]: input_userauth_request: invalid user root [preauth] Dec 30 11:08:30 host unix_chkpwd[31706]: password check failed for user (root) Dec 30 11:08:30 host sshd[31703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.37.75.157 user=root Dec 30 11:08:30 host sshd[31703]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 11:08:32 host sshd[31703]: Failed password for invalid user root from 70.37.75.157 port 53350 ssh2 Dec 30 11:08:32 host sshd[31703]: Received disconnect from 70.37.75.157 port 53350:11: Bye Bye [preauth] Dec 30 11:08:32 host sshd[31703]: Disconnected from 70.37.75.157 port 53350 [preauth] Dec 30 11:09:49 host sshd[31959]: User root from 43.135.154.52 not allowed because not listed in AllowUsers Dec 30 11:09:49 host sshd[31959]: input_userauth_request: invalid user root [preauth] Dec 30 11:09:49 host unix_chkpwd[31965]: password check failed for user (root) Dec 30 11:09:49 host sshd[31959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.135.154.52 user=root Dec 30 11:09:49 host sshd[31959]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 11:09:51 host sshd[31959]: Failed password for invalid user root from 43.135.154.52 port 49906 ssh2 Dec 30 11:09:51 host sshd[31959]: Received disconnect from 43.135.154.52 port 49906:11: Bye Bye [preauth] Dec 30 11:09:51 host sshd[31959]: Disconnected from 43.135.154.52 port 49906 [preauth] Dec 30 11:11:45 host sshd[32227]: User root from 189.127.173.52 not allowed because not listed in AllowUsers Dec 30 11:11:45 host sshd[32227]: input_userauth_request: invalid user root [preauth] Dec 30 11:11:45 host unix_chkpwd[32231]: password check failed for user (root) Dec 30 11:11:45 host sshd[32227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.127.173.52 user=root Dec 30 11:11:45 host sshd[32227]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 11:11:47 host sshd[32227]: Failed password for invalid user root from 189.127.173.52 port 35450 ssh2 Dec 30 11:11:47 host sshd[32227]: Received disconnect from 189.127.173.52 port 35450:11: Bye Bye [preauth] Dec 30 11:11:47 host sshd[32227]: Disconnected from 189.127.173.52 port 35450 [preauth] Dec 30 11:12:23 host sshd[32296]: User root from 185.54.178.117 not allowed because not listed in AllowUsers Dec 30 11:12:23 host sshd[32296]: input_userauth_request: invalid user root [preauth] Dec 30 11:12:23 host unix_chkpwd[32300]: password check failed for user (root) Dec 30 11:12:23 host sshd[32296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.54.178.117 user=root Dec 30 11:12:23 host sshd[32296]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 11:12:25 host sshd[32296]: Failed password for invalid user root from 185.54.178.117 port 51735 ssh2 Dec 30 11:12:25 host sshd[32296]: Received disconnect from 185.54.178.117 port 51735:11: Bye Bye [preauth] Dec 30 11:12:25 host sshd[32296]: Disconnected from 185.54.178.117 port 51735 [preauth] Dec 30 11:12:47 host sshd[32378]: User root from 43.135.154.52 not allowed because not listed in AllowUsers Dec 30 11:12:47 host sshd[32378]: input_userauth_request: invalid user root [preauth] Dec 30 11:12:47 host unix_chkpwd[32382]: password check failed for user (root) Dec 30 11:12:47 host sshd[32378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.135.154.52 user=root Dec 30 11:12:47 host sshd[32378]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 11:12:49 host sshd[32378]: Failed password for invalid user root from 43.135.154.52 port 34290 ssh2 Dec 30 11:12:49 host sshd[32378]: Received disconnect from 43.135.154.52 port 34290:11: Bye Bye [preauth] Dec 30 11:12:49 host sshd[32378]: Disconnected from 43.135.154.52 port 34290 [preauth] Dec 30 11:13:02 host sshd[32453]: User root from 4.240.104.65 not allowed because not listed in AllowUsers Dec 30 11:13:02 host sshd[32453]: input_userauth_request: invalid user root [preauth] Dec 30 11:13:02 host unix_chkpwd[32455]: password check failed for user (root) Dec 30 11:13:02 host sshd[32453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.240.104.65 user=root Dec 30 11:13:02 host sshd[32453]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 11:13:04 host sshd[32453]: Failed password for invalid user root from 4.240.104.65 port 54620 ssh2 Dec 30 11:13:04 host sshd[32453]: Received disconnect from 4.240.104.65 port 54620:11: Bye Bye [preauth] Dec 30 11:13:04 host sshd[32453]: Disconnected from 4.240.104.65 port 54620 [preauth] Dec 30 11:14:08 host sshd[32630]: User root from 189.127.173.52 not allowed because not listed in AllowUsers Dec 30 11:14:08 host sshd[32630]: input_userauth_request: invalid user root [preauth] Dec 30 11:14:08 host unix_chkpwd[32636]: password check failed for user (root) Dec 30 11:14:08 host sshd[32630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.127.173.52 user=root Dec 30 11:14:08 host sshd[32630]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 11:14:10 host sshd[32630]: Failed password for invalid user root from 189.127.173.52 port 48600 ssh2 Dec 30 11:14:10 host sshd[32630]: Received disconnect from 189.127.173.52 port 48600:11: Bye Bye [preauth] Dec 30 11:14:10 host sshd[32630]: Disconnected from 189.127.173.52 port 48600 [preauth] Dec 30 11:14:17 host sshd[32678]: User root from 70.37.75.157 not allowed because not listed in AllowUsers Dec 30 11:14:17 host sshd[32678]: input_userauth_request: invalid user root [preauth] Dec 30 11:14:17 host unix_chkpwd[32686]: password check failed for user (root) Dec 30 11:14:17 host sshd[32678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.37.75.157 user=root Dec 30 11:14:17 host sshd[32678]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 11:14:19 host sshd[32678]: Failed password for invalid user root from 70.37.75.157 port 41612 ssh2 Dec 30 11:14:20 host sshd[32678]: Received disconnect from 70.37.75.157 port 41612:11: Bye Bye [preauth] Dec 30 11:14:20 host sshd[32678]: Disconnected from 70.37.75.157 port 41612 [preauth] Dec 30 11:14:26 host sshd[32738]: User root from 185.54.178.117 not allowed because not listed in AllowUsers Dec 30 11:14:26 host sshd[32738]: input_userauth_request: invalid user root [preauth] Dec 30 11:14:26 host unix_chkpwd[370]: password check failed for user (root) Dec 30 11:14:26 host sshd[32738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.54.178.117 user=root Dec 30 11:14:26 host sshd[32738]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 11:14:27 host sshd[32738]: Failed password for invalid user root from 185.54.178.117 port 36256 ssh2 Dec 30 11:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 11:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 11:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 11:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 11:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 11:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 11:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 11:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 11:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 11:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 30 11:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 11:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 11:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 30 11:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 11:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 11:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 30 11:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 11:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 11:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 30 11:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 11:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 11:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 30 11:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 11:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 11:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 30 11:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 11:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 11:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 30 11:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 11:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 11:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 30 11:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 11:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 30 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=kottayamcalldriv user-2=phmetals user-3=gifterman user-4=palco123 user-5=wwwnexidigital user-6=mrsclean user-7=wwwevmhonda user-8=bonifacegroup user-9=straightcurve user-10=wwwletsstalkfood user-11=wwwtestugo user-12=shalinijames user-13=vfmassets user-14=pmcresources user-15=wwwkmaorg user-16=disposeat user-17=remysagr user-18=woodpeck user-19=wwwkapin user-20=travelboniface user-21=ugotscom user-22=wwwrmswll user-23=keralaholi user-24=wwwresourcehunte user-25=wwwpmcresource user-26=dartsimp user-27=a2zgroup user-28=laundryboniface user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 30 11:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 30 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Trc9wa3RR0oeGBsl.~ Dec 30 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Trc9wa3RR0oeGBsl.~' Dec 30 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Trc9wa3RR0oeGBsl.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 30 11:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 11:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 30 11:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 11:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 11:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 11:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 11:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 11:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 11:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 11:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 11:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 11:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 11:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 11:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 30 11:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 11:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 11:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 11:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 11:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 11:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 30 11:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 30 11:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 30 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 30 11:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 11:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 11:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 30 11:21:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 11:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 11:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 30 11:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 11:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 30 11:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 11:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 11:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 30 11:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 11:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 11:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 30 11:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 11:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 11:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 30 11:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 11:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 11:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 30 11:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 11:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 11:38:23 host sshd[4917]: User root from 189.216.168.154 not allowed because not listed in AllowUsers Dec 30 11:38:23 host sshd[4917]: input_userauth_request: invalid user root [preauth] Dec 30 11:38:23 host unix_chkpwd[4922]: password check failed for user (root) Dec 30 11:38:23 host sshd[4917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.216.168.154 user=root Dec 30 11:38:23 host sshd[4917]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 11:38:25 host sshd[4917]: Failed password for invalid user root from 189.216.168.154 port 36874 ssh2 Dec 30 11:38:25 host sshd[4917]: Received disconnect from 189.216.168.154 port 36874:11: Bye Bye [preauth] Dec 30 11:38:25 host sshd[4917]: Disconnected from 189.216.168.154 port 36874 [preauth] Dec 30 11:43:22 host sshd[5797]: User root from 189.216.168.154 not allowed because not listed in AllowUsers Dec 30 11:43:22 host sshd[5797]: input_userauth_request: invalid user root [preauth] Dec 30 11:43:22 host unix_chkpwd[5802]: password check failed for user (root) Dec 30 11:43:22 host sshd[5797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.216.168.154 user=root Dec 30 11:43:22 host sshd[5797]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 11:43:24 host sshd[5797]: Failed password for invalid user root from 189.216.168.154 port 58016 ssh2 Dec 30 11:43:39 host sshd[5882]: User root from 41.197.31.178 not allowed because not listed in AllowUsers Dec 30 11:43:39 host sshd[5882]: input_userauth_request: invalid user root [preauth] Dec 30 11:43:40 host unix_chkpwd[5887]: password check failed for user (root) Dec 30 11:43:40 host sshd[5882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 user=root Dec 30 11:43:40 host sshd[5882]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 11:43:42 host sshd[5882]: Failed password for invalid user root from 41.197.31.178 port 44432 ssh2 Dec 30 11:43:42 host sshd[5882]: Connection closed by 41.197.31.178 port 44432 [preauth] Dec 30 11:51:04 host sshd[6981]: Invalid user tmp from 92.46.108.20 port 53810 Dec 30 11:51:04 host sshd[6981]: input_userauth_request: invalid user tmp [preauth] Dec 30 11:51:04 host sshd[6981]: pam_unix(sshd:auth): check pass; user unknown Dec 30 11:51:04 host sshd[6981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 30 11:51:06 host sshd[6981]: Failed password for invalid user tmp from 92.46.108.20 port 53810 ssh2 Dec 30 11:51:07 host sshd[6981]: Connection closed by 92.46.108.20 port 53810 [preauth] Dec 30 11:52:15 host sshd[7148]: Invalid user ahmad from 220.202.55.61 port 39094 Dec 30 11:52:15 host sshd[7148]: input_userauth_request: invalid user ahmad [preauth] Dec 30 11:52:15 host sshd[7148]: pam_unix(sshd:auth): check pass; user unknown Dec 30 11:52:15 host sshd[7148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.202.55.61 Dec 30 11:52:17 host sshd[7148]: Failed password for invalid user ahmad from 220.202.55.61 port 39094 ssh2 Dec 30 11:52:17 host sshd[7148]: Received disconnect from 220.202.55.61 port 39094:11: Bye Bye [preauth] Dec 30 11:52:17 host sshd[7148]: Disconnected from 220.202.55.61 port 39094 [preauth] Dec 30 11:52:25 host sshd[7190]: Invalid user test from 103.119.155.83 port 38134 Dec 30 11:52:25 host sshd[7190]: input_userauth_request: invalid user test [preauth] Dec 30 11:52:25 host sshd[7190]: pam_unix(sshd:auth): check pass; user unknown Dec 30 11:52:25 host sshd[7190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.119.155.83 Dec 30 11:52:27 host sshd[7190]: Failed password for invalid user test from 103.119.155.83 port 38134 ssh2 Dec 30 11:52:27 host sshd[7190]: Received disconnect from 103.119.155.83 port 38134:11: Bye Bye [preauth] Dec 30 11:52:27 host sshd[7190]: Disconnected from 103.119.155.83 port 38134 [preauth] Dec 30 11:52:35 host sshd[7215]: User root from 129.146.211.82 not allowed because not listed in AllowUsers Dec 30 11:52:35 host sshd[7215]: input_userauth_request: invalid user root [preauth] Dec 30 11:52:35 host unix_chkpwd[7218]: password check failed for user (root) Dec 30 11:52:35 host sshd[7215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.211.82 user=root Dec 30 11:52:35 host sshd[7215]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 11:52:37 host sshd[7215]: Failed password for invalid user root from 129.146.211.82 port 39058 ssh2 Dec 30 11:52:38 host sshd[7215]: Received disconnect from 129.146.211.82 port 39058:11: Bye Bye [preauth] Dec 30 11:52:38 host sshd[7215]: Disconnected from 129.146.211.82 port 39058 [preauth] Dec 30 11:53:06 host sshd[7272]: User root from 186.121.204.10 not allowed because not listed in AllowUsers Dec 30 11:53:06 host sshd[7272]: input_userauth_request: invalid user root [preauth] Dec 30 11:53:06 host unix_chkpwd[7276]: password check failed for user (root) Dec 30 11:53:06 host sshd[7272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.121.204.10 user=root Dec 30 11:53:06 host sshd[7272]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 11:53:09 host sshd[7272]: Failed password for invalid user root from 186.121.204.10 port 36064 ssh2 Dec 30 11:53:09 host sshd[7272]: Received disconnect from 186.121.204.10 port 36064:11: Bye Bye [preauth] Dec 30 11:53:09 host sshd[7272]: Disconnected from 186.121.204.10 port 36064 [preauth] Dec 30 11:54:04 host sshd[7494]: Invalid user lorenz from 157.230.23.14 port 44910 Dec 30 11:54:04 host sshd[7494]: input_userauth_request: invalid user lorenz [preauth] Dec 30 11:54:04 host sshd[7494]: pam_unix(sshd:auth): check pass; user unknown Dec 30 11:54:04 host sshd[7494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.23.14 Dec 30 11:54:06 host sshd[7494]: Failed password for invalid user lorenz from 157.230.23.14 port 44910 ssh2 Dec 30 11:54:07 host sshd[7494]: Received disconnect from 157.230.23.14 port 44910:11: Bye Bye [preauth] Dec 30 11:54:07 host sshd[7494]: Disconnected from 157.230.23.14 port 44910 [preauth] Dec 30 11:55:47 host sshd[7760]: Invalid user ops from 162.218.126.136 port 58630 Dec 30 11:55:47 host sshd[7760]: input_userauth_request: invalid user ops [preauth] Dec 30 11:55:47 host sshd[7760]: pam_unix(sshd:auth): check pass; user unknown Dec 30 11:55:47 host sshd[7760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 30 11:55:49 host sshd[7772]: User root from 182.16.245.85 not allowed because not listed in AllowUsers Dec 30 11:55:49 host sshd[7772]: input_userauth_request: invalid user root [preauth] Dec 30 11:55:49 host unix_chkpwd[7774]: password check failed for user (root) Dec 30 11:55:49 host sshd[7772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.16.245.85 user=root Dec 30 11:55:49 host sshd[7772]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 11:55:49 host sshd[7760]: Failed password for invalid user ops from 162.218.126.136 port 58630 ssh2 Dec 30 11:55:49 host sshd[7760]: Connection closed by 162.218.126.136 port 58630 [preauth] Dec 30 11:55:50 host sshd[7772]: Failed password for invalid user root from 182.16.245.85 port 42340 ssh2 Dec 30 11:55:50 host sshd[7772]: Received disconnect from 182.16.245.85 port 42340:11: Bye Bye [preauth] Dec 30 11:55:50 host sshd[7772]: Disconnected from 182.16.245.85 port 42340 [preauth] Dec 30 11:56:55 host sshd[7931]: User root from 129.146.211.82 not allowed because not listed in AllowUsers Dec 30 11:56:55 host sshd[7931]: input_userauth_request: invalid user root [preauth] Dec 30 11:56:55 host unix_chkpwd[7938]: password check failed for user (root) Dec 30 11:56:55 host sshd[7931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.211.82 user=root Dec 30 11:56:55 host sshd[7931]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 11:56:56 host sshd[7931]: Failed password for invalid user root from 129.146.211.82 port 60640 ssh2 Dec 30 11:56:56 host sshd[7931]: Received disconnect from 129.146.211.82 port 60640:11: Bye Bye [preauth] Dec 30 11:56:56 host sshd[7931]: Disconnected from 129.146.211.82 port 60640 [preauth] Dec 30 11:57:29 host sshd[8069]: User root from 157.230.23.14 not allowed because not listed in AllowUsers Dec 30 11:57:29 host sshd[8069]: input_userauth_request: invalid user root [preauth] Dec 30 11:57:29 host unix_chkpwd[8073]: password check failed for user (root) Dec 30 11:57:29 host sshd[8069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.23.14 user=root Dec 30 11:57:29 host sshd[8069]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 11:57:32 host sshd[8069]: Failed password for invalid user root from 157.230.23.14 port 33630 ssh2 Dec 30 11:57:32 host sshd[8069]: Received disconnect from 157.230.23.14 port 33630:11: Bye Bye [preauth] Dec 30 11:57:32 host sshd[8069]: Disconnected from 157.230.23.14 port 33630 [preauth] Dec 30 11:58:04 host sshd[8188]: Invalid user liferay from 182.16.245.85 port 47244 Dec 30 11:58:04 host sshd[8188]: input_userauth_request: invalid user liferay [preauth] Dec 30 11:58:04 host sshd[8188]: pam_unix(sshd:auth): check pass; user unknown Dec 30 11:58:04 host sshd[8188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.16.245.85 Dec 30 11:58:06 host sshd[8192]: User root from 103.119.155.83 not allowed because not listed in AllowUsers Dec 30 11:58:06 host sshd[8192]: input_userauth_request: invalid user root [preauth] Dec 30 11:58:06 host unix_chkpwd[8194]: password check failed for user (root) Dec 30 11:58:06 host sshd[8192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.119.155.83 user=root Dec 30 11:58:06 host sshd[8192]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 11:58:07 host sshd[8188]: Failed password for invalid user liferay from 182.16.245.85 port 47244 ssh2 Dec 30 11:58:07 host sshd[8188]: Received disconnect from 182.16.245.85 port 47244:11: Bye Bye [preauth] Dec 30 11:58:07 host sshd[8188]: Disconnected from 182.16.245.85 port 47244 [preauth] Dec 30 11:58:08 host sshd[8192]: Failed password for invalid user root from 103.119.155.83 port 35734 ssh2 Dec 30 11:58:09 host sshd[8192]: Received disconnect from 103.119.155.83 port 35734:11: Bye Bye [preauth] Dec 30 11:58:09 host sshd[8192]: Disconnected from 103.119.155.83 port 35734 [preauth] Dec 30 11:58:16 host sshd[8267]: User root from 186.121.204.10 not allowed because not listed in AllowUsers Dec 30 11:58:16 host sshd[8267]: input_userauth_request: invalid user root [preauth] Dec 30 11:58:16 host unix_chkpwd[8271]: password check failed for user (root) Dec 30 11:58:16 host sshd[8267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.121.204.10 user=root Dec 30 11:58:16 host sshd[8267]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 11:58:18 host sshd[8267]: Failed password for invalid user root from 186.121.204.10 port 36078 ssh2 Dec 30 11:58:19 host sshd[8267]: Received disconnect from 186.121.204.10 port 36078:11: Bye Bye [preauth] Dec 30 11:58:19 host sshd[8267]: Disconnected from 186.121.204.10 port 36078 [preauth] Dec 30 12:01:41 host sshd[9050]: User root from 220.202.55.61 not allowed because not listed in AllowUsers Dec 30 12:01:41 host sshd[9050]: input_userauth_request: invalid user root [preauth] Dec 30 12:01:41 host unix_chkpwd[9052]: password check failed for user (root) Dec 30 12:01:41 host sshd[9050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.202.55.61 user=root Dec 30 12:01:41 host sshd[9050]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 12:01:43 host sshd[9050]: Failed password for invalid user root from 220.202.55.61 port 33302 ssh2 Dec 30 12:01:43 host sshd[9050]: Received disconnect from 220.202.55.61 port 33302:11: Bye Bye [preauth] Dec 30 12:01:43 host sshd[9050]: Disconnected from 220.202.55.61 port 33302 [preauth] Dec 30 12:05:17 host sshd[9742]: Invalid user fa from 45.93.201.90 port 33278 Dec 30 12:05:17 host sshd[9742]: input_userauth_request: invalid user fa [preauth] Dec 30 12:05:17 host sshd[9742]: pam_unix(sshd:auth): check pass; user unknown Dec 30 12:05:17 host sshd[9742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 30 12:05:19 host sshd[9742]: Failed password for invalid user fa from 45.93.201.90 port 33278 ssh2 Dec 30 12:05:22 host sshd[9742]: pam_unix(sshd:auth): check pass; user unknown Dec 30 12:05:25 host sshd[9742]: Failed password for invalid user fa from 45.93.201.90 port 33278 ssh2 Dec 30 12:05:28 host sshd[9742]: pam_unix(sshd:auth): check pass; user unknown Dec 30 12:05:30 host sshd[9742]: Failed password for invalid user fa from 45.93.201.90 port 33278 ssh2 Dec 30 12:05:33 host sshd[9742]: Connection closed by 45.93.201.90 port 33278 [preauth] Dec 30 12:05:33 host sshd[9742]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 30 12:07:06 host sshd[9985]: User root from 177.62.131.64 not allowed because not listed in AllowUsers Dec 30 12:07:06 host sshd[9985]: input_userauth_request: invalid user root [preauth] Dec 30 12:07:06 host unix_chkpwd[9992]: password check failed for user (root) Dec 30 12:07:06 host sshd[9985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.62.131.64 user=root Dec 30 12:07:06 host sshd[9985]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 12:07:09 host sshd[9985]: Failed password for invalid user root from 177.62.131.64 port 59067 ssh2 Dec 30 12:07:09 host sshd[9985]: Received disconnect from 177.62.131.64 port 59067:11: Bye Bye [preauth] Dec 30 12:07:09 host sshd[9985]: Disconnected from 177.62.131.64 port 59067 [preauth] Dec 30 12:10:39 host sshd[11018]: Invalid user jack from 178.128.226.2 port 33168 Dec 30 12:10:39 host sshd[11018]: input_userauth_request: invalid user jack [preauth] Dec 30 12:10:39 host sshd[11018]: pam_unix(sshd:auth): check pass; user unknown Dec 30 12:10:39 host sshd[11018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.226.2 Dec 30 12:10:42 host sshd[11018]: Failed password for invalid user jack from 178.128.226.2 port 33168 ssh2 Dec 30 12:10:42 host sshd[11018]: Received disconnect from 178.128.226.2 port 33168:11: Bye Bye [preauth] Dec 30 12:10:42 host sshd[11018]: Disconnected from 178.128.226.2 port 33168 [preauth] Dec 30 12:11:26 host sshd[11218]: User root from 177.62.131.64 not allowed because not listed in AllowUsers Dec 30 12:11:26 host sshd[11218]: input_userauth_request: invalid user root [preauth] Dec 30 12:11:26 host unix_chkpwd[11241]: password check failed for user (root) Dec 30 12:11:26 host sshd[11218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.62.131.64 user=root Dec 30 12:11:26 host sshd[11218]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 12:11:29 host sshd[11218]: Failed password for invalid user root from 177.62.131.64 port 54495 ssh2 Dec 30 12:11:29 host sshd[11218]: Received disconnect from 177.62.131.64 port 54495:11: Bye Bye [preauth] Dec 30 12:11:29 host sshd[11218]: Disconnected from 177.62.131.64 port 54495 [preauth] Dec 30 12:11:45 host sshd[11297]: Received disconnect from 183.252.190.71 port 58602:11: Bye Bye [preauth] Dec 30 12:11:45 host sshd[11297]: Disconnected from 183.252.190.71 port 58602 [preauth] Dec 30 12:12:37 host sshd[11602]: Invalid user sftpuser from 178.128.226.2 port 47274 Dec 30 12:12:37 host sshd[11602]: input_userauth_request: invalid user sftpuser [preauth] Dec 30 12:12:37 host sshd[11602]: pam_unix(sshd:auth): check pass; user unknown Dec 30 12:12:37 host sshd[11602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.226.2 Dec 30 12:12:39 host sshd[11602]: Failed password for invalid user sftpuser from 178.128.226.2 port 47274 ssh2 Dec 30 12:12:39 host sshd[11602]: Received disconnect from 178.128.226.2 port 47274:11: Bye Bye [preauth] Dec 30 12:12:39 host sshd[11602]: Disconnected from 178.128.226.2 port 47274 [preauth] Dec 30 12:12:46 host sshd[11627]: User root from 106.10.122.53 not allowed because not listed in AllowUsers Dec 30 12:12:46 host sshd[11627]: input_userauth_request: invalid user root [preauth] Dec 30 12:12:46 host unix_chkpwd[11629]: password check failed for user (root) Dec 30 12:12:46 host sshd[11627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 user=root Dec 30 12:12:46 host sshd[11627]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 12:12:48 host sshd[11627]: Failed password for invalid user root from 106.10.122.53 port 37534 ssh2 Dec 30 12:12:49 host sshd[11627]: Connection closed by 106.10.122.53 port 37534 [preauth] Dec 30 12:13:52 host sshd[11784]: Invalid user vpn from 178.128.226.2 port 59197 Dec 30 12:13:52 host sshd[11784]: input_userauth_request: invalid user vpn [preauth] Dec 30 12:13:52 host sshd[11784]: pam_unix(sshd:auth): check pass; user unknown Dec 30 12:13:52 host sshd[11784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.226.2 Dec 30 12:13:54 host sshd[11784]: Failed password for invalid user vpn from 178.128.226.2 port 59197 ssh2 Dec 30 12:15:02 host sshd[12091]: Did not receive identification string from 45.79.181.251 port 14520 Dec 30 12:15:03 host sshd[12120]: Did not receive identification string from 45.79.181.251 port 14528 Dec 30 12:15:04 host sshd[12153]: Did not receive identification string from 45.79.181.251 port 14532 Dec 30 12:16:12 host sshd[12169]: Invalid user admin from 79.11.109.206 port 51227 Dec 30 12:16:12 host sshd[12169]: input_userauth_request: invalid user admin [preauth] Dec 30 12:16:12 host sshd[12169]: pam_unix(sshd:auth): check pass; user unknown Dec 30 12:16:12 host sshd[12169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.11.109.206 Dec 30 12:16:14 host sshd[12169]: Failed password for invalid user admin from 79.11.109.206 port 51227 ssh2 Dec 30 12:16:23 host sshd[12169]: Connection reset by 79.11.109.206 port 51227 [preauth] Dec 30 12:20:53 host sshd[13180]: User root from 187.191.60.178 not allowed because not listed in AllowUsers Dec 30 12:20:53 host sshd[13180]: input_userauth_request: invalid user root [preauth] Dec 30 12:20:54 host unix_chkpwd[13184]: password check failed for user (root) Dec 30 12:20:54 host sshd[13180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.191.60.178 user=root Dec 30 12:20:54 host sshd[13180]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 12:20:56 host sshd[13180]: Failed password for invalid user root from 187.191.60.178 port 55257 ssh2 Dec 30 12:20:56 host sshd[13180]: Received disconnect from 187.191.60.178 port 55257:11: Bye Bye [preauth] Dec 30 12:20:56 host sshd[13180]: Disconnected from 187.191.60.178 port 55257 [preauth] Dec 30 12:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 12:21:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 12:21:46 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 30 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 30 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 30 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 30 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 30 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 30 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 30 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 30 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 30 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=wwwrmswll user-3=keralaholi user-4=wwwresourcehunte user-5=ugotscom user-6=travelboniface user-7=wwwkaretakers user-8=cochintaxi user-9=laundryboniface user-10=dartsimp user-11=a2zgroup user-12=straightcurve user-13=wwwletsstalkfood user-14=bonifacegroup user-15=wwwevmhonda user-16=mrsclean user-17=wwwnexidigital user-18=gifterman user-19=palco123 user-20=kottayamcalldriv user-21=phmetals user-22=woodpeck user-23=wwwkapin user-24=disposeat user-25=wwwkmaorg user-26=remysagr user-27=pmcresources user-28=vfmassets user-29=wwwtestugo user-30=shalinijames feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 30 12:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 30 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-RaqmPcoiWosz4XtT.~ Dec 30 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-RaqmPcoiWosz4XtT.~' Dec 30 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-RaqmPcoiWosz4XtT.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 12:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 30 12:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 12:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 12:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 30 12:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 12:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 12:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 12:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 12:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 12:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 12:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 12:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 12:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 30 12:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 12:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 12:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 12:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 12:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 30 12:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 30 12:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 30 12:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 30 12:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 12:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 12:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 30 12:21:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 12:21:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 30 12:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 12:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 12:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 30 12:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 12:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 12:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 30 12:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 12:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 12:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 30 12:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 12:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 12:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 30 12:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 12:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 12:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 30 12:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 12:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 12:26:44 host sshd[14257]: Invalid user ark from 183.252.190.71 port 36286 Dec 30 12:26:44 host sshd[14257]: input_userauth_request: invalid user ark [preauth] Dec 30 12:26:44 host sshd[14257]: pam_unix(sshd:auth): check pass; user unknown Dec 30 12:26:44 host sshd[14257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.252.190.71 Dec 30 12:26:46 host sshd[14257]: Failed password for invalid user ark from 183.252.190.71 port 36286 ssh2 Dec 30 12:26:46 host sshd[14257]: Received disconnect from 183.252.190.71 port 36286:11: Bye Bye [preauth] Dec 30 12:26:46 host sshd[14257]: Disconnected from 183.252.190.71 port 36286 [preauth] Dec 30 12:27:49 host sshd[14372]: Invalid user user from 177.135.83.2 port 53282 Dec 30 12:27:49 host sshd[14372]: input_userauth_request: invalid user user [preauth] Dec 30 12:27:50 host sshd[14372]: pam_unix(sshd:auth): check pass; user unknown Dec 30 12:27:50 host sshd[14372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.135.83.2 Dec 30 12:27:52 host sshd[14372]: Failed password for invalid user user from 177.135.83.2 port 53282 ssh2 Dec 30 12:27:52 host sshd[14372]: Connection closed by 177.135.83.2 port 53282 [preauth] Dec 30 12:28:09 host sshd[14387]: Connection closed by 183.252.190.71 port 51480 [preauth] Dec 30 12:29:11 host sshd[14528]: User root from 187.191.60.178 not allowed because not listed in AllowUsers Dec 30 12:29:11 host sshd[14528]: input_userauth_request: invalid user root [preauth] Dec 30 12:29:11 host unix_chkpwd[14532]: password check failed for user (root) Dec 30 12:29:11 host sshd[14528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.191.60.178 user=root Dec 30 12:29:11 host sshd[14528]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 12:29:14 host sshd[14528]: Failed password for invalid user root from 187.191.60.178 port 44014 ssh2 Dec 30 12:29:14 host sshd[14528]: Received disconnect from 187.191.60.178 port 44014:11: Bye Bye [preauth] Dec 30 12:29:14 host sshd[14528]: Disconnected from 187.191.60.178 port 44014 [preauth] Dec 30 12:29:29 host sshd[14576]: Invalid user csgoserver from 183.252.190.71 port 38442 Dec 30 12:29:29 host sshd[14576]: input_userauth_request: invalid user csgoserver [preauth] Dec 30 12:29:29 host sshd[14576]: pam_unix(sshd:auth): check pass; user unknown Dec 30 12:29:29 host sshd[14576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.252.190.71 Dec 30 12:29:31 host sshd[14576]: Failed password for invalid user csgoserver from 183.252.190.71 port 38442 ssh2 Dec 30 12:29:37 host sshd[14576]: Received disconnect from 183.252.190.71 port 38442:11: Bye Bye [preauth] Dec 30 12:29:37 host sshd[14576]: Disconnected from 183.252.190.71 port 38442 [preauth] Dec 30 12:30:43 host sshd[14790]: User root from 183.252.190.71 not allowed because not listed in AllowUsers Dec 30 12:30:43 host sshd[14790]: input_userauth_request: invalid user root [preauth] Dec 30 12:30:43 host unix_chkpwd[14795]: password check failed for user (root) Dec 30 12:30:43 host sshd[14790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.252.190.71 user=root Dec 30 12:30:43 host sshd[14790]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 12:30:46 host sshd[14790]: Failed password for invalid user root from 183.252.190.71 port 53636 ssh2 Dec 30 12:31:33 host sshd[15004]: User root from 103.13.40.2 not allowed because not listed in AllowUsers Dec 30 12:31:33 host sshd[15004]: input_userauth_request: invalid user root [preauth] Dec 30 12:31:33 host unix_chkpwd[15006]: password check failed for user (root) Dec 30 12:31:33 host sshd[15004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 user=root Dec 30 12:31:33 host sshd[15004]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 12:31:35 host sshd[15004]: Failed password for invalid user root from 103.13.40.2 port 50200 ssh2 Dec 30 12:31:35 host sshd[15004]: Connection closed by 103.13.40.2 port 50200 [preauth] Dec 30 12:32:37 host sshd[15134]: Invalid user matthew from 107.189.30.59 port 52460 Dec 30 12:32:37 host sshd[15134]: input_userauth_request: invalid user matthew [preauth] Dec 30 12:32:37 host sshd[15134]: pam_unix(sshd:auth): check pass; user unknown Dec 30 12:32:37 host sshd[15134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Dec 30 12:32:38 host sshd[15134]: Failed password for invalid user matthew from 107.189.30.59 port 52460 ssh2 Dec 30 12:32:39 host sshd[15134]: Connection closed by 107.189.30.59 port 52460 [preauth] Dec 30 13:02:51 host sshd[19436]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Dec 30 13:02:51 host sshd[19436]: input_userauth_request: invalid user root [preauth] Dec 30 13:02:51 host unix_chkpwd[19440]: password check failed for user (root) Dec 30 13:02:51 host sshd[19436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Dec 30 13:02:51 host sshd[19436]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 13:02:53 host sshd[19436]: Failed password for invalid user root from 162.218.126.136 port 38658 ssh2 Dec 30 13:02:53 host sshd[19436]: Connection closed by 162.218.126.136 port 38658 [preauth] Dec 30 13:06:39 host sshd[20134]: Invalid user admin from 141.135.60.158 port 39586 Dec 30 13:06:39 host sshd[20134]: input_userauth_request: invalid user admin [preauth] Dec 30 13:06:39 host sshd[20134]: pam_unix(sshd:auth): check pass; user unknown Dec 30 13:06:39 host sshd[20134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.135.60.158 Dec 30 13:06:41 host sshd[20134]: Failed password for invalid user admin from 141.135.60.158 port 39586 ssh2 Dec 30 13:06:41 host sshd[20134]: Connection closed by 141.135.60.158 port 39586 [preauth] Dec 30 13:21:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 13:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 13:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 13:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 13:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 13:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 13:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 13:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 13:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 13:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 30 13:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 13:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 13:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 30 13:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 13:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 13:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 30 13:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 13:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 13:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 30 13:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 13:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 13:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 30 13:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 13:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 13:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 30 13:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 13:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 13:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 30 13:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 13:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 13:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 30 13:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 13:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 30 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=ugotscom user-4=wwwresourcehunte user-5=keralaholi user-6=wwwrmswll user-7=wwwkaretakers user-8=cochintaxi user-9=a2zgroup user-10=dartsimp user-11=laundryboniface user-12=wwwevmhonda user-13=bonifacegroup user-14=straightcurve user-15=wwwletsstalkfood user-16=kottayamcalldriv user-17=phmetals user-18=palco123 user-19=gifterman user-20=mrsclean user-21=wwwnexidigital user-22=disposeat user-23=wwwkmaorg user-24=remysagr user-25=wwwkapin user-26=woodpeck user-27=shalinijames user-28=wwwtestugo user-29=vfmassets user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 30 13:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 30 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-442EwepY868zpumz.~ Dec 30 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-442EwepY868zpumz.~' Dec 30 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-442EwepY868zpumz.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 30 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 13:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 30 13:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 13:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 13:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 13:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 13:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 13:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 13:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 13:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 13:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 13:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 13:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 13:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 30 13:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 13:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 13:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 13:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 13:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 13:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 30 13:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 30 13:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 30 13:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 30 13:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 13:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 13:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 30 13:22:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 13:22:06 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 13:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 30 13:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 13:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 13:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 30 13:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 13:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 13:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 30 13:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 13:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 13:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 30 13:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 13:22:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 13:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 30 13:22:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 13:22:19 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 13:22:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 30 13:22:20 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 13:22:24 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 13:24:36 host sshd[23301]: User root from 205.237.141.175 not allowed because not listed in AllowUsers Dec 30 13:24:36 host sshd[23301]: input_userauth_request: invalid user root [preauth] Dec 30 13:24:36 host unix_chkpwd[23310]: password check failed for user (root) Dec 30 13:24:36 host sshd[23301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.237.141.175 user=root Dec 30 13:24:36 host sshd[23301]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 13:24:38 host sshd[23301]: Failed password for invalid user root from 205.237.141.175 port 47357 ssh2 Dec 30 13:24:39 host sshd[23301]: Connection closed by 205.237.141.175 port 47357 [preauth] Dec 30 13:34:51 host sshd[24993]: User root from 110.45.145.194 not allowed because not listed in AllowUsers Dec 30 13:34:51 host sshd[24993]: input_userauth_request: invalid user root [preauth] Dec 30 13:34:51 host unix_chkpwd[24997]: password check failed for user (root) Dec 30 13:34:51 host sshd[24993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.45.145.194 user=root Dec 30 13:34:51 host sshd[24993]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 13:34:53 host sshd[24993]: Failed password for invalid user root from 110.45.145.194 port 52854 ssh2 Dec 30 13:34:54 host sshd[24993]: Received disconnect from 110.45.145.194 port 52854:11: Bye Bye [preauth] Dec 30 13:34:54 host sshd[24993]: Disconnected from 110.45.145.194 port 52854 [preauth] Dec 30 13:35:17 host sshd[25060]: User root from 187.188.141.105 not allowed because not listed in AllowUsers Dec 30 13:35:17 host sshd[25060]: input_userauth_request: invalid user root [preauth] Dec 30 13:35:18 host unix_chkpwd[25063]: password check failed for user (root) Dec 30 13:35:18 host sshd[25060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.188.141.105 user=root Dec 30 13:35:18 host sshd[25060]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 13:35:20 host sshd[25060]: Failed password for invalid user root from 187.188.141.105 port 60056 ssh2 Dec 30 13:35:20 host sshd[25060]: Received disconnect from 187.188.141.105 port 60056:11: Bye Bye [preauth] Dec 30 13:35:20 host sshd[25060]: Disconnected from 187.188.141.105 port 60056 [preauth] Dec 30 13:39:03 host sshd[25499]: User root from 106.10.122.53 not allowed because not listed in AllowUsers Dec 30 13:39:03 host sshd[25499]: input_userauth_request: invalid user root [preauth] Dec 30 13:39:03 host unix_chkpwd[25501]: password check failed for user (root) Dec 30 13:39:03 host sshd[25499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 user=root Dec 30 13:39:03 host sshd[25499]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 13:39:05 host sshd[25499]: Failed password for invalid user root from 106.10.122.53 port 53576 ssh2 Dec 30 13:39:05 host sshd[25499]: Connection closed by 106.10.122.53 port 53576 [preauth] Dec 30 13:39:45 host sshd[25581]: User root from 187.188.141.105 not allowed because not listed in AllowUsers Dec 30 13:39:45 host sshd[25581]: input_userauth_request: invalid user root [preauth] Dec 30 13:39:45 host unix_chkpwd[25587]: password check failed for user (root) Dec 30 13:39:45 host sshd[25581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.188.141.105 user=root Dec 30 13:39:45 host sshd[25581]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 13:39:47 host sshd[25581]: Failed password for invalid user root from 187.188.141.105 port 54646 ssh2 Dec 30 13:40:29 host sshd[25827]: User root from 110.45.145.194 not allowed because not listed in AllowUsers Dec 30 13:40:29 host sshd[25827]: input_userauth_request: invalid user root [preauth] Dec 30 13:40:29 host unix_chkpwd[25830]: password check failed for user (root) Dec 30 13:40:29 host sshd[25827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.45.145.194 user=root Dec 30 13:40:29 host sshd[25827]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 13:40:31 host sshd[25827]: Failed password for invalid user root from 110.45.145.194 port 51250 ssh2 Dec 30 13:40:31 host sshd[25827]: Received disconnect from 110.45.145.194 port 51250:11: Bye Bye [preauth] Dec 30 13:40:31 host sshd[25827]: Disconnected from 110.45.145.194 port 51250 [preauth] Dec 30 13:42:19 host sshd[26060]: User root from 23.95.164.237 not allowed because not listed in AllowUsers Dec 30 13:42:19 host sshd[26060]: input_userauth_request: invalid user root [preauth] Dec 30 13:42:19 host unix_chkpwd[26063]: password check failed for user (root) Dec 30 13:42:19 host sshd[26060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.95.164.237 user=root Dec 30 13:42:19 host sshd[26060]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 13:42:21 host sshd[26060]: Failed password for invalid user root from 23.95.164.237 port 45448 ssh2 Dec 30 13:42:21 host sshd[26060]: Received disconnect from 23.95.164.237 port 45448:11: Bye Bye [preauth] Dec 30 13:42:21 host sshd[26060]: Disconnected from 23.95.164.237 port 45448 [preauth] Dec 30 13:42:55 host sshd[26124]: Invalid user support from 158.181.169.93 port 54935 Dec 30 13:42:55 host sshd[26124]: input_userauth_request: invalid user support [preauth] Dec 30 13:42:55 host sshd[26124]: pam_unix(sshd:auth): check pass; user unknown Dec 30 13:42:55 host sshd[26124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.181.169.93 Dec 30 13:42:57 host sshd[26124]: Failed password for invalid user support from 158.181.169.93 port 54935 ssh2 Dec 30 13:42:58 host sshd[26124]: Connection closed by 158.181.169.93 port 54935 [preauth] Dec 30 13:44:47 host sshd[26403]: User root from 23.95.164.237 not allowed because not listed in AllowUsers Dec 30 13:44:47 host sshd[26403]: input_userauth_request: invalid user root [preauth] Dec 30 13:44:47 host unix_chkpwd[26406]: password check failed for user (root) Dec 30 13:44:47 host sshd[26403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.95.164.237 user=root Dec 30 13:44:47 host sshd[26403]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 13:44:49 host sshd[26403]: Failed password for invalid user root from 23.95.164.237 port 53112 ssh2 Dec 30 13:44:50 host sshd[26403]: Received disconnect from 23.95.164.237 port 53112:11: Bye Bye [preauth] Dec 30 13:44:50 host sshd[26403]: Disconnected from 23.95.164.237 port 53112 [preauth] Dec 30 13:49:47 host sshd[27436]: Invalid user fb from 45.93.201.90 port 37500 Dec 30 13:49:47 host sshd[27436]: input_userauth_request: invalid user fb [preauth] Dec 30 13:49:47 host sshd[27436]: pam_unix(sshd:auth): check pass; user unknown Dec 30 13:49:47 host sshd[27436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 30 13:49:49 host sshd[27436]: Failed password for invalid user fb from 45.93.201.90 port 37500 ssh2 Dec 30 13:49:53 host sshd[27436]: pam_unix(sshd:auth): check pass; user unknown Dec 30 13:49:55 host sshd[27436]: Failed password for invalid user fb from 45.93.201.90 port 37500 ssh2 Dec 30 13:49:58 host sshd[27436]: pam_unix(sshd:auth): check pass; user unknown Dec 30 13:50:00 host sshd[27436]: Failed password for invalid user fb from 45.93.201.90 port 37500 ssh2 Dec 30 13:50:04 host sshd[27436]: Connection closed by 45.93.201.90 port 37500 [preauth] Dec 30 13:50:04 host sshd[27436]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 30 13:50:20 host sshd[27504]: Did not receive identification string from 58.72.18.130 port 1221 Dec 30 13:50:50 host sshd[27670]: User root from 65.181.73.155 not allowed because not listed in AllowUsers Dec 30 13:50:50 host sshd[27670]: input_userauth_request: invalid user root [preauth] Dec 30 13:50:50 host unix_chkpwd[27672]: password check failed for user (root) Dec 30 13:50:50 host sshd[27670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.181.73.155 user=root Dec 30 13:50:50 host sshd[27670]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 13:50:52 host sshd[27670]: Failed password for invalid user root from 65.181.73.155 port 44570 ssh2 Dec 30 13:50:52 host sshd[27670]: Received disconnect from 65.181.73.155 port 44570:11: Bye Bye [preauth] Dec 30 13:50:52 host sshd[27670]: Disconnected from 65.181.73.155 port 44570 [preauth] Dec 30 13:53:28 host sshd[27978]: User root from 65.181.73.155 not allowed because not listed in AllowUsers Dec 30 13:53:28 host sshd[27978]: input_userauth_request: invalid user root [preauth] Dec 30 13:53:28 host unix_chkpwd[27981]: password check failed for user (root) Dec 30 13:53:28 host sshd[27978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.181.73.155 user=root Dec 30 13:53:28 host sshd[27978]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 13:53:30 host sshd[27978]: Failed password for invalid user root from 65.181.73.155 port 34806 ssh2 Dec 30 13:53:30 host sshd[27978]: Received disconnect from 65.181.73.155 port 34806:11: Bye Bye [preauth] Dec 30 13:53:30 host sshd[27978]: Disconnected from 65.181.73.155 port 34806 [preauth] Dec 30 14:01:08 host sshd[29027]: User root from 177.135.103.54 not allowed because not listed in AllowUsers Dec 30 14:01:08 host sshd[29027]: input_userauth_request: invalid user root [preauth] Dec 30 14:01:09 host unix_chkpwd[29033]: password check failed for user (root) Dec 30 14:01:09 host sshd[29027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.135.103.54 user=root Dec 30 14:01:09 host sshd[29027]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 14:01:11 host sshd[29027]: Failed password for invalid user root from 177.135.103.54 port 46751 ssh2 Dec 30 14:01:12 host sshd[29027]: Connection closed by 177.135.103.54 port 46751 [preauth] Dec 30 14:03:37 host sshd[29302]: Invalid user hadoop from 41.197.31.178 port 38256 Dec 30 14:03:37 host sshd[29302]: input_userauth_request: invalid user hadoop [preauth] Dec 30 14:03:37 host sshd[29302]: pam_unix(sshd:auth): check pass; user unknown Dec 30 14:03:37 host sshd[29302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 30 14:03:40 host sshd[29302]: Failed password for invalid user hadoop from 41.197.31.178 port 38256 ssh2 Dec 30 14:03:40 host sshd[29302]: Connection closed by 41.197.31.178 port 38256 [preauth] Dec 30 14:03:43 host sshd[29321]: Invalid user tmp from 103.13.40.2 port 55064 Dec 30 14:03:43 host sshd[29321]: input_userauth_request: invalid user tmp [preauth] Dec 30 14:03:43 host sshd[29321]: pam_unix(sshd:auth): check pass; user unknown Dec 30 14:03:43 host sshd[29321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 30 14:03:46 host sshd[29321]: Failed password for invalid user tmp from 103.13.40.2 port 55064 ssh2 Dec 30 14:03:46 host sshd[29321]: Connection closed by 103.13.40.2 port 55064 [preauth] Dec 30 14:10:05 host sshd[30380]: Invalid user mcserver from 162.218.126.136 port 41752 Dec 30 14:10:05 host sshd[30380]: input_userauth_request: invalid user mcserver [preauth] Dec 30 14:10:05 host sshd[30380]: pam_unix(sshd:auth): check pass; user unknown Dec 30 14:10:05 host sshd[30380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 30 14:10:08 host sshd[30380]: Failed password for invalid user mcserver from 162.218.126.136 port 41752 ssh2 Dec 30 14:10:08 host sshd[30380]: Connection closed by 162.218.126.136 port 41752 [preauth] Dec 30 14:18:46 host sshd[31971]: User root from 159.223.197.155 not allowed because not listed in AllowUsers Dec 30 14:18:46 host sshd[31971]: input_userauth_request: invalid user root [preauth] Dec 30 14:18:46 host unix_chkpwd[31975]: password check failed for user (root) Dec 30 14:18:46 host sshd[31971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.197.155 user=root Dec 30 14:18:46 host sshd[31971]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 14:18:48 host sshd[31971]: Failed password for invalid user root from 159.223.197.155 port 51350 ssh2 Dec 30 14:18:48 host sshd[31971]: Received disconnect from 159.223.197.155 port 51350:11: Bye Bye [preauth] Dec 30 14:18:48 host sshd[31971]: Disconnected from 159.223.197.155 port 51350 [preauth] Dec 30 14:19:31 host sshd[32073]: User root from 201.63.178.141 not allowed because not listed in AllowUsers Dec 30 14:19:31 host sshd[32073]: input_userauth_request: invalid user root [preauth] Dec 30 14:19:32 host unix_chkpwd[32079]: password check failed for user (root) Dec 30 14:19:32 host sshd[32073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.63.178.141 user=root Dec 30 14:19:32 host sshd[32073]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 14:19:34 host sshd[32073]: Failed password for invalid user root from 201.63.178.141 port 60777 ssh2 Dec 30 14:19:35 host sshd[32073]: Connection closed by 201.63.178.141 port 60777 [preauth] Dec 30 14:19:49 host sshd[32102]: User root from 43.154.217.32 not allowed because not listed in AllowUsers Dec 30 14:19:49 host sshd[32102]: input_userauth_request: invalid user root [preauth] Dec 30 14:19:49 host unix_chkpwd[32105]: password check failed for user (root) Dec 30 14:19:49 host sshd[32102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.154.217.32 user=root Dec 30 14:19:49 host sshd[32102]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 14:19:51 host sshd[32102]: Failed password for invalid user root from 43.154.217.32 port 42434 ssh2 Dec 30 14:19:52 host sshd[32102]: Received disconnect from 43.154.217.32 port 42434:11: Bye Bye [preauth] Dec 30 14:19:52 host sshd[32102]: Disconnected from 43.154.217.32 port 42434 [preauth] Dec 30 14:21:43 host sshd[32513]: User root from 5.2.73.73 not allowed because not listed in AllowUsers Dec 30 14:21:43 host sshd[32513]: input_userauth_request: invalid user root [preauth] Dec 30 14:21:43 host unix_chkpwd[32516]: password check failed for user (root) Dec 30 14:21:43 host sshd[32513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.2.73.73 user=root Dec 30 14:21:43 host sshd[32513]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 14:21:46 host sshd[32513]: Failed password for invalid user root from 5.2.73.73 port 46250 ssh2 Dec 30 14:21:46 host sshd[32513]: Received disconnect from 5.2.73.73 port 46250:11: Bye Bye [preauth] Dec 30 14:21:46 host sshd[32513]: Disconnected from 5.2.73.73 port 46250 [preauth] Dec 30 14:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 14:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 14:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 14:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 14:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 14:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 14:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 14:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 14:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 14:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 30 14:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 14:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 14:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 30 14:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 14:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 14:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 30 14:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 14:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 14:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 30 14:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 14:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 14:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 30 14:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 14:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 14:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 30 14:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 14:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 14:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 30 14:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 14:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 14:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 30 14:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 14:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 14:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 14:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 14:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 30 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwrmswll user-2=wwwresourcehunte user-3=keralaholi user-4=ugotscom user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=dartsimp user-9=a2zgroup user-10=cochintaxi user-11=wwwkaretakers user-12=mrsclean user-13=wwwnexidigital user-14=gifterman user-15=palco123 user-16=kottayamcalldriv user-17=phmetals user-18=wwwletsstalkfood user-19=straightcurve user-20=bonifacegroup user-21=wwwevmhonda user-22=pmcresources user-23=vfmassets user-24=wwwtestugo user-25=shalinijames user-26=wwwkapin user-27=woodpeck user-28=disposeat user-29=wwwkmaorg user-30=remysagr feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 30 14:21:50 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 30 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-mDm8RNT6fsXIue74.~ Dec 30 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-mDm8RNT6fsXIue74.~' Dec 30 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-mDm8RNT6fsXIue74.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 30 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 30 14:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 14:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 14:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 14:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 14:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 14:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 14:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 14:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 14:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 14:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 14:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 14:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 30 14:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 30 14:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 30 14:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 30 14:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 30 14:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 14:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 30 14:21:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 14:21:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 14:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 30 14:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 14:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 14:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 30 14:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 14:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 14:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 30 14:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 14:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 14:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 30 14:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 14:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 14:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 30 14:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 14:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 14:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 30 14:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 14:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 14:22:34 host sshd[397]: User root from 85.114.119.22 not allowed because not listed in AllowUsers Dec 30 14:22:34 host sshd[397]: input_userauth_request: invalid user root [preauth] Dec 30 14:22:34 host unix_chkpwd[407]: password check failed for user (root) Dec 30 14:22:34 host sshd[397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.114.119.22 user=root Dec 30 14:22:34 host sshd[397]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 14:22:36 host sshd[397]: Failed password for invalid user root from 85.114.119.22 port 43376 ssh2 Dec 30 14:22:36 host sshd[397]: Received disconnect from 85.114.119.22 port 43376:11: Bye Bye [preauth] Dec 30 14:22:36 host sshd[397]: Disconnected from 85.114.119.22 port 43376 [preauth] Dec 30 14:23:13 host sshd[499]: User root from 168.232.198.2 not allowed because not listed in AllowUsers Dec 30 14:23:13 host sshd[499]: input_userauth_request: invalid user root [preauth] Dec 30 14:23:13 host unix_chkpwd[508]: password check failed for user (root) Dec 30 14:23:13 host sshd[499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.232.198.2 user=root Dec 30 14:23:13 host sshd[499]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 14:23:15 host sshd[499]: Failed password for invalid user root from 168.232.198.2 port 43546 ssh2 Dec 30 14:23:15 host sshd[499]: Received disconnect from 168.232.198.2 port 43546:11: Bye Bye [preauth] Dec 30 14:23:15 host sshd[499]: Disconnected from 168.232.198.2 port 43546 [preauth] Dec 30 14:24:23 host sshd[679]: Invalid user user1 from 92.46.108.20 port 44914 Dec 30 14:24:23 host sshd[679]: input_userauth_request: invalid user user1 [preauth] Dec 30 14:24:24 host sshd[679]: pam_unix(sshd:auth): check pass; user unknown Dec 30 14:24:24 host sshd[679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 30 14:24:26 host sshd[679]: Failed password for invalid user user1 from 92.46.108.20 port 44914 ssh2 Dec 30 14:24:27 host sshd[709]: User root from 159.223.197.155 not allowed because not listed in AllowUsers Dec 30 14:24:27 host sshd[709]: input_userauth_request: invalid user root [preauth] Dec 30 14:24:27 host unix_chkpwd[713]: password check failed for user (root) Dec 30 14:24:27 host sshd[709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.197.155 user=root Dec 30 14:24:27 host sshd[709]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 14:24:27 host sshd[679]: Connection closed by 92.46.108.20 port 44914 [preauth] Dec 30 14:24:28 host sshd[709]: Failed password for invalid user root from 159.223.197.155 port 53938 ssh2 Dec 30 14:24:45 host sshd[774]: User root from 181.48.60.49 not allowed because not listed in AllowUsers Dec 30 14:24:45 host sshd[774]: input_userauth_request: invalid user root [preauth] Dec 30 14:24:45 host unix_chkpwd[779]: password check failed for user (root) Dec 30 14:24:45 host sshd[774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.60.49 user=root Dec 30 14:24:45 host sshd[774]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 14:24:47 host sshd[774]: Failed password for invalid user root from 181.48.60.49 port 50952 ssh2 Dec 30 14:24:47 host sshd[774]: Received disconnect from 181.48.60.49 port 50952:11: Bye Bye [preauth] Dec 30 14:24:47 host sshd[774]: Disconnected from 181.48.60.49 port 50952 [preauth] Dec 30 14:24:52 host sshd[788]: User root from 5.2.73.73 not allowed because not listed in AllowUsers Dec 30 14:24:52 host sshd[788]: input_userauth_request: invalid user root [preauth] Dec 30 14:24:52 host unix_chkpwd[791]: password check failed for user (root) Dec 30 14:24:52 host sshd[788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.2.73.73 user=root Dec 30 14:24:52 host sshd[788]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 14:24:55 host sshd[788]: Failed password for invalid user root from 5.2.73.73 port 58572 ssh2 Dec 30 14:25:18 host sshd[892]: User root from 85.114.119.22 not allowed because not listed in AllowUsers Dec 30 14:25:18 host sshd[892]: input_userauth_request: invalid user root [preauth] Dec 30 14:25:18 host unix_chkpwd[902]: password check failed for user (root) Dec 30 14:25:18 host sshd[892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.114.119.22 user=root Dec 30 14:25:18 host sshd[892]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 14:25:19 host sshd[892]: Failed password for invalid user root from 85.114.119.22 port 33747 ssh2 Dec 30 14:25:31 host sshd[974]: User root from 43.154.217.32 not allowed because not listed in AllowUsers Dec 30 14:25:31 host sshd[974]: input_userauth_request: invalid user root [preauth] Dec 30 14:25:31 host unix_chkpwd[977]: password check failed for user (root) Dec 30 14:25:31 host sshd[974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.154.217.32 user=root Dec 30 14:25:31 host sshd[974]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 14:25:33 host sshd[974]: Failed password for invalid user root from 43.154.217.32 port 38922 ssh2 Dec 30 14:25:33 host sshd[974]: Received disconnect from 43.154.217.32 port 38922:11: Bye Bye [preauth] Dec 30 14:25:33 host sshd[974]: Disconnected from 43.154.217.32 port 38922 [preauth] Dec 30 14:26:21 host sshd[1117]: User root from 168.232.198.2 not allowed because not listed in AllowUsers Dec 30 14:26:21 host sshd[1117]: input_userauth_request: invalid user root [preauth] Dec 30 14:26:21 host unix_chkpwd[1129]: password check failed for user (root) Dec 30 14:26:21 host sshd[1117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.232.198.2 user=root Dec 30 14:26:21 host sshd[1117]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 14:26:23 host sshd[1117]: Failed password for invalid user root from 168.232.198.2 port 40016 ssh2 Dec 30 14:26:32 host sshd[1306]: User root from 181.48.60.49 not allowed because not listed in AllowUsers Dec 30 14:26:32 host sshd[1306]: input_userauth_request: invalid user root [preauth] Dec 30 14:26:32 host unix_chkpwd[1313]: password check failed for user (root) Dec 30 14:26:32 host sshd[1306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.60.49 user=root Dec 30 14:26:32 host sshd[1306]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 14:26:34 host sshd[1306]: Failed password for invalid user root from 181.48.60.49 port 52784 ssh2 Dec 30 14:38:11 host sshd[3049]: Invalid user user from 83.252.13.77 port 43958 Dec 30 14:38:11 host sshd[3049]: input_userauth_request: invalid user user [preauth] Dec 30 14:38:12 host sshd[3049]: pam_unix(sshd:auth): check pass; user unknown Dec 30 14:38:12 host sshd[3049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.252.13.77 Dec 30 14:38:14 host sshd[3049]: Failed password for invalid user user from 83.252.13.77 port 43958 ssh2 Dec 30 14:38:14 host sshd[3049]: Connection closed by 83.252.13.77 port 43958 [preauth] Dec 30 14:43:09 host sshd[3777]: Invalid user admin from 194.169.175.102 port 58486 Dec 30 14:43:09 host sshd[3777]: input_userauth_request: invalid user admin [preauth] Dec 30 14:43:09 host sshd[3777]: pam_unix(sshd:auth): check pass; user unknown Dec 30 14:43:09 host sshd[3777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 Dec 30 14:43:11 host sshd[3777]: Failed password for invalid user admin from 194.169.175.102 port 58486 ssh2 Dec 30 14:43:11 host sshd[3777]: Received disconnect from 194.169.175.102 port 58486:11: Client disconnecting normally [preauth] Dec 30 14:43:11 host sshd[3777]: Disconnected from 194.169.175.102 port 58486 [preauth] Dec 30 14:56:28 host sshd[6067]: Invalid user admin from 43.250.59.74 port 42557 Dec 30 14:56:28 host sshd[6067]: input_userauth_request: invalid user admin [preauth] Dec 30 14:56:29 host sshd[6067]: pam_unix(sshd:auth): check pass; user unknown Dec 30 14:56:29 host sshd[6067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.250.59.74 Dec 30 14:56:31 host sshd[6067]: Failed password for invalid user admin from 43.250.59.74 port 42557 ssh2 Dec 30 14:56:32 host sshd[6067]: Connection closed by 43.250.59.74 port 42557 [preauth] Dec 30 15:07:54 host sshd[7794]: Invalid user user from 106.10.122.53 port 48382 Dec 30 15:07:54 host sshd[7794]: input_userauth_request: invalid user user [preauth] Dec 30 15:07:54 host sshd[7794]: pam_unix(sshd:auth): check pass; user unknown Dec 30 15:07:54 host sshd[7794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 30 15:07:56 host sshd[7794]: Failed password for invalid user user from 106.10.122.53 port 48382 ssh2 Dec 30 15:07:56 host sshd[7794]: Connection closed by 106.10.122.53 port 48382 [preauth] Dec 30 15:14:56 host sshd[8891]: Invalid user ubnt from 182.230.65.157 port 58060 Dec 30 15:14:56 host sshd[8891]: input_userauth_request: invalid user ubnt [preauth] Dec 30 15:14:56 host sshd[8891]: pam_unix(sshd:auth): check pass; user unknown Dec 30 15:14:56 host sshd[8891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.230.65.157 Dec 30 15:14:58 host sshd[8891]: Failed password for invalid user ubnt from 182.230.65.157 port 58060 ssh2 Dec 30 15:14:59 host sshd[8891]: Connection closed by 182.230.65.157 port 58060 [preauth] Dec 30 15:17:58 host sshd[9388]: Invalid user lx from 162.218.126.136 port 47638 Dec 30 15:17:58 host sshd[9388]: input_userauth_request: invalid user lx [preauth] Dec 30 15:17:58 host sshd[9388]: pam_unix(sshd:auth): check pass; user unknown Dec 30 15:17:58 host sshd[9388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 30 15:18:00 host sshd[9388]: Failed password for invalid user lx from 162.218.126.136 port 47638 ssh2 Dec 30 15:18:00 host sshd[9388]: Connection closed by 162.218.126.136 port 47638 [preauth] Dec 30 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 30 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 30 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 30 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 30 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 30 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 30 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 30 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 15:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 30 15:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 15:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 30 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=straightcurve user-2=wwwletsstalkfood user-3=bonifacegroup user-4=wwwevmhonda user-5=mrsclean user-6=wwwnexidigital user-7=palco123 user-8=gifterman user-9=kottayamcalldriv user-10=phmetals user-11=wwwkapin user-12=woodpeck user-13=wwwkmaorg user-14=disposeat user-15=remysagr user-16=pmcresources user-17=vfmassets user-18=shalinijames user-19=wwwtestugo user-20=wwwpmcresource user-21=keralaholi user-22=wwwresourcehunte user-23=wwwrmswll user-24=ugotscom user-25=travelboniface user-26=cochintaxi user-27=wwwkaretakers user-28=laundryboniface user-29=a2zgroup user-30=dartsimp feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 30 15:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 30 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-XHbRDfo32wv46aFU.~ Dec 30 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-XHbRDfo32wv46aFU.~' Dec 30 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-XHbRDfo32wv46aFU.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 15:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 30 15:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 15:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 30 15:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 15:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 15:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 15:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 15:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 15:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 30 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 15:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 30 15:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 30 15:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 30 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 30 15:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 15:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 30 15:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 15:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 15:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 30 15:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 15:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 30 15:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 15:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 30 15:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 15:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 15:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 30 15:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 15:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 15:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 30 15:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 15:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 15:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 30 15:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 15:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 15:27:54 host sshd[11106]: Did not receive identification string from 205.185.123.43 port 43288 Dec 30 15:32:33 host sshd[11724]: User root from 36.94.20.189 not allowed because not listed in AllowUsers Dec 30 15:32:33 host sshd[11724]: input_userauth_request: invalid user root [preauth] Dec 30 15:32:34 host sshd[11724]: Failed none for invalid user root from 36.94.20.189 port 38914 ssh2 Dec 30 15:32:34 host sshd[11724]: Connection closed by 36.94.20.189 port 38914 [preauth] Dec 30 15:34:59 host sshd[12113]: Invalid user fc from 45.93.201.90 port 37674 Dec 30 15:34:59 host sshd[12113]: input_userauth_request: invalid user fc [preauth] Dec 30 15:34:59 host sshd[12113]: pam_unix(sshd:auth): check pass; user unknown Dec 30 15:34:59 host sshd[12113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 30 15:35:01 host sshd[12113]: Failed password for invalid user fc from 45.93.201.90 port 37674 ssh2 Dec 30 15:35:05 host sshd[12113]: pam_unix(sshd:auth): check pass; user unknown Dec 30 15:35:07 host sshd[12113]: Failed password for invalid user fc from 45.93.201.90 port 37674 ssh2 Dec 30 15:35:10 host sshd[12113]: pam_unix(sshd:auth): check pass; user unknown Dec 30 15:35:12 host sshd[12113]: Failed password for invalid user fc from 45.93.201.90 port 37674 ssh2 Dec 30 15:35:15 host sshd[12113]: Connection closed by 45.93.201.90 port 37674 [preauth] Dec 30 15:35:15 host sshd[12113]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 30 15:35:44 host sshd[12258]: Invalid user zhaochen from 103.13.40.2 port 54586 Dec 30 15:35:44 host sshd[12258]: input_userauth_request: invalid user zhaochen [preauth] Dec 30 15:35:44 host sshd[12258]: pam_unix(sshd:auth): check pass; user unknown Dec 30 15:35:44 host sshd[12258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 30 15:35:46 host sshd[12258]: Failed password for invalid user zhaochen from 103.13.40.2 port 54586 ssh2 Dec 30 15:35:46 host sshd[12258]: Connection closed by 103.13.40.2 port 54586 [preauth] Dec 30 15:37:05 host sshd[12403]: User root from 49.88.112.113 not allowed because not listed in AllowUsers Dec 30 15:37:05 host sshd[12403]: input_userauth_request: invalid user root [preauth] Dec 30 15:37:05 host unix_chkpwd[12418]: password check failed for user (root) Dec 30 15:37:05 host sshd[12403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113 user=root Dec 30 15:37:05 host sshd[12403]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 15:37:07 host sshd[12403]: Failed password for invalid user root from 49.88.112.113 port 46031 ssh2 Dec 30 15:37:07 host unix_chkpwd[12421]: password check failed for user (root) Dec 30 15:37:07 host sshd[12403]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 15:37:10 host sshd[12403]: Failed password for invalid user root from 49.88.112.113 port 46031 ssh2 Dec 30 15:37:10 host unix_chkpwd[12424]: password check failed for user (root) Dec 30 15:37:10 host sshd[12403]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 15:37:12 host sshd[12403]: Failed password for invalid user root from 49.88.112.113 port 46031 ssh2 Dec 30 15:37:12 host sshd[12403]: Received disconnect from 49.88.112.113 port 46031:11: [preauth] Dec 30 15:37:12 host sshd[12403]: Disconnected from 49.88.112.113 port 46031 [preauth] Dec 30 15:37:12 host sshd[12403]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113 user=root Dec 30 15:49:35 host sshd[14264]: Connection closed by 103.86.146.27 port 50644 [preauth] Dec 30 15:49:39 host sshd[14302]: Connection closed by 167.248.133.62 port 55356 [preauth] Dec 30 15:50:17 host sshd[14442]: Invalid user mzc from 41.197.31.178 port 39042 Dec 30 15:50:17 host sshd[14442]: input_userauth_request: invalid user mzc [preauth] Dec 30 15:50:17 host sshd[14442]: pam_unix(sshd:auth): check pass; user unknown Dec 30 15:50:17 host sshd[14442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 30 15:50:19 host sshd[14442]: Failed password for invalid user mzc from 41.197.31.178 port 39042 ssh2 Dec 30 15:50:20 host sshd[14442]: Connection closed by 41.197.31.178 port 39042 [preauth] Dec 30 15:50:33 host sshd[14486]: Invalid user cssserver from 190.145.192.106 port 37188 Dec 30 15:50:33 host sshd[14486]: input_userauth_request: invalid user cssserver [preauth] Dec 30 15:50:33 host sshd[14486]: pam_unix(sshd:auth): check pass; user unknown Dec 30 15:50:33 host sshd[14486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.192.106 Dec 30 15:50:35 host sshd[14491]: User root from 193.122.148.73 not allowed because not listed in AllowUsers Dec 30 15:50:35 host sshd[14491]: input_userauth_request: invalid user root [preauth] Dec 30 15:50:35 host unix_chkpwd[14495]: password check failed for user (root) Dec 30 15:50:35 host sshd[14491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.148.73 user=root Dec 30 15:50:35 host sshd[14491]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 15:50:35 host sshd[14486]: Failed password for invalid user cssserver from 190.145.192.106 port 37188 ssh2 Dec 30 15:50:36 host sshd[14486]: Received disconnect from 190.145.192.106 port 37188:11: Bye Bye [preauth] Dec 30 15:50:36 host sshd[14486]: Disconnected from 190.145.192.106 port 37188 [preauth] Dec 30 15:50:36 host sshd[14491]: Failed password for invalid user root from 193.122.148.73 port 44884 ssh2 Dec 30 15:50:37 host sshd[14491]: Received disconnect from 193.122.148.73 port 44884:11: Bye Bye [preauth] Dec 30 15:50:37 host sshd[14491]: Disconnected from 193.122.148.73 port 44884 [preauth] Dec 30 15:51:18 host sshd[14682]: User centos from 23.105.201.79 not allowed because not listed in AllowUsers Dec 30 15:51:18 host sshd[14682]: input_userauth_request: invalid user centos [preauth] Dec 30 15:51:18 host unix_chkpwd[14685]: password check failed for user (centos) Dec 30 15:51:18 host sshd[14682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.105.201.79 user=centos Dec 30 15:51:20 host sshd[14682]: Failed password for invalid user centos from 23.105.201.79 port 58388 ssh2 Dec 30 15:51:20 host sshd[14682]: Received disconnect from 23.105.201.79 port 58388:11: Bye Bye [preauth] Dec 30 15:51:20 host sshd[14682]: Disconnected from 23.105.201.79 port 58388 [preauth] Dec 30 15:52:05 host sshd[14788]: Invalid user thomas from 27.71.25.144 port 43745 Dec 30 15:52:05 host sshd[14788]: input_userauth_request: invalid user thomas [preauth] Dec 30 15:52:05 host sshd[14788]: pam_unix(sshd:auth): check pass; user unknown Dec 30 15:52:05 host sshd[14788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.25.144 Dec 30 15:52:07 host sshd[14788]: Failed password for invalid user thomas from 27.71.25.144 port 43745 ssh2 Dec 30 15:52:07 host sshd[14788]: Received disconnect from 27.71.25.144 port 43745:11: Bye Bye [preauth] Dec 30 15:52:07 host sshd[14788]: Disconnected from 27.71.25.144 port 43745 [preauth] Dec 30 15:52:08 host sshd[14798]: User root from 94.180.57.15 not allowed because not listed in AllowUsers Dec 30 15:52:08 host sshd[14798]: input_userauth_request: invalid user root [preauth] Dec 30 15:52:08 host unix_chkpwd[14801]: password check failed for user (root) Dec 30 15:52:08 host sshd[14798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.180.57.15 user=root Dec 30 15:52:08 host sshd[14798]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 15:52:10 host sshd[14798]: Failed password for invalid user root from 94.180.57.15 port 42330 ssh2 Dec 30 15:52:10 host sshd[14798]: Received disconnect from 94.180.57.15 port 42330:11: Bye Bye [preauth] Dec 30 15:52:10 host sshd[14798]: Disconnected from 94.180.57.15 port 42330 [preauth] Dec 30 15:52:30 host sshd[14850]: Invalid user server from 45.154.12.139 port 34750 Dec 30 15:52:30 host sshd[14850]: input_userauth_request: invalid user server [preauth] Dec 30 15:52:30 host sshd[14850]: pam_unix(sshd:auth): check pass; user unknown Dec 30 15:52:30 host sshd[14850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.154.12.139 Dec 30 15:52:32 host sshd[14850]: Failed password for invalid user server from 45.154.12.139 port 34750 ssh2 Dec 30 15:52:32 host sshd[14850]: Received disconnect from 45.154.12.139 port 34750:11: Bye Bye [preauth] Dec 30 15:52:32 host sshd[14850]: Disconnected from 45.154.12.139 port 34750 [preauth] Dec 30 15:52:57 host sshd[14908]: User root from 34.91.0.68 not allowed because not listed in AllowUsers Dec 30 15:52:57 host sshd[14908]: input_userauth_request: invalid user root [preauth] Dec 30 15:52:57 host unix_chkpwd[14912]: password check failed for user (root) Dec 30 15:52:57 host sshd[14908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.91.0.68 user=root Dec 30 15:52:57 host sshd[14908]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 15:52:59 host sshd[14908]: Failed password for invalid user root from 34.91.0.68 port 55402 ssh2 Dec 30 15:53:00 host sshd[14908]: Received disconnect from 34.91.0.68 port 55402:11: Bye Bye [preauth] Dec 30 15:53:00 host sshd[14908]: Disconnected from 34.91.0.68 port 55402 [preauth] Dec 30 15:53:47 host sshd[15003]: User root from 138.197.175.169 not allowed because not listed in AllowUsers Dec 30 15:53:47 host sshd[15003]: input_userauth_request: invalid user root [preauth] Dec 30 15:53:47 host unix_chkpwd[15007]: password check failed for user (root) Dec 30 15:53:47 host sshd[15003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.175.169 user=root Dec 30 15:53:47 host sshd[15003]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 15:53:49 host sshd[15003]: Failed password for invalid user root from 138.197.175.169 port 43290 ssh2 Dec 30 15:53:50 host sshd[15003]: Received disconnect from 138.197.175.169 port 43290:11: Bye Bye [preauth] Dec 30 15:53:50 host sshd[15003]: Disconnected from 138.197.175.169 port 43290 [preauth] Dec 30 15:54:30 host sshd[15107]: Invalid user ubuntu from 112.213.124.175 port 56148 Dec 30 15:54:30 host sshd[15107]: input_userauth_request: invalid user ubuntu [preauth] Dec 30 15:54:30 host sshd[15107]: pam_unix(sshd:auth): check pass; user unknown Dec 30 15:54:30 host sshd[15107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.213.124.175 Dec 30 15:54:32 host sshd[15107]: Failed password for invalid user ubuntu from 112.213.124.175 port 56148 ssh2 Dec 30 15:54:32 host sshd[15107]: Received disconnect from 112.213.124.175 port 56148:11: Bye Bye [preauth] Dec 30 15:54:32 host sshd[15107]: Disconnected from 112.213.124.175 port 56148 [preauth] Dec 30 15:54:45 host sshd[15132]: Invalid user teamspeak from 165.227.231.151 port 43254 Dec 30 15:54:45 host sshd[15132]: input_userauth_request: invalid user teamspeak [preauth] Dec 30 15:54:45 host sshd[15132]: pam_unix(sshd:auth): check pass; user unknown Dec 30 15:54:45 host sshd[15132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.231.151 Dec 30 15:54:48 host sshd[15132]: Failed password for invalid user teamspeak from 165.227.231.151 port 43254 ssh2 Dec 30 15:54:48 host sshd[15132]: Received disconnect from 165.227.231.151 port 43254:11: Bye Bye [preauth] Dec 30 15:54:48 host sshd[15132]: Disconnected from 165.227.231.151 port 43254 [preauth] Dec 30 15:55:09 host sshd[15190]: User root from 34.91.0.68 not allowed because not listed in AllowUsers Dec 30 15:55:09 host sshd[15190]: input_userauth_request: invalid user root [preauth] Dec 30 15:55:09 host unix_chkpwd[15193]: password check failed for user (root) Dec 30 15:55:09 host sshd[15190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.91.0.68 user=root Dec 30 15:55:09 host sshd[15190]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 15:55:11 host sshd[15190]: Failed password for invalid user root from 34.91.0.68 port 34162 ssh2 Dec 30 15:55:11 host sshd[15190]: Received disconnect from 34.91.0.68 port 34162:11: Bye Bye [preauth] Dec 30 15:55:11 host sshd[15190]: Disconnected from 34.91.0.68 port 34162 [preauth] Dec 30 15:55:14 host sshd[15228]: User root from 89.95.219.110 not allowed because not listed in AllowUsers Dec 30 15:55:14 host sshd[15228]: input_userauth_request: invalid user root [preauth] Dec 30 15:55:14 host unix_chkpwd[15234]: password check failed for user (root) Dec 30 15:55:14 host sshd[15228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.95.219.110 user=root Dec 30 15:55:14 host sshd[15228]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 15:55:16 host sshd[15228]: Failed password for invalid user root from 89.95.219.110 port 37636 ssh2 Dec 30 15:55:16 host sshd[15228]: Received disconnect from 89.95.219.110 port 37636:11: Bye Bye [preauth] Dec 30 15:55:16 host sshd[15228]: Disconnected from 89.95.219.110 port 37636 [preauth] Dec 30 15:55:41 host sshd[15300]: User root from 170.106.114.160 not allowed because not listed in AllowUsers Dec 30 15:55:41 host sshd[15300]: input_userauth_request: invalid user root [preauth] Dec 30 15:55:41 host unix_chkpwd[15314]: password check failed for user (root) Dec 30 15:55:41 host sshd[15300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.114.160 user=root Dec 30 15:55:41 host sshd[15300]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 15:55:44 host sshd[15300]: Failed password for invalid user root from 170.106.114.160 port 44538 ssh2 Dec 30 15:55:44 host sshd[15300]: Received disconnect from 170.106.114.160 port 44538:11: Bye Bye [preauth] Dec 30 15:55:44 host sshd[15300]: Disconnected from 170.106.114.160 port 44538 [preauth] Dec 30 15:55:49 host sshd[15423]: User root from 51.250.64.79 not allowed because not listed in AllowUsers Dec 30 15:55:49 host sshd[15423]: input_userauth_request: invalid user root [preauth] Dec 30 15:55:49 host unix_chkpwd[15426]: password check failed for user (root) Dec 30 15:55:49 host sshd[15423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.64.79 user=root Dec 30 15:55:49 host sshd[15423]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 15:55:51 host sshd[15423]: Failed password for invalid user root from 51.250.64.79 port 49554 ssh2 Dec 30 15:55:51 host sshd[15423]: Received disconnect from 51.250.64.79 port 49554:11: Bye Bye [preauth] Dec 30 15:55:51 host sshd[15423]: Disconnected from 51.250.64.79 port 49554 [preauth] Dec 30 15:56:09 host sshd[15514]: Invalid user amir from 193.122.148.73 port 45130 Dec 30 15:56:09 host sshd[15514]: input_userauth_request: invalid user amir [preauth] Dec 30 15:56:09 host sshd[15514]: pam_unix(sshd:auth): check pass; user unknown Dec 30 15:56:09 host sshd[15514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.148.73 Dec 30 15:56:10 host sshd[15521]: Invalid user teste1 from 94.180.57.15 port 55246 Dec 30 15:56:10 host sshd[15521]: input_userauth_request: invalid user teste1 [preauth] Dec 30 15:56:10 host sshd[15521]: pam_unix(sshd:auth): check pass; user unknown Dec 30 15:56:10 host sshd[15521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.180.57.15 Dec 30 15:56:10 host sshd[15514]: Failed password for invalid user amir from 193.122.148.73 port 45130 ssh2 Dec 30 15:56:11 host sshd[15526]: User root from 165.227.231.151 not allowed because not listed in AllowUsers Dec 30 15:56:11 host sshd[15526]: input_userauth_request: invalid user root [preauth] Dec 30 15:56:11 host unix_chkpwd[15536]: password check failed for user (root) Dec 30 15:56:11 host sshd[15526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.231.151 user=root Dec 30 15:56:11 host sshd[15526]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 15:56:11 host sshd[15530]: User root from 27.71.25.144 not allowed because not listed in AllowUsers Dec 30 15:56:11 host sshd[15530]: input_userauth_request: invalid user root [preauth] Dec 30 15:56:11 host unix_chkpwd[15541]: password check failed for user (root) Dec 30 15:56:11 host sshd[15530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.25.144 user=root Dec 30 15:56:11 host sshd[15530]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 15:56:11 host sshd[15514]: Received disconnect from 193.122.148.73 port 45130:11: Bye Bye [preauth] Dec 30 15:56:11 host sshd[15514]: Disconnected from 193.122.148.73 port 45130 [preauth] Dec 30 15:56:12 host sshd[15521]: Failed password for invalid user teste1 from 94.180.57.15 port 55246 ssh2 Dec 30 15:56:12 host sshd[15521]: Received disconnect from 94.180.57.15 port 55246:11: Bye Bye [preauth] Dec 30 15:56:12 host sshd[15521]: Disconnected from 94.180.57.15 port 55246 [preauth] Dec 30 15:56:13 host sshd[15526]: Failed password for invalid user root from 165.227.231.151 port 60864 ssh2 Dec 30 15:56:13 host sshd[15530]: Failed password for invalid user root from 27.71.25.144 port 33984 ssh2 Dec 30 15:56:13 host sshd[15530]: Received disconnect from 27.71.25.144 port 33984:11: Bye Bye [preauth] Dec 30 15:56:13 host sshd[15530]: Disconnected from 27.71.25.144 port 33984 [preauth] Dec 30 15:56:13 host sshd[15526]: Received disconnect from 165.227.231.151 port 60864:11: Bye Bye [preauth] Dec 30 15:56:13 host sshd[15526]: Disconnected from 165.227.231.151 port 60864 [preauth] Dec 30 15:56:23 host sshd[15668]: Invalid user wang from 138.197.175.169 port 49044 Dec 30 15:56:23 host sshd[15668]: input_userauth_request: invalid user wang [preauth] Dec 30 15:56:23 host sshd[15668]: pam_unix(sshd:auth): check pass; user unknown Dec 30 15:56:23 host sshd[15668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.175.169 Dec 30 15:56:25 host sshd[15668]: Failed password for invalid user wang from 138.197.175.169 port 49044 ssh2 Dec 30 15:56:25 host sshd[15668]: Received disconnect from 138.197.175.169 port 49044:11: Bye Bye [preauth] Dec 30 15:56:25 host sshd[15668]: Disconnected from 138.197.175.169 port 49044 [preauth] Dec 30 15:56:46 host sshd[15753]: Invalid user teste from 190.145.192.106 port 33430 Dec 30 15:56:46 host sshd[15753]: input_userauth_request: invalid user teste [preauth] Dec 30 15:56:46 host sshd[15753]: pam_unix(sshd:auth): check pass; user unknown Dec 30 15:56:46 host sshd[15753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.192.106 Dec 30 15:56:48 host sshd[15753]: Failed password for invalid user teste from 190.145.192.106 port 33430 ssh2 Dec 30 15:56:48 host sshd[15753]: Received disconnect from 190.145.192.106 port 33430:11: Bye Bye [preauth] Dec 30 15:56:48 host sshd[15753]: Disconnected from 190.145.192.106 port 33430 [preauth] Dec 30 15:57:00 host sshd[15795]: Invalid user ftpuser from 112.213.124.175 port 59730 Dec 30 15:57:00 host sshd[15795]: input_userauth_request: invalid user ftpuser [preauth] Dec 30 15:57:00 host sshd[15795]: pam_unix(sshd:auth): check pass; user unknown Dec 30 15:57:00 host sshd[15795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.213.124.175 Dec 30 15:57:03 host sshd[15795]: Failed password for invalid user ftpuser from 112.213.124.175 port 59730 ssh2 Dec 30 15:57:03 host sshd[15795]: Received disconnect from 112.213.124.175 port 59730:11: Bye Bye [preauth] Dec 30 15:57:03 host sshd[15795]: Disconnected from 112.213.124.175 port 59730 [preauth] Dec 30 15:57:08 host sshd[15816]: Invalid user bwadmin from 45.154.12.139 port 50632 Dec 30 15:57:08 host sshd[15816]: input_userauth_request: invalid user bwadmin [preauth] Dec 30 15:57:08 host sshd[15816]: pam_unix(sshd:auth): check pass; user unknown Dec 30 15:57:08 host sshd[15816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.154.12.139 Dec 30 15:57:09 host sshd[15816]: Failed password for invalid user bwadmin from 45.154.12.139 port 50632 ssh2 Dec 30 15:57:09 host sshd[15816]: Received disconnect from 45.154.12.139 port 50632:11: Bye Bye [preauth] Dec 30 15:57:09 host sshd[15816]: Disconnected from 45.154.12.139 port 50632 [preauth] Dec 30 15:57:14 host sshd[15823]: Invalid user user03 from 89.95.219.110 port 41396 Dec 30 15:57:14 host sshd[15823]: input_userauth_request: invalid user user03 [preauth] Dec 30 15:57:14 host sshd[15823]: pam_unix(sshd:auth): check pass; user unknown Dec 30 15:57:14 host sshd[15823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.95.219.110 Dec 30 15:57:15 host sshd[15823]: Failed password for invalid user user03 from 89.95.219.110 port 41396 ssh2 Dec 30 15:57:16 host sshd[15823]: Received disconnect from 89.95.219.110 port 41396:11: Bye Bye [preauth] Dec 30 15:57:16 host sshd[15823]: Disconnected from 89.95.219.110 port 41396 [preauth] Dec 30 15:57:23 host sshd[15867]: User root from 77.73.133.3 not allowed because not listed in AllowUsers Dec 30 15:57:23 host sshd[15867]: input_userauth_request: invalid user root [preauth] Dec 30 15:57:23 host unix_chkpwd[15871]: password check failed for user (root) Dec 30 15:57:23 host sshd[15867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.73.133.3 user=root Dec 30 15:57:23 host sshd[15867]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 15:57:25 host sshd[15867]: Failed password for invalid user root from 77.73.133.3 port 41370 ssh2 Dec 30 15:57:26 host sshd[15867]: Received disconnect from 77.73.133.3 port 41370:11: Bye Bye [preauth] Dec 30 15:57:26 host sshd[15867]: Disconnected from 77.73.133.3 port 41370 [preauth] Dec 30 15:57:34 host sshd[15903]: User root from 107.189.29.149 not allowed because not listed in AllowUsers Dec 30 15:57:34 host sshd[15903]: input_userauth_request: invalid user root [preauth] Dec 30 15:57:34 host unix_chkpwd[15906]: password check failed for user (root) Dec 30 15:57:34 host sshd[15903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.29.149 user=root Dec 30 15:57:34 host sshd[15903]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 15:57:36 host sshd[15903]: Failed password for invalid user root from 107.189.29.149 port 54840 ssh2 Dec 30 15:57:36 host sshd[15903]: Received disconnect from 107.189.29.149 port 54840:11: Bye Bye [preauth] Dec 30 15:57:36 host sshd[15903]: Disconnected from 107.189.29.149 port 54840 [preauth] Dec 30 15:57:38 host sshd[15911]: User root from 117.216.211.19 not allowed because not listed in AllowUsers Dec 30 15:57:38 host sshd[15911]: input_userauth_request: invalid user root [preauth] Dec 30 15:57:38 host unix_chkpwd[15914]: password check failed for user (root) Dec 30 15:57:38 host sshd[15911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.216.211.19 user=root Dec 30 15:57:38 host sshd[15911]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 15:57:40 host sshd[15911]: Failed password for invalid user root from 117.216.211.19 port 57604 ssh2 Dec 30 15:57:40 host sshd[15911]: Received disconnect from 117.216.211.19 port 57604:11: Bye Bye [preauth] Dec 30 15:57:40 host sshd[15911]: Disconnected from 117.216.211.19 port 57604 [preauth] Dec 30 15:57:43 host sshd[15925]: User root from 103.119.104.254 not allowed because not listed in AllowUsers Dec 30 15:57:43 host sshd[15925]: input_userauth_request: invalid user root [preauth] Dec 30 15:57:43 host unix_chkpwd[15927]: password check failed for user (root) Dec 30 15:57:43 host sshd[15925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.119.104.254 user=root Dec 30 15:57:43 host sshd[15925]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 15:57:45 host sshd[15925]: Failed password for invalid user root from 103.119.104.254 port 48490 ssh2 Dec 30 15:57:45 host sshd[15925]: Received disconnect from 103.119.104.254 port 48490:11: Bye Bye [preauth] Dec 30 15:57:45 host sshd[15925]: Disconnected from 103.119.104.254 port 48490 [preauth] Dec 30 15:58:09 host sshd[15969]: User root from 190.145.192.106 not allowed because not listed in AllowUsers Dec 30 15:58:09 host sshd[15969]: input_userauth_request: invalid user root [preauth] Dec 30 15:58:09 host unix_chkpwd[15972]: password check failed for user (root) Dec 30 15:58:09 host sshd[15969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.192.106 user=root Dec 30 15:58:09 host sshd[15969]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 15:58:10 host sshd[15969]: Failed password for invalid user root from 190.145.192.106 port 57558 ssh2 Dec 30 15:58:11 host sshd[15969]: Received disconnect from 190.145.192.106 port 57558:11: Bye Bye [preauth] Dec 30 15:58:11 host sshd[15969]: Disconnected from 190.145.192.106 port 57558 [preauth] Dec 30 15:58:14 host sshd[16008]: Invalid user hadoop from 112.213.124.175 port 55188 Dec 30 15:58:14 host sshd[16008]: input_userauth_request: invalid user hadoop [preauth] Dec 30 15:58:14 host sshd[16008]: pam_unix(sshd:auth): check pass; user unknown Dec 30 15:58:14 host sshd[16008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.213.124.175 Dec 30 15:58:16 host sshd[16008]: Failed password for invalid user hadoop from 112.213.124.175 port 55188 ssh2 Dec 30 15:58:16 host sshd[16008]: Received disconnect from 112.213.124.175 port 55188:11: Bye Bye [preauth] Dec 30 15:58:16 host sshd[16008]: Disconnected from 112.213.124.175 port 55188 [preauth] Dec 30 15:58:32 host sshd[16046]: Invalid user hadoop from 23.105.201.79 port 46736 Dec 30 15:58:32 host sshd[16046]: input_userauth_request: invalid user hadoop [preauth] Dec 30 15:58:32 host sshd[16046]: pam_unix(sshd:auth): check pass; user unknown Dec 30 15:58:32 host sshd[16046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.105.201.79 Dec 30 15:58:34 host sshd[16046]: Failed password for invalid user hadoop from 23.105.201.79 port 46736 ssh2 Dec 30 15:58:35 host sshd[16046]: Received disconnect from 23.105.201.79 port 46736:11: Bye Bye [preauth] Dec 30 15:58:35 host sshd[16046]: Disconnected from 23.105.201.79 port 46736 [preauth] Dec 30 15:58:35 host sshd[16080]: Invalid user ubuntu from 45.154.12.139 port 47108 Dec 30 15:58:35 host sshd[16080]: input_userauth_request: invalid user ubuntu [preauth] Dec 30 15:58:35 host sshd[16080]: pam_unix(sshd:auth): check pass; user unknown Dec 30 15:58:35 host sshd[16080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.154.12.139 Dec 30 15:58:36 host sshd[16080]: Failed password for invalid user ubuntu from 45.154.12.139 port 47108 ssh2 Dec 30 15:58:37 host sshd[16080]: Received disconnect from 45.154.12.139 port 47108:11: Bye Bye [preauth] Dec 30 15:58:37 host sshd[16080]: Disconnected from 45.154.12.139 port 47108 [preauth] Dec 30 15:59:06 host sshd[16204]: User root from 202.137.130.61 not allowed because not listed in AllowUsers Dec 30 15:59:06 host sshd[16204]: input_userauth_request: invalid user root [preauth] Dec 30 15:59:06 host unix_chkpwd[16206]: password check failed for user (root) Dec 30 15:59:06 host sshd[16204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.137.130.61 user=root Dec 30 15:59:06 host sshd[16204]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 15:59:08 host sshd[16204]: Failed password for invalid user root from 202.137.130.61 port 57648 ssh2 Dec 30 15:59:08 host sshd[16204]: Received disconnect from 202.137.130.61 port 57648:11: Bye Bye [preauth] Dec 30 15:59:08 host sshd[16204]: Disconnected from 202.137.130.61 port 57648 [preauth] Dec 30 15:59:55 host sshd[16295]: User root from 200.201.146.44 not allowed because not listed in AllowUsers Dec 30 15:59:55 host sshd[16295]: input_userauth_request: invalid user root [preauth] Dec 30 15:59:55 host unix_chkpwd[16300]: password check failed for user (root) Dec 30 15:59:55 host sshd[16295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.201.146.44 user=root Dec 30 15:59:55 host sshd[16295]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 15:59:56 host sshd[16295]: Failed password for invalid user root from 200.201.146.44 port 45188 ssh2 Dec 30 15:59:57 host sshd[16295]: Received disconnect from 200.201.146.44 port 45188:11: Bye Bye [preauth] Dec 30 15:59:57 host sshd[16295]: Disconnected from 200.201.146.44 port 45188 [preauth] Dec 30 16:00:34 host sshd[16401]: User root from 43.134.40.99 not allowed because not listed in AllowUsers Dec 30 16:00:34 host sshd[16401]: input_userauth_request: invalid user root [preauth] Dec 30 16:00:34 host unix_chkpwd[16404]: password check failed for user (root) Dec 30 16:00:34 host sshd[16401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.40.99 user=root Dec 30 16:00:34 host sshd[16401]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 16:00:37 host sshd[16401]: Failed password for invalid user root from 43.134.40.99 port 34868 ssh2 Dec 30 16:00:37 host sshd[16401]: Received disconnect from 43.134.40.99 port 34868:11: Bye Bye [preauth] Dec 30 16:00:37 host sshd[16401]: Disconnected from 43.134.40.99 port 34868 [preauth] Dec 30 16:01:17 host sshd[16617]: User root from 107.189.29.149 not allowed because not listed in AllowUsers Dec 30 16:01:17 host sshd[16617]: input_userauth_request: invalid user root [preauth] Dec 30 16:01:17 host unix_chkpwd[16620]: password check failed for user (root) Dec 30 16:01:17 host sshd[16617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.29.149 user=root Dec 30 16:01:17 host sshd[16617]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 16:01:19 host sshd[16617]: Failed password for invalid user root from 107.189.29.149 port 50982 ssh2 Dec 30 16:01:19 host sshd[16617]: Received disconnect from 107.189.29.149 port 50982:11: Bye Bye [preauth] Dec 30 16:01:19 host sshd[16617]: Disconnected from 107.189.29.149 port 50982 [preauth] Dec 30 16:01:42 host sshd[16706]: User root from 51.250.64.79 not allowed because not listed in AllowUsers Dec 30 16:01:42 host sshd[16706]: input_userauth_request: invalid user root [preauth] Dec 30 16:01:42 host unix_chkpwd[16717]: password check failed for user (root) Dec 30 16:01:42 host sshd[16706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.64.79 user=root Dec 30 16:01:42 host sshd[16706]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 16:01:45 host sshd[16706]: Failed password for invalid user root from 51.250.64.79 port 52050 ssh2 Dec 30 16:01:45 host sshd[16706]: Received disconnect from 51.250.64.79 port 52050:11: Bye Bye [preauth] Dec 30 16:01:45 host sshd[16706]: Disconnected from 51.250.64.79 port 52050 [preauth] Dec 30 16:01:58 host sshd[16765]: User root from 143.110.176.216 not allowed because not listed in AllowUsers Dec 30 16:01:58 host sshd[16765]: input_userauth_request: invalid user root [preauth] Dec 30 16:01:58 host unix_chkpwd[16767]: password check failed for user (root) Dec 30 16:01:58 host sshd[16765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.176.216 user=root Dec 30 16:01:58 host sshd[16765]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 16:02:00 host sshd[16765]: Failed password for invalid user root from 143.110.176.216 port 35420 ssh2 Dec 30 16:02:00 host sshd[16765]: Received disconnect from 143.110.176.216 port 35420:11: Bye Bye [preauth] Dec 30 16:02:00 host sshd[16765]: Disconnected from 143.110.176.216 port 35420 [preauth] Dec 30 16:02:03 host sshd[16786]: User root from 77.73.133.3 not allowed because not listed in AllowUsers Dec 30 16:02:03 host sshd[16786]: input_userauth_request: invalid user root [preauth] Dec 30 16:02:03 host unix_chkpwd[16788]: password check failed for user (root) Dec 30 16:02:03 host sshd[16786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.73.133.3 user=root Dec 30 16:02:03 host sshd[16786]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 16:02:05 host sshd[16786]: Failed password for invalid user root from 77.73.133.3 port 38714 ssh2 Dec 30 16:02:05 host sshd[16786]: Received disconnect from 77.73.133.3 port 38714:11: Bye Bye [preauth] Dec 30 16:02:05 host sshd[16786]: Disconnected from 77.73.133.3 port 38714 [preauth] Dec 30 16:02:08 host sshd[16826]: User root from 170.106.114.160 not allowed because not listed in AllowUsers Dec 30 16:02:08 host sshd[16826]: input_userauth_request: invalid user root [preauth] Dec 30 16:02:08 host unix_chkpwd[16829]: password check failed for user (root) Dec 30 16:02:08 host sshd[16826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.114.160 user=root Dec 30 16:02:08 host sshd[16826]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 16:02:10 host sshd[16826]: Failed password for invalid user root from 170.106.114.160 port 47136 ssh2 Dec 30 16:02:10 host sshd[16826]: Received disconnect from 170.106.114.160 port 47136:11: Bye Bye [preauth] Dec 30 16:02:10 host sshd[16826]: Disconnected from 170.106.114.160 port 47136 [preauth] Dec 30 16:02:36 host sshd[16926]: User root from 202.137.130.61 not allowed because not listed in AllowUsers Dec 30 16:02:36 host sshd[16926]: input_userauth_request: invalid user root [preauth] Dec 30 16:02:36 host unix_chkpwd[16929]: password check failed for user (root) Dec 30 16:02:36 host sshd[16926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.137.130.61 user=root Dec 30 16:02:36 host sshd[16926]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 16:02:38 host sshd[16926]: Failed password for invalid user root from 202.137.130.61 port 43310 ssh2 Dec 30 16:02:38 host sshd[16926]: Received disconnect from 202.137.130.61 port 43310:11: Bye Bye [preauth] Dec 30 16:02:38 host sshd[16926]: Disconnected from 202.137.130.61 port 43310 [preauth] Dec 30 16:03:14 host sshd[17044]: User root from 187.217.75.226 not allowed because not listed in AllowUsers Dec 30 16:03:14 host sshd[17044]: input_userauth_request: invalid user root [preauth] Dec 30 16:03:14 host unix_chkpwd[17047]: password check failed for user (root) Dec 30 16:03:14 host sshd[17044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.217.75.226 user=root Dec 30 16:03:14 host sshd[17044]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 16:03:16 host sshd[17044]: Failed password for invalid user root from 187.217.75.226 port 54490 ssh2 Dec 30 16:03:16 host sshd[17044]: Received disconnect from 187.217.75.226 port 54490:11: Bye Bye [preauth] Dec 30 16:03:16 host sshd[17044]: Disconnected from 187.217.75.226 port 54490 [preauth] Dec 30 16:03:18 host sshd[17054]: User root from 103.119.104.254 not allowed because not listed in AllowUsers Dec 30 16:03:18 host sshd[17054]: input_userauth_request: invalid user root [preauth] Dec 30 16:03:18 host unix_chkpwd[17057]: password check failed for user (root) Dec 30 16:03:18 host sshd[17054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.119.104.254 user=root Dec 30 16:03:18 host sshd[17054]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 16:03:20 host sshd[17054]: Failed password for invalid user root from 103.119.104.254 port 42432 ssh2 Dec 30 16:03:20 host sshd[17054]: Received disconnect from 103.119.104.254 port 42432:11: Bye Bye [preauth] Dec 30 16:03:20 host sshd[17054]: Disconnected from 103.119.104.254 port 42432 [preauth] Dec 30 16:03:28 host sshd[17127]: User root from 117.216.211.19 not allowed because not listed in AllowUsers Dec 30 16:03:28 host sshd[17127]: input_userauth_request: invalid user root [preauth] Dec 30 16:03:28 host unix_chkpwd[17129]: password check failed for user (root) Dec 30 16:03:28 host sshd[17127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.216.211.19 user=root Dec 30 16:03:28 host sshd[17127]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 16:03:30 host sshd[17127]: Failed password for invalid user root from 117.216.211.19 port 52746 ssh2 Dec 30 16:03:30 host sshd[17127]: Received disconnect from 117.216.211.19 port 52746:11: Bye Bye [preauth] Dec 30 16:03:30 host sshd[17127]: Disconnected from 117.216.211.19 port 52746 [preauth] Dec 30 16:03:40 host sshd[17193]: User root from 143.110.176.216 not allowed because not listed in AllowUsers Dec 30 16:03:40 host sshd[17193]: input_userauth_request: invalid user root [preauth] Dec 30 16:03:40 host unix_chkpwd[17196]: password check failed for user (root) Dec 30 16:03:40 host sshd[17193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.176.216 user=root Dec 30 16:03:40 host sshd[17193]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 16:03:42 host sshd[17193]: Failed password for invalid user root from 143.110.176.216 port 32994 ssh2 Dec 30 16:03:42 host sshd[17193]: Received disconnect from 143.110.176.216 port 32994:11: Bye Bye [preauth] Dec 30 16:03:42 host sshd[17193]: Disconnected from 143.110.176.216 port 32994 [preauth] Dec 30 16:04:05 host sshd[17308]: User root from 200.201.146.44 not allowed because not listed in AllowUsers Dec 30 16:04:05 host sshd[17308]: input_userauth_request: invalid user root [preauth] Dec 30 16:04:05 host unix_chkpwd[17313]: password check failed for user (root) Dec 30 16:04:05 host sshd[17308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.201.146.44 user=root Dec 30 16:04:05 host sshd[17308]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 16:04:07 host sshd[17308]: Failed password for invalid user root from 200.201.146.44 port 58338 ssh2 Dec 30 16:04:07 host sshd[17308]: Received disconnect from 200.201.146.44 port 58338:11: Bye Bye [preauth] Dec 30 16:04:07 host sshd[17308]: Disconnected from 200.201.146.44 port 58338 [preauth] Dec 30 16:05:53 host sshd[17637]: User root from 43.134.40.99 not allowed because not listed in AllowUsers Dec 30 16:05:53 host sshd[17637]: input_userauth_request: invalid user root [preauth] Dec 30 16:05:53 host unix_chkpwd[17639]: password check failed for user (root) Dec 30 16:05:53 host sshd[17637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.40.99 user=root Dec 30 16:05:53 host sshd[17637]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 16:05:55 host sshd[17637]: Failed password for invalid user root from 43.134.40.99 port 47520 ssh2 Dec 30 16:05:55 host sshd[17637]: Received disconnect from 43.134.40.99 port 47520:11: Bye Bye [preauth] Dec 30 16:05:55 host sshd[17637]: Disconnected from 43.134.40.99 port 47520 [preauth] Dec 30 16:06:10 host sshd[17813]: User root from 187.217.75.226 not allowed because not listed in AllowUsers Dec 30 16:06:10 host sshd[17813]: input_userauth_request: invalid user root [preauth] Dec 30 16:06:10 host unix_chkpwd[17819]: password check failed for user (root) Dec 30 16:06:10 host sshd[17813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.217.75.226 user=root Dec 30 16:06:10 host sshd[17813]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 16:06:12 host sshd[17813]: Failed password for invalid user root from 187.217.75.226 port 46128 ssh2 Dec 30 16:06:59 host sshd[17983]: User root from 197.255.135.241 not allowed because not listed in AllowUsers Dec 30 16:06:59 host sshd[17983]: input_userauth_request: invalid user root [preauth] Dec 30 16:06:59 host unix_chkpwd[17988]: password check failed for user (root) Dec 30 16:06:59 host sshd[17983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.255.135.241 user=root Dec 30 16:06:59 host sshd[17983]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 16:07:02 host sshd[17983]: Failed password for invalid user root from 197.255.135.241 port 51659 ssh2 Dec 30 16:07:02 host sshd[17983]: Connection closed by 197.255.135.241 port 51659 [preauth] Dec 30 16:07:55 host sshd[18117]: Invalid user backup from 104.244.74.6 port 33504 Dec 30 16:07:55 host sshd[18117]: input_userauth_request: invalid user backup [preauth] Dec 30 16:07:55 host sshd[18117]: pam_unix(sshd:auth): check pass; user unknown Dec 30 16:07:55 host sshd[18117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Dec 30 16:07:57 host sshd[18117]: Failed password for invalid user backup from 104.244.74.6 port 33504 ssh2 Dec 30 16:07:57 host sshd[18117]: Connection closed by 104.244.74.6 port 33504 [preauth] Dec 30 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 30 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 30 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 30 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 30 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 30 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 30 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 30 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 16:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 30 16:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 16:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 16:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 16:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 30 16:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 16:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=a2zgroup user-2=dartsimp user-3=laundryboniface user-4=wwwkaretakers user-5=cochintaxi user-6=travelboniface user-7=ugotscom user-8=keralaholi user-9=wwwresourcehunte user-10=wwwrmswll user-11=wwwpmcresource user-12=shalinijames user-13=wwwtestugo user-14=vfmassets user-15=pmcresources user-16=remysagr user-17=disposeat user-18=wwwkmaorg user-19=wwwkapin user-20=woodpeck user-21=phmetals user-22=kottayamcalldriv user-23=palco123 user-24=gifterman user-25=wwwnexidigital user-26=mrsclean user-27=wwwevmhonda user-28=bonifacegroup user-29=wwwletsstalkfood user-30=straightcurve feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 30 16:21:51 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 30 16:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 16:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-n7kLGmUzW1vn7m94.~ Dec 30 16:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-n7kLGmUzW1vn7m94.~' Dec 30 16:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-n7kLGmUzW1vn7m94.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 16:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 30 16:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 30 16:21:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 16:21:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 30 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 16:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 16:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 16:21:54 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 16:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 30 16:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 30 16:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 30 16:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 30 16:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 16:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 16:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 30 16:21:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 16:21:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 16:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 30 16:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 16:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 16:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 30 16:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 16:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 16:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 30 16:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 16:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 16:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 30 16:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 16:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 16:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 30 16:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 16:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 16:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 30 16:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 16:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 16:22:30 host sshd[20404]: Invalid user backup from 104.244.74.6 port 58124 Dec 30 16:22:30 host sshd[20404]: input_userauth_request: invalid user backup [preauth] Dec 30 16:22:31 host sshd[20404]: pam_unix(sshd:auth): check pass; user unknown Dec 30 16:22:31 host sshd[20404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Dec 30 16:22:33 host sshd[20404]: Failed password for invalid user backup from 104.244.74.6 port 58124 ssh2 Dec 30 16:22:33 host sshd[20404]: Connection closed by 104.244.74.6 port 58124 [preauth] Dec 30 16:25:00 host sshd[20734]: Invalid user 1234 from 185.41.111.50 port 58608 Dec 30 16:25:00 host sshd[20734]: input_userauth_request: invalid user 1234 [preauth] Dec 30 16:25:00 host sshd[20764]: Invalid user user1 from 162.218.126.136 port 44468 Dec 30 16:25:00 host sshd[20764]: input_userauth_request: invalid user user1 [preauth] Dec 30 16:25:00 host sshd[20764]: pam_unix(sshd:auth): check pass; user unknown Dec 30 16:25:00 host sshd[20764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 30 16:25:00 host sshd[20734]: pam_unix(sshd:auth): check pass; user unknown Dec 30 16:25:00 host sshd[20734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.41.111.50 Dec 30 16:25:02 host sshd[20764]: Failed password for invalid user user1 from 162.218.126.136 port 44468 ssh2 Dec 30 16:25:02 host sshd[20734]: Failed password for invalid user 1234 from 185.41.111.50 port 58608 ssh2 Dec 30 16:25:03 host sshd[20764]: Connection closed by 162.218.126.136 port 44468 [preauth] Dec 30 16:25:03 host sshd[20734]: Connection closed by 185.41.111.50 port 58608 [preauth] Dec 30 16:38:13 host sshd[22555]: Invalid user chw from 106.10.122.53 port 47744 Dec 30 16:38:13 host sshd[22555]: input_userauth_request: invalid user chw [preauth] Dec 30 16:38:13 host sshd[22555]: pam_unix(sshd:auth): check pass; user unknown Dec 30 16:38:13 host sshd[22555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 30 16:38:15 host sshd[22555]: Failed password for invalid user chw from 106.10.122.53 port 47744 ssh2 Dec 30 16:38:16 host sshd[22555]: Connection closed by 106.10.122.53 port 47744 [preauth] Dec 30 16:44:30 host sshd[23234]: Did not receive identification string from 38.44.68.102 port 50820 Dec 30 16:51:22 host sshd[24373]: User root from 80.94.92.241 not allowed because not listed in AllowUsers Dec 30 16:51:22 host sshd[24373]: input_userauth_request: invalid user root [preauth] Dec 30 16:51:23 host unix_chkpwd[24378]: password check failed for user (root) Dec 30 16:51:23 host sshd[24373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.94.92.241 user=root Dec 30 16:51:23 host sshd[24373]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 16:51:24 host sshd[24376]: User root from 80.94.92.241 not allowed because not listed in AllowUsers Dec 30 16:51:24 host sshd[24376]: input_userauth_request: invalid user root [preauth] Dec 30 16:51:24 host sshd[24373]: Failed password for invalid user root from 80.94.92.241 port 53074 ssh2 Dec 30 16:51:24 host unix_chkpwd[24405]: password check failed for user (root) Dec 30 16:51:24 host sshd[24376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.94.92.241 user=root Dec 30 16:51:24 host sshd[24376]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 16:51:25 host sshd[24373]: Connection closed by 80.94.92.241 port 53074 [preauth] Dec 30 16:51:26 host sshd[24376]: Failed password for invalid user root from 80.94.92.241 port 53138 ssh2 Dec 30 16:51:27 host sshd[24376]: Connection closed by 80.94.92.241 port 53138 [preauth] Dec 30 16:54:59 host sshd[24938]: Invalid user pi from 199.76.38.123 port 55934 Dec 30 16:54:59 host sshd[24938]: input_userauth_request: invalid user pi [preauth] Dec 30 16:54:59 host sshd[24939]: Invalid user pi from 199.76.38.123 port 55938 Dec 30 16:54:59 host sshd[24939]: input_userauth_request: invalid user pi [preauth] Dec 30 16:55:00 host sshd[24938]: pam_unix(sshd:auth): check pass; user unknown Dec 30 16:55:00 host sshd[24938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.76.38.123 Dec 30 16:55:00 host sshd[24939]: pam_unix(sshd:auth): check pass; user unknown Dec 30 16:55:00 host sshd[24939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.76.38.123 Dec 30 16:55:02 host sshd[24938]: Failed password for invalid user pi from 199.76.38.123 port 55934 ssh2 Dec 30 16:55:02 host sshd[24939]: Failed password for invalid user pi from 199.76.38.123 port 55938 ssh2 Dec 30 16:55:02 host sshd[24938]: Connection closed by 199.76.38.123 port 55934 [preauth] Dec 30 16:55:02 host sshd[24939]: Connection closed by 199.76.38.123 port 55938 [preauth] Dec 30 16:57:44 host sshd[25256]: Invalid user user from 92.46.108.20 port 42538 Dec 30 16:57:44 host sshd[25256]: input_userauth_request: invalid user user [preauth] Dec 30 16:57:45 host sshd[25256]: pam_unix(sshd:auth): check pass; user unknown Dec 30 16:57:45 host sshd[25256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 30 16:57:46 host sshd[25256]: Failed password for invalid user user from 92.46.108.20 port 42538 ssh2 Dec 30 16:57:47 host sshd[25256]: Connection closed by 92.46.108.20 port 42538 [preauth] Dec 30 17:03:00 host sshd[26043]: User root from 134.17.17.131 not allowed because not listed in AllowUsers Dec 30 17:03:00 host sshd[26043]: input_userauth_request: invalid user root [preauth] Dec 30 17:03:00 host unix_chkpwd[26048]: password check failed for user (root) Dec 30 17:03:00 host sshd[26043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.17.131 user=root Dec 30 17:03:00 host sshd[26043]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 17:03:02 host sshd[26043]: Failed password for invalid user root from 134.17.17.131 port 4648 ssh2 Dec 30 17:03:02 host sshd[26043]: Received disconnect from 134.17.17.131 port 4648:11: Bye Bye [preauth] Dec 30 17:03:02 host sshd[26043]: Disconnected from 134.17.17.131 port 4648 [preauth] Dec 30 17:06:31 host sshd[26563]: Invalid user jenkins from 103.13.40.2 port 52176 Dec 30 17:06:31 host sshd[26563]: input_userauth_request: invalid user jenkins [preauth] Dec 30 17:06:31 host sshd[26563]: pam_unix(sshd:auth): check pass; user unknown Dec 30 17:06:31 host sshd[26563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 30 17:06:33 host sshd[26563]: Failed password for invalid user jenkins from 103.13.40.2 port 52176 ssh2 Dec 30 17:06:33 host sshd[26563]: Connection closed by 103.13.40.2 port 52176 [preauth] Dec 30 17:07:04 host sshd[26616]: User root from 134.17.17.131 not allowed because not listed in AllowUsers Dec 30 17:07:04 host sshd[26616]: input_userauth_request: invalid user root [preauth] Dec 30 17:07:04 host unix_chkpwd[26620]: password check failed for user (root) Dec 30 17:07:04 host sshd[26616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.17.131 user=root Dec 30 17:07:04 host sshd[26616]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 17:07:06 host sshd[26616]: Failed password for invalid user root from 134.17.17.131 port 4649 ssh2 Dec 30 17:07:07 host sshd[26616]: Received disconnect from 134.17.17.131 port 4649:11: Bye Bye [preauth] Dec 30 17:07:07 host sshd[26616]: Disconnected from 134.17.17.131 port 4649 [preauth] Dec 30 17:18:56 host sshd[28250]: Invalid user fd from 45.93.201.90 port 35558 Dec 30 17:18:56 host sshd[28250]: input_userauth_request: invalid user fd [preauth] Dec 30 17:18:56 host sshd[28250]: pam_unix(sshd:auth): check pass; user unknown Dec 30 17:18:56 host sshd[28250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 30 17:18:59 host sshd[28250]: Failed password for invalid user fd from 45.93.201.90 port 35558 ssh2 Dec 30 17:19:02 host sshd[28250]: pam_unix(sshd:auth): check pass; user unknown Dec 30 17:19:04 host sshd[28250]: Failed password for invalid user fd from 45.93.201.90 port 35558 ssh2 Dec 30 17:19:07 host sshd[28250]: pam_unix(sshd:auth): check pass; user unknown Dec 30 17:19:10 host sshd[28250]: Failed password for invalid user fd from 45.93.201.90 port 35558 ssh2 Dec 30 17:19:13 host sshd[28250]: Connection closed by 45.93.201.90 port 35558 [preauth] Dec 30 17:19:13 host sshd[28250]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 30 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 30 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 30 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 30 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 30 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 30 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 30 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 30 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 17:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 30 17:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 17:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 30 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkmaorg user-2=disposeat user-3=remysagr user-4=wwwkapin user-5=woodpeck user-6=vfmassets user-7=wwwtestugo user-8=shalinijames user-9=pmcresources user-10=bonifacegroup user-11=wwwevmhonda user-12=wwwletsstalkfood user-13=straightcurve user-14=gifterman user-15=palco123 user-16=phmetals user-17=kottayamcalldriv user-18=mrsclean user-19=wwwnexidigital user-20=wwwkaretakers user-21=cochintaxi user-22=dartsimp user-23=a2zgroup user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=wwwrmswll user-28=wwwresourcehunte user-29=keralaholi user-30=ugotscom feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 30 17:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 30 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-QR6Knu5ww4kWsKaE.~ Dec 30 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-QR6Knu5ww4kWsKaE.~' Dec 30 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-QR6Knu5ww4kWsKaE.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 17:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 30 17:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 17:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 30 17:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 17:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 30 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 30 17:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 30 17:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 30 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 30 17:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 17:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 17:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 30 17:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 17:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 17:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 30 17:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 17:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 30 17:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 17:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 30 17:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 17:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 17:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 30 17:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 17:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 17:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 30 17:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 17:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 17:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 30 17:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 17:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 17:32:17 host sshd[30345]: Invalid user applprod from 162.218.126.136 port 58670 Dec 30 17:32:17 host sshd[30345]: input_userauth_request: invalid user applprod [preauth] Dec 30 17:32:17 host sshd[30345]: pam_unix(sshd:auth): check pass; user unknown Dec 30 17:32:17 host sshd[30345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 30 17:32:19 host sshd[30345]: Failed password for invalid user applprod from 162.218.126.136 port 58670 ssh2 Dec 30 17:32:19 host sshd[30345]: Connection closed by 162.218.126.136 port 58670 [preauth] Dec 30 17:32:45 host sshd[30408]: Invalid user gary from 107.189.30.59 port 38920 Dec 30 17:32:45 host sshd[30408]: input_userauth_request: invalid user gary [preauth] Dec 30 17:32:45 host sshd[30408]: pam_unix(sshd:auth): check pass; user unknown Dec 30 17:32:45 host sshd[30408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Dec 30 17:32:47 host sshd[30408]: Failed password for invalid user gary from 107.189.30.59 port 38920 ssh2 Dec 30 17:32:48 host sshd[30408]: Connection closed by 107.189.30.59 port 38920 [preauth] Dec 30 17:34:25 host sshd[30614]: User root from 41.197.31.178 not allowed because not listed in AllowUsers Dec 30 17:34:25 host sshd[30614]: input_userauth_request: invalid user root [preauth] Dec 30 17:34:26 host unix_chkpwd[30619]: password check failed for user (root) Dec 30 17:34:26 host sshd[30614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 user=root Dec 30 17:34:26 host sshd[30614]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 17:34:29 host sshd[30614]: Failed password for invalid user root from 41.197.31.178 port 54824 ssh2 Dec 30 17:34:29 host sshd[30614]: Connection closed by 41.197.31.178 port 54824 [preauth] Dec 30 18:04:41 host sshd[2646]: Invalid user user from 106.10.122.53 port 33498 Dec 30 18:04:41 host sshd[2646]: input_userauth_request: invalid user user [preauth] Dec 30 18:04:41 host sshd[2646]: pam_unix(sshd:auth): check pass; user unknown Dec 30 18:04:41 host sshd[2646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 30 18:04:43 host sshd[2646]: Failed password for invalid user user from 106.10.122.53 port 33498 ssh2 Dec 30 18:04:43 host sshd[2646]: Connection closed by 106.10.122.53 port 33498 [preauth] Dec 30 18:09:40 host sshd[3225]: Connection closed by 45.79.181.94 port 59734 [preauth] Dec 30 18:09:41 host sshd[3228]: Connection closed by 45.79.181.94 port 59740 [preauth] Dec 30 18:09:43 host sshd[3232]: Connection closed by 45.79.181.94 port 59742 [preauth] Dec 30 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 30 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 30 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 30 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 30 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 30 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 30 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 30 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 18:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 30 18:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 18:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 18:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 18:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 18:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 30 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=palco123 user-2=gifterman user-3=kottayamcalldriv user-4=phmetals user-5=mrsclean user-6=wwwnexidigital user-7=bonifacegroup user-8=wwwevmhonda user-9=straightcurve user-10=wwwletsstalkfood user-11=vfmassets user-12=shalinijames user-13=wwwtestugo user-14=pmcresources user-15=wwwkmaorg user-16=disposeat user-17=remysagr user-18=woodpeck user-19=wwwkapin user-20=travelboniface user-21=keralaholi user-22=wwwresourcehunte user-23=wwwrmswll user-24=ugotscom user-25=wwwpmcresource user-26=a2zgroup user-27=dartsimp user-28=laundryboniface user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 30 18:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 30 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-A2GqZXJVMyO6KnZn.~ Dec 30 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-A2GqZXJVMyO6KnZn.~' Dec 30 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-A2GqZXJVMyO6KnZn.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 30 18:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 18:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 18:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 30 18:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 18:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 30 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 18:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 18:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 18:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 18:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 30 18:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 30 18:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 30 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 30 18:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 18:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 18:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 30 18:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 18:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 18:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 30 18:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 18:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 18:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 30 18:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 18:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 30 18:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 18:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 18:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 30 18:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 18:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 18:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 30 18:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 18:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 18:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 30 18:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 18:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 18:27:55 host sshd[5875]: User root from 103.105.67.170 not allowed because not listed in AllowUsers Dec 30 18:27:55 host sshd[5875]: input_userauth_request: invalid user root [preauth] Dec 30 18:27:55 host unix_chkpwd[5878]: password check failed for user (root) Dec 30 18:27:55 host sshd[5875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.105.67.170 user=root Dec 30 18:27:55 host sshd[5875]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 18:27:57 host sshd[5875]: Failed password for invalid user root from 103.105.67.170 port 26094 ssh2 Dec 30 18:27:57 host sshd[5875]: Received disconnect from 103.105.67.170 port 26094:11: Bye Bye [preauth] Dec 30 18:27:57 host sshd[5875]: Disconnected from 103.105.67.170 port 26094 [preauth] Dec 30 18:30:55 host sshd[6296]: User root from 103.105.67.170 not allowed because not listed in AllowUsers Dec 30 18:30:55 host sshd[6296]: input_userauth_request: invalid user root [preauth] Dec 30 18:30:55 host unix_chkpwd[6299]: password check failed for user (root) Dec 30 18:30:55 host sshd[6296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.105.67.170 user=root Dec 30 18:30:55 host sshd[6296]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 18:30:57 host sshd[6296]: Failed password for invalid user root from 103.105.67.170 port 43633 ssh2 Dec 30 18:36:07 host sshd[7299]: Invalid user chenxu from 103.13.40.2 port 45844 Dec 30 18:36:07 host sshd[7299]: input_userauth_request: invalid user chenxu [preauth] Dec 30 18:36:07 host sshd[7299]: pam_unix(sshd:auth): check pass; user unknown Dec 30 18:36:07 host sshd[7299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 30 18:36:09 host sshd[7299]: Failed password for invalid user chenxu from 103.13.40.2 port 45844 ssh2 Dec 30 18:36:09 host sshd[7299]: Connection closed by 103.13.40.2 port 45844 [preauth] Dec 30 18:40:12 host sshd[8077]: Invalid user webservd from 162.218.126.136 port 46734 Dec 30 18:40:12 host sshd[8077]: input_userauth_request: invalid user webservd [preauth] Dec 30 18:40:12 host sshd[8077]: pam_unix(sshd:auth): check pass; user unknown Dec 30 18:40:12 host sshd[8077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 30 18:40:13 host sshd[8077]: Failed password for invalid user webservd from 162.218.126.136 port 46734 ssh2 Dec 30 18:40:14 host sshd[8077]: Connection closed by 162.218.126.136 port 46734 [preauth] Dec 30 18:42:03 host sshd[8407]: Invalid user bbs from 104.244.74.6 port 45160 Dec 30 18:42:03 host sshd[8407]: input_userauth_request: invalid user bbs [preauth] Dec 30 18:42:03 host sshd[8407]: pam_unix(sshd:auth): check pass; user unknown Dec 30 18:42:03 host sshd[8407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Dec 30 18:42:05 host sshd[8407]: Failed password for invalid user bbs from 104.244.74.6 port 45160 ssh2 Dec 30 18:42:06 host sshd[8407]: Connection closed by 104.244.74.6 port 45160 [preauth] Dec 30 18:48:59 host sshd[9333]: Did not receive identification string from 45.55.64.51 port 61197 Dec 30 18:49:06 host sshd[9349]: Bad protocol version identification 'MGLNDD_167.71.234.10_22' from 192.241.201.21 port 41392 Dec 30 18:50:57 host sshd[9689]: User root from 45.141.151.54 not allowed because not listed in AllowUsers Dec 30 18:50:57 host sshd[9689]: input_userauth_request: invalid user root [preauth] Dec 30 18:50:57 host unix_chkpwd[9692]: password check failed for user (root) Dec 30 18:50:57 host sshd[9689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.141.151.54 user=root Dec 30 18:50:57 host sshd[9689]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 18:50:59 host sshd[9689]: Failed password for invalid user root from 45.141.151.54 port 43658 ssh2 Dec 30 18:50:59 host sshd[9689]: Received disconnect from 45.141.151.54 port 43658:11: Bye Bye [preauth] Dec 30 18:50:59 host sshd[9689]: Disconnected from 45.141.151.54 port 43658 [preauth] Dec 30 18:54:27 host sshd[10096]: User root from 167.172.112.115 not allowed because not listed in AllowUsers Dec 30 18:54:27 host sshd[10096]: input_userauth_request: invalid user root [preauth] Dec 30 18:54:27 host unix_chkpwd[10100]: password check failed for user (root) Dec 30 18:54:27 host sshd[10096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.112.115 user=root Dec 30 18:54:27 host sshd[10096]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 18:54:28 host sshd[10096]: Failed password for invalid user root from 167.172.112.115 port 41940 ssh2 Dec 30 18:54:29 host sshd[10096]: Received disconnect from 167.172.112.115 port 41940:11: Bye Bye [preauth] Dec 30 18:54:29 host sshd[10096]: Disconnected from 167.172.112.115 port 41940 [preauth] Dec 30 18:56:23 host sshd[10428]: User root from 167.172.112.115 not allowed because not listed in AllowUsers Dec 30 18:56:23 host sshd[10428]: input_userauth_request: invalid user root [preauth] Dec 30 18:56:23 host unix_chkpwd[10431]: password check failed for user (root) Dec 30 18:56:23 host sshd[10428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.112.115 user=root Dec 30 18:56:23 host sshd[10428]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 18:56:25 host sshd[10428]: Failed password for invalid user root from 167.172.112.115 port 59860 ssh2 Dec 30 18:56:25 host sshd[10428]: Received disconnect from 167.172.112.115 port 59860:11: Bye Bye [preauth] Dec 30 18:56:26 host sshd[10428]: Disconnected from 167.172.112.115 port 59860 [preauth] Dec 30 18:56:49 host sshd[10512]: User root from 45.141.151.54 not allowed because not listed in AllowUsers Dec 30 18:56:49 host sshd[10512]: input_userauth_request: invalid user root [preauth] Dec 30 18:56:49 host unix_chkpwd[10519]: password check failed for user (root) Dec 30 18:56:49 host sshd[10512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.141.151.54 user=root Dec 30 18:56:49 host sshd[10512]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 18:56:51 host sshd[10512]: Failed password for invalid user root from 45.141.151.54 port 41562 ssh2 Dec 30 18:56:51 host sshd[10512]: Received disconnect from 45.141.151.54 port 41562:11: Bye Bye [preauth] Dec 30 18:56:51 host sshd[10512]: Disconnected from 45.141.151.54 port 41562 [preauth] Dec 30 19:03:03 host sshd[11476]: Invalid user fe from 45.93.201.90 port 43054 Dec 30 19:03:03 host sshd[11476]: input_userauth_request: invalid user fe [preauth] Dec 30 19:03:03 host sshd[11476]: pam_unix(sshd:auth): check pass; user unknown Dec 30 19:03:03 host sshd[11476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 30 19:03:06 host sshd[11476]: Failed password for invalid user fe from 45.93.201.90 port 43054 ssh2 Dec 30 19:03:09 host sshd[11476]: pam_unix(sshd:auth): check pass; user unknown Dec 30 19:03:12 host sshd[11476]: Failed password for invalid user fe from 45.93.201.90 port 43054 ssh2 Dec 30 19:03:15 host sshd[11476]: pam_unix(sshd:auth): check pass; user unknown Dec 30 19:03:18 host sshd[11476]: Failed password for invalid user fe from 45.93.201.90 port 43054 ssh2 Dec 30 19:03:21 host sshd[11476]: Connection closed by 45.93.201.90 port 43054 [preauth] Dec 30 19:03:21 host sshd[11476]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 30 19:17:38 host sshd[13449]: Invalid user user1 from 41.197.31.178 port 38880 Dec 30 19:17:38 host sshd[13449]: input_userauth_request: invalid user user1 [preauth] Dec 30 19:17:39 host sshd[13449]: pam_unix(sshd:auth): check pass; user unknown Dec 30 19:17:39 host sshd[13449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 30 19:17:41 host sshd[13449]: Failed password for invalid user user1 from 41.197.31.178 port 38880 ssh2 Dec 30 19:17:41 host sshd[13449]: Connection closed by 41.197.31.178 port 38880 [preauth] Dec 30 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 30 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 30 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 30 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 30 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 30 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 30 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 30 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 19:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 30 19:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 19:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 19:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 19:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 19:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 30 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=woodpeck user-2=wwwkapin user-3=wwwkmaorg user-4=disposeat user-5=remysagr user-6=pmcresources user-7=vfmassets user-8=shalinijames user-9=wwwtestugo user-10=wwwletsstalkfood user-11=straightcurve user-12=bonifacegroup user-13=wwwevmhonda user-14=mrsclean user-15=wwwnexidigital user-16=palco123 user-17=gifterman user-18=phmetals user-19=kottayamcalldriv user-20=wwwkaretakers user-21=cochintaxi user-22=laundryboniface user-23=a2zgroup user-24=dartsimp user-25=wwwpmcresource user-26=keralaholi user-27=wwwresourcehunte user-28=wwwrmswll user-29=ugotscom user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 30 19:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 30 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-18CIv0371KVhsIlR.~ Dec 30 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-18CIv0371KVhsIlR.~' Dec 30 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-18CIv0371KVhsIlR.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 30 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 30 19:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 19:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 30 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 19:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 19:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 19:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 30 19:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 30 19:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 30 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 30 19:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 19:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 19:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 30 19:21:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 19:21:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 19:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 30 19:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 19:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 30 19:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 19:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 30 19:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 19:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 19:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 30 19:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 19:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 19:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 30 19:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 19:22:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 19:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 30 19:22:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 19:22:15 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 19:23:39 host sshd[14490]: User root from 5.200.70.148 not allowed because not listed in AllowUsers Dec 30 19:23:39 host sshd[14490]: input_userauth_request: invalid user root [preauth] Dec 30 19:23:40 host unix_chkpwd[14493]: password check failed for user (root) Dec 30 19:23:40 host sshd[14490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.200.70.148 user=root Dec 30 19:23:40 host sshd[14490]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 19:23:42 host sshd[14490]: Failed password for invalid user root from 5.200.70.148 port 38042 ssh2 Dec 30 19:23:42 host sshd[14490]: Received disconnect from 5.200.70.148 port 38042:11: Bye Bye [preauth] Dec 30 19:23:42 host sshd[14490]: Disconnected from 5.200.70.148 port 38042 [preauth] Dec 30 19:26:55 host sshd[14973]: User root from 42.117.5.13 not allowed because not listed in AllowUsers Dec 30 19:26:55 host sshd[14973]: input_userauth_request: invalid user root [preauth] Dec 30 19:26:55 host unix_chkpwd[14976]: password check failed for user (root) Dec 30 19:26:55 host sshd[14973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.117.5.13 user=root Dec 30 19:26:55 host sshd[14973]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 19:26:57 host sshd[14973]: Failed password for invalid user root from 42.117.5.13 port 35502 ssh2 Dec 30 19:26:57 host sshd[14973]: Received disconnect from 42.117.5.13 port 35502:11: Bye Bye [preauth] Dec 30 19:26:57 host sshd[14973]: Disconnected from 42.117.5.13 port 35502 [preauth] Dec 30 19:28:25 host sshd[15135]: User root from 187.72.128.177 not allowed because not listed in AllowUsers Dec 30 19:28:25 host sshd[15135]: input_userauth_request: invalid user root [preauth] Dec 30 19:28:25 host unix_chkpwd[15160]: password check failed for user (root) Dec 30 19:28:25 host sshd[15135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.72.128.177 user=root Dec 30 19:28:25 host sshd[15135]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 19:28:27 host sshd[15135]: Failed password for invalid user root from 187.72.128.177 port 40613 ssh2 Dec 30 19:28:27 host sshd[15135]: Received disconnect from 187.72.128.177 port 40613:11: Bye Bye [preauth] Dec 30 19:28:27 host sshd[15135]: Disconnected from 187.72.128.177 port 40613 [preauth] Dec 30 19:28:57 host sshd[15194]: Invalid user user from 106.10.122.53 port 33994 Dec 30 19:28:57 host sshd[15194]: input_userauth_request: invalid user user [preauth] Dec 30 19:28:58 host sshd[15194]: pam_unix(sshd:auth): check pass; user unknown Dec 30 19:28:58 host sshd[15194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 30 19:29:00 host sshd[15194]: Failed password for invalid user user from 106.10.122.53 port 33994 ssh2 Dec 30 19:29:00 host sshd[15194]: Connection closed by 106.10.122.53 port 33994 [preauth] Dec 30 19:29:51 host sshd[15405]: User root from 123.30.129.185 not allowed because not listed in AllowUsers Dec 30 19:29:51 host sshd[15405]: input_userauth_request: invalid user root [preauth] Dec 30 19:29:51 host unix_chkpwd[15409]: password check failed for user (root) Dec 30 19:29:51 host sshd[15405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.129.185 user=root Dec 30 19:29:51 host sshd[15405]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 19:29:52 host sshd[15407]: User root from 5.200.70.148 not allowed because not listed in AllowUsers Dec 30 19:29:52 host sshd[15407]: input_userauth_request: invalid user root [preauth] Dec 30 19:29:52 host unix_chkpwd[15411]: password check failed for user (root) Dec 30 19:29:52 host sshd[15407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.200.70.148 user=root Dec 30 19:29:52 host sshd[15407]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 19:29:53 host sshd[15405]: Failed password for invalid user root from 123.30.129.185 port 52408 ssh2 Dec 30 19:29:53 host sshd[15405]: Received disconnect from 123.30.129.185 port 52408:11: Bye Bye [preauth] Dec 30 19:29:53 host sshd[15405]: Disconnected from 123.30.129.185 port 52408 [preauth] Dec 30 19:29:54 host sshd[15407]: Failed password for invalid user root from 5.200.70.148 port 51886 ssh2 Dec 30 19:29:54 host sshd[15407]: Received disconnect from 5.200.70.148 port 51886:11: Bye Bye [preauth] Dec 30 19:29:54 host sshd[15407]: Disconnected from 5.200.70.148 port 51886 [preauth] Dec 30 19:30:05 host sshd[15476]: User root from 210.91.154.187 not allowed because not listed in AllowUsers Dec 30 19:30:05 host sshd[15476]: input_userauth_request: invalid user root [preauth] Dec 30 19:30:05 host unix_chkpwd[15482]: password check failed for user (root) Dec 30 19:30:05 host sshd[15476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.91.154.187 user=root Dec 30 19:30:05 host sshd[15476]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 19:30:07 host sshd[15476]: Failed password for invalid user root from 210.91.154.187 port 51696 ssh2 Dec 30 19:30:08 host sshd[15476]: Received disconnect from 210.91.154.187 port 51696:11: Bye Bye [preauth] Dec 30 19:30:08 host sshd[15476]: Disconnected from 210.91.154.187 port 51696 [preauth] Dec 30 19:30:35 host sshd[15531]: Invalid user user from 92.46.108.20 port 52884 Dec 30 19:30:35 host sshd[15531]: input_userauth_request: invalid user user [preauth] Dec 30 19:30:35 host sshd[15531]: pam_unix(sshd:auth): check pass; user unknown Dec 30 19:30:35 host sshd[15531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 30 19:30:38 host sshd[15531]: Failed password for invalid user user from 92.46.108.20 port 52884 ssh2 Dec 30 19:30:38 host sshd[15531]: Connection closed by 92.46.108.20 port 52884 [preauth] Dec 30 19:30:41 host sshd[15539]: User root from 187.72.128.177 not allowed because not listed in AllowUsers Dec 30 19:30:41 host sshd[15539]: input_userauth_request: invalid user root [preauth] Dec 30 19:30:41 host unix_chkpwd[15543]: password check failed for user (root) Dec 30 19:30:41 host sshd[15539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.72.128.177 user=root Dec 30 19:30:41 host sshd[15539]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 19:30:43 host sshd[15539]: Failed password for invalid user root from 187.72.128.177 port 57071 ssh2 Dec 30 19:30:43 host sshd[15539]: Received disconnect from 187.72.128.177 port 57071:11: Bye Bye [preauth] Dec 30 19:30:43 host sshd[15539]: Disconnected from 187.72.128.177 port 57071 [preauth] Dec 30 19:30:48 host sshd[15580]: User root from 42.117.5.13 not allowed because not listed in AllowUsers Dec 30 19:30:48 host sshd[15580]: input_userauth_request: invalid user root [preauth] Dec 30 19:30:48 host unix_chkpwd[15582]: password check failed for user (root) Dec 30 19:30:48 host sshd[15580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.117.5.13 user=root Dec 30 19:30:48 host sshd[15580]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 19:30:50 host sshd[15580]: Failed password for invalid user root from 42.117.5.13 port 51784 ssh2 Dec 30 19:31:34 host sshd[15697]: User root from 123.30.129.185 not allowed because not listed in AllowUsers Dec 30 19:31:34 host sshd[15697]: input_userauth_request: invalid user root [preauth] Dec 30 19:31:34 host unix_chkpwd[15700]: password check failed for user (root) Dec 30 19:31:34 host sshd[15697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.129.185 user=root Dec 30 19:31:34 host sshd[15697]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 19:31:36 host sshd[15702]: User root from 210.91.154.187 not allowed because not listed in AllowUsers Dec 30 19:31:36 host sshd[15702]: input_userauth_request: invalid user root [preauth] Dec 30 19:31:36 host unix_chkpwd[15705]: password check failed for user (root) Dec 30 19:31:36 host sshd[15702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.91.154.187 user=root Dec 30 19:31:36 host sshd[15702]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 19:31:36 host sshd[15697]: Failed password for invalid user root from 123.30.129.185 port 52870 ssh2 Dec 30 19:31:36 host sshd[15697]: Received disconnect from 123.30.129.185 port 52870:11: Bye Bye [preauth] Dec 30 19:31:36 host sshd[15697]: Disconnected from 123.30.129.185 port 52870 [preauth] Dec 30 19:31:38 host sshd[15702]: Failed password for invalid user root from 210.91.154.187 port 48224 ssh2 Dec 30 19:31:38 host sshd[15702]: Received disconnect from 210.91.154.187 port 48224:11: Bye Bye [preauth] Dec 30 19:31:38 host sshd[15702]: Disconnected from 210.91.154.187 port 48224 [preauth] Dec 30 19:46:36 host sshd[17912]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Dec 30 19:46:36 host sshd[17912]: input_userauth_request: invalid user root [preauth] Dec 30 19:46:36 host unix_chkpwd[17917]: password check failed for user (root) Dec 30 19:46:36 host sshd[17912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Dec 30 19:46:36 host sshd[17912]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 19:46:38 host sshd[17912]: Failed password for invalid user root from 162.218.126.136 port 43926 ssh2 Dec 30 19:46:38 host sshd[17912]: Connection closed by 162.218.126.136 port 43926 [preauth] Dec 30 19:49:13 host sshd[18275]: Invalid user username from 35.172.218.121 port 60620 Dec 30 19:49:13 host sshd[18275]: input_userauth_request: invalid user username [preauth] Dec 30 19:49:13 host sshd[18275]: pam_unix(sshd:auth): check pass; user unknown Dec 30 19:49:13 host sshd[18275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.172.218.121 Dec 30 19:49:15 host sshd[18275]: Failed password for invalid user username from 35.172.218.121 port 60620 ssh2 Dec 30 19:49:16 host sshd[18275]: Connection closed by 35.172.218.121 port 60620 [preauth] Dec 30 19:54:45 host sshd[19285]: Did not receive identification string from 222.77.179.161 port 47446 Dec 30 19:54:46 host sshd[19287]: Invalid user admin from 222.77.179.161 port 57388 Dec 30 19:54:46 host sshd[19287]: input_userauth_request: invalid user admin [preauth] Dec 30 19:54:46 host sshd[19288]: Invalid user web from 222.77.179.161 port 57368 Dec 30 19:54:46 host sshd[19288]: input_userauth_request: invalid user web [preauth] Dec 30 19:54:46 host sshd[19286]: Invalid user ubuntu from 222.77.179.161 port 57416 Dec 30 19:54:46 host sshd[19286]: input_userauth_request: invalid user ubuntu [preauth] Dec 30 19:54:46 host sshd[19289]: Invalid user git from 222.77.179.161 port 57362 Dec 30 19:54:46 host sshd[19289]: input_userauth_request: invalid user git [preauth] Dec 30 19:54:46 host sshd[19290]: Invalid user dockeradmin from 222.77.179.161 port 57420 Dec 30 19:54:46 host sshd[19290]: input_userauth_request: invalid user dockeradmin [preauth] Dec 30 19:54:46 host sshd[19291]: Invalid user ftpuser from 222.77.179.161 port 57360 Dec 30 19:54:46 host sshd[19291]: input_userauth_request: invalid user ftpuser [preauth] Dec 30 19:54:46 host sshd[19296]: Invalid user jenkins from 222.77.179.161 port 57364 Dec 30 19:54:46 host sshd[19296]: input_userauth_request: invalid user jenkins [preauth] Dec 30 19:54:46 host sshd[19297]: Invalid user user from 222.77.179.161 port 57390 Dec 30 19:54:46 host sshd[19297]: input_userauth_request: invalid user user [preauth] Dec 30 19:54:46 host sshd[19299]: Invalid user ubuntu from 222.77.179.161 port 57376 Dec 30 19:54:46 host sshd[19299]: input_userauth_request: invalid user ubuntu [preauth] Dec 30 19:54:46 host sshd[19300]: Invalid user jenkins from 222.77.179.161 port 57394 Dec 30 19:54:46 host sshd[19300]: input_userauth_request: invalid user jenkins [preauth] Dec 30 19:54:46 host sshd[19304]: Invalid user user from 222.77.179.161 port 57436 Dec 30 19:54:46 host sshd[19304]: input_userauth_request: invalid user user [preauth] Dec 30 19:54:46 host sshd[19305]: Invalid user tester from 222.77.179.161 port 57374 Dec 30 19:54:47 host sshd[19305]: input_userauth_request: invalid user tester [preauth] Dec 30 19:54:47 host sshd[19306]: Invalid user test from 222.77.179.161 port 57380 Dec 30 19:54:47 host sshd[19306]: input_userauth_request: invalid user test [preauth] Dec 30 19:54:47 host sshd[19307]: Invalid user dev from 222.77.179.161 port 57370 Dec 30 19:54:47 host sshd[19307]: input_userauth_request: invalid user dev [preauth] Dec 30 19:54:47 host sshd[19308]: Invalid user user from 222.77.179.161 port 57398 Dec 30 19:54:47 host sshd[19308]: input_userauth_request: invalid user user [preauth] Dec 30 19:54:47 host sshd[19287]: pam_unix(sshd:auth): check pass; user unknown Dec 30 19:54:47 host sshd[19287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.77.179.161 Dec 30 19:54:47 host sshd[19286]: pam_unix(sshd:auth): check pass; user unknown Dec 30 19:54:47 host sshd[19286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.77.179.161 Dec 30 19:54:47 host sshd[19288]: pam_unix(sshd:auth): check pass; user unknown Dec 30 19:54:47 host sshd[19288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.77.179.161 Dec 30 19:54:47 host sshd[19289]: pam_unix(sshd:auth): check pass; user unknown Dec 30 19:54:47 host sshd[19289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.77.179.161 Dec 30 19:54:47 host sshd[19290]: pam_unix(sshd:auth): check pass; user unknown Dec 30 19:54:47 host sshd[19290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.77.179.161 Dec 30 19:54:47 host sshd[19291]: pam_unix(sshd:auth): check pass; user unknown Dec 30 19:54:47 host sshd[19291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.77.179.161 Dec 30 19:54:47 host sshd[19296]: pam_unix(sshd:auth): check pass; user unknown Dec 30 19:54:47 host sshd[19296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.77.179.161 Dec 30 19:54:47 host sshd[19297]: pam_unix(sshd:auth): check pass; user unknown Dec 30 19:54:47 host sshd[19297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.77.179.161 Dec 30 19:54:47 host sshd[19299]: pam_unix(sshd:auth): check pass; user unknown Dec 30 19:54:47 host sshd[19299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.77.179.161 Dec 30 19:54:47 host sshd[19300]: pam_unix(sshd:auth): check pass; user unknown Dec 30 19:54:47 host sshd[19300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.77.179.161 Dec 30 19:54:47 host sshd[19304]: pam_unix(sshd:auth): check pass; user unknown Dec 30 19:54:47 host sshd[19304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.77.179.161 Dec 30 19:54:47 host sshd[19305]: pam_unix(sshd:auth): check pass; user unknown Dec 30 19:54:47 host sshd[19305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.77.179.161 Dec 30 19:54:47 host sshd[19306]: pam_unix(sshd:auth): check pass; user unknown Dec 30 19:54:47 host sshd[19306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.77.179.161 Dec 30 19:54:47 host sshd[19307]: pam_unix(sshd:auth): check pass; user unknown Dec 30 19:54:47 host sshd[19307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.77.179.161 Dec 30 19:54:47 host sshd[19308]: pam_unix(sshd:auth): check pass; user unknown Dec 30 19:54:47 host sshd[19308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.77.179.161 Dec 30 19:54:47 host sshd[19317]: User ftp from 222.77.179.161 not allowed because not listed in AllowUsers Dec 30 19:54:47 host sshd[19317]: input_userauth_request: invalid user ftp [preauth] Dec 30 19:54:47 host sshd[19318]: Invalid user postgres from 222.77.179.161 port 57392 Dec 30 19:54:47 host sshd[19318]: input_userauth_request: invalid user postgres [preauth] Dec 30 19:54:47 host sshd[19321]: Invalid user tester from 222.77.179.161 port 57406 Dec 30 19:54:47 host sshd[19321]: input_userauth_request: invalid user tester [preauth] Dec 30 19:54:47 host sshd[19319]: Invalid user postgres from 222.77.179.161 port 57412 Dec 30 19:54:47 host sshd[19319]: input_userauth_request: invalid user postgres [preauth] Dec 30 19:54:47 host sshd[19322]: Invalid user postgres from 222.77.179.161 port 57410 Dec 30 19:54:47 host sshd[19322]: input_userauth_request: invalid user postgres [preauth] Dec 30 19:54:47 host sshd[19320]: Invalid user ftpuser from 222.77.179.161 port 57382 Dec 30 19:54:47 host sshd[19320]: input_userauth_request: invalid user ftpuser [preauth] Dec 30 19:54:47 host sshd[19325]: Invalid user test from 222.77.179.161 port 57432 Dec 30 19:54:47 host sshd[19325]: input_userauth_request: invalid user test [preauth] Dec 30 19:54:47 host sshd[19329]: Invalid user posiflex from 222.77.179.161 port 57378 Dec 30 19:54:47 host sshd[19329]: input_userauth_request: invalid user posiflex [preauth] Dec 30 19:54:47 host sshd[19332]: Invalid user postgres from 222.77.179.161 port 57384 Dec 30 19:54:47 host sshd[19332]: input_userauth_request: invalid user postgres [preauth] Dec 30 19:54:48 host sshd[19335]: Invalid user hello from 222.77.179.161 port 57396 Dec 30 19:54:48 host sshd[19335]: input_userauth_request: invalid user hello [preauth] Dec 30 19:54:48 host sshd[19336]: Invalid user ansadmin from 222.77.179.161 port 57402 Dec 30 19:54:48 host sshd[19336]: input_userauth_request: invalid user ansadmin [preauth] Dec 30 19:54:48 host sshd[19337]: User centos from 222.77.179.161 not allowed because not listed in AllowUsers Dec 30 19:54:48 host sshd[19337]: input_userauth_request: invalid user centos [preauth] Dec 30 19:54:48 host sshd[19341]: Invalid user git from 222.77.179.161 port 57404 Dec 30 19:54:48 host sshd[19341]: input_userauth_request: invalid user git [preauth] Dec 30 19:54:48 host unix_chkpwd[19348]: password check failed for user (ftp) Dec 30 19:54:48 host sshd[19317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.77.179.161 user=ftp Dec 30 19:54:48 host sshd[19317]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Dec 30 19:54:48 host sshd[19318]: pam_unix(sshd:auth): check pass; user unknown Dec 30 19:54:48 host sshd[19318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.77.179.161 Dec 30 19:54:48 host sshd[19321]: pam_unix(sshd:auth): check pass; user unknown Dec 30 19:54:48 host sshd[19321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.77.179.161 Dec 30 19:54:48 host sshd[19319]: pam_unix(sshd:auth): check pass; user unknown Dec 30 19:54:48 host sshd[19319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.77.179.161 Dec 30 19:54:48 host sshd[19320]: pam_unix(sshd:auth): check pass; user unknown Dec 30 19:54:48 host sshd[19320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.77.179.161 Dec 30 19:54:48 host sshd[19322]: pam_unix(sshd:auth): check pass; user unknown Dec 30 19:54:48 host sshd[19322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.77.179.161 Dec 30 19:54:48 host sshd[19325]: pam_unix(sshd:auth): check pass; user unknown Dec 30 19:54:48 host sshd[19325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.77.179.161 Dec 30 19:54:48 host sshd[19329]: pam_unix(sshd:auth): check pass; user unknown Dec 30 19:54:48 host sshd[19329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.77.179.161 Dec 30 19:54:48 host sshd[19332]: pam_unix(sshd:auth): check pass; user unknown Dec 30 19:54:48 host sshd[19332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.77.179.161 Dec 30 19:54:48 host sshd[19335]: pam_unix(sshd:auth): check pass; user unknown Dec 30 19:54:48 host sshd[19335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.77.179.161 Dec 30 19:54:48 host sshd[19336]: pam_unix(sshd:auth): check pass; user unknown Dec 30 19:54:48 host sshd[19336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.77.179.161 Dec 30 19:54:48 host unix_chkpwd[19349]: password check failed for user (centos) Dec 30 19:54:48 host sshd[19337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.77.179.161 user=centos Dec 30 19:54:48 host sshd[19341]: pam_unix(sshd:auth): check pass; user unknown Dec 30 19:54:48 host sshd[19341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.77.179.161 Dec 30 19:54:49 host sshd[19287]: Failed password for invalid user admin from 222.77.179.161 port 57388 ssh2 Dec 30 19:54:49 host sshd[19286]: Failed password for invalid user ubuntu from 222.77.179.161 port 57416 ssh2 Dec 30 19:54:49 host sshd[19288]: Failed password for invalid user web from 222.77.179.161 port 57368 ssh2 Dec 30 19:54:49 host sshd[19289]: Failed password for invalid user git from 222.77.179.161 port 57362 ssh2 Dec 30 19:54:49 host sshd[19290]: Failed password for invalid user dockeradmin from 222.77.179.161 port 57420 ssh2 Dec 30 19:54:49 host sshd[19291]: Failed password for invalid user ftpuser from 222.77.179.161 port 57360 ssh2 Dec 30 19:54:49 host sshd[19296]: Failed password for invalid user jenkins from 222.77.179.161 port 57364 ssh2 Dec 30 19:54:49 host sshd[19297]: Failed password for invalid user user from 222.77.179.161 port 57390 ssh2 Dec 30 19:54:49 host sshd[19299]: Failed password for invalid user ubuntu from 222.77.179.161 port 57376 ssh2 Dec 30 19:54:49 host sshd[19300]: Failed password for invalid user jenkins from 222.77.179.161 port 57394 ssh2 Dec 30 19:54:49 host sshd[19304]: Failed password for invalid user user from 222.77.179.161 port 57436 ssh2 Dec 30 19:54:49 host sshd[19305]: Failed password for invalid user tester from 222.77.179.161 port 57374 ssh2 Dec 30 19:54:49 host sshd[19306]: Failed password for invalid user test from 222.77.179.161 port 57380 ssh2 Dec 30 19:54:49 host sshd[19307]: Failed password for invalid user dev from 222.77.179.161 port 57370 ssh2 Dec 30 19:54:49 host sshd[19308]: Failed password for invalid user user from 222.77.179.161 port 57398 ssh2 Dec 30 19:54:49 host sshd[19287]: Connection closed by 222.77.179.161 port 57388 [preauth] Dec 30 19:54:49 host sshd[19286]: Connection closed by 222.77.179.161 port 57416 [preauth] Dec 30 19:54:49 host sshd[19288]: Connection closed by 222.77.179.161 port 57368 [preauth] Dec 30 19:54:49 host sshd[19289]: Connection closed by 222.77.179.161 port 57362 [preauth] Dec 30 19:54:49 host sshd[19290]: Connection closed by 222.77.179.161 port 57420 [preauth] Dec 30 19:54:49 host sshd[19291]: Connection closed by 222.77.179.161 port 57360 [preauth] Dec 30 19:54:49 host sshd[19296]: Connection closed by 222.77.179.161 port 57364 [preauth] Dec 30 19:54:49 host sshd[19297]: Connection closed by 222.77.179.161 port 57390 [preauth] Dec 30 19:54:49 host sshd[19300]: Connection closed by 222.77.179.161 port 57394 [preauth] Dec 30 19:54:49 host sshd[19299]: Connection closed by 222.77.179.161 port 57376 [preauth] Dec 30 19:54:49 host sshd[19304]: Connection closed by 222.77.179.161 port 57436 [preauth] Dec 30 19:54:49 host sshd[19306]: Connection closed by 222.77.179.161 port 57380 [preauth] Dec 30 19:54:49 host sshd[19305]: Connection closed by 222.77.179.161 port 57374 [preauth] Dec 30 19:54:49 host sshd[19307]: Connection closed by 222.77.179.161 port 57370 [preauth] Dec 30 19:54:49 host sshd[19308]: Connection closed by 222.77.179.161 port 57398 [preauth] Dec 30 19:54:50 host sshd[19317]: Failed password for invalid user ftp from 222.77.179.161 port 57418 ssh2 Dec 30 19:54:50 host sshd[19318]: Failed password for invalid user postgres from 222.77.179.161 port 57392 ssh2 Dec 30 19:54:50 host sshd[19350]: Invalid user moxa from 222.77.179.161 port 57430 Dec 30 19:54:50 host sshd[19350]: input_userauth_request: invalid user moxa [preauth] Dec 30 19:54:50 host sshd[19321]: Failed password for invalid user tester from 222.77.179.161 port 57406 ssh2 Dec 30 19:54:50 host sshd[19319]: Failed password for invalid user postgres from 222.77.179.161 port 57412 ssh2 Dec 30 19:54:50 host sshd[19320]: Failed password for invalid user ftpuser from 222.77.179.161 port 57382 ssh2 Dec 30 19:54:50 host sshd[19322]: Failed password for invalid user postgres from 222.77.179.161 port 57410 ssh2 Dec 30 19:54:50 host sshd[19325]: Failed password for invalid user test from 222.77.179.161 port 57432 ssh2 Dec 30 19:54:50 host sshd[19329]: Failed password for invalid user posiflex from 222.77.179.161 port 57378 ssh2 Dec 30 19:54:50 host sshd[19332]: Failed password for invalid user postgres from 222.77.179.161 port 57384 ssh2 Dec 30 19:54:50 host sshd[19335]: Failed password for invalid user hello from 222.77.179.161 port 57396 ssh2 Dec 30 19:54:50 host sshd[19336]: Failed password for invalid user ansadmin from 222.77.179.161 port 57402 ssh2 Dec 30 19:54:50 host sshd[19337]: Failed password for invalid user centos from 222.77.179.161 port 57408 ssh2 Dec 30 19:54:50 host sshd[19341]: Failed password for invalid user git from 222.77.179.161 port 57404 ssh2 Dec 30 19:54:50 host sshd[19317]: Connection closed by 222.77.179.161 port 57418 [preauth] Dec 30 19:54:50 host sshd[19318]: Connection closed by 222.77.179.161 port 57392 [preauth] Dec 30 19:54:50 host sshd[19321]: Connection closed by 222.77.179.161 port 57406 [preauth] Dec 30 19:54:50 host sshd[19319]: Connection closed by 222.77.179.161 port 57412 [preauth] Dec 30 19:54:50 host sshd[19320]: Connection closed by 222.77.179.161 port 57382 [preauth] Dec 30 19:54:50 host sshd[19322]: Connection closed by 222.77.179.161 port 57410 [preauth] Dec 30 19:54:50 host sshd[19350]: pam_unix(sshd:auth): check pass; user unknown Dec 30 19:54:50 host sshd[19350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.77.179.161 Dec 30 19:54:50 host sshd[19325]: Connection closed by 222.77.179.161 port 57432 [preauth] Dec 30 19:54:50 host sshd[19329]: Connection closed by 222.77.179.161 port 57378 [preauth] Dec 30 19:54:50 host sshd[19332]: Connection closed by 222.77.179.161 port 57384 [preauth] Dec 30 19:54:52 host sshd[19350]: Failed password for invalid user moxa from 222.77.179.161 port 57430 ssh2 Dec 30 19:58:30 host sshd[20095]: User root from 209.141.55.27 not allowed because not listed in AllowUsers Dec 30 19:58:30 host sshd[20095]: input_userauth_request: invalid user root [preauth] Dec 30 19:58:30 host unix_chkpwd[20100]: password check failed for user (root) Dec 30 19:58:30 host sshd[20095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.55.27 user=root Dec 30 19:58:30 host sshd[20095]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 19:58:31 host sshd[20095]: Failed password for invalid user root from 209.141.55.27 port 42296 ssh2 Dec 30 19:58:32 host sshd[20095]: Received disconnect from 209.141.55.27 port 42296:11: Normal Shutdown, Thank you for playing [preauth] Dec 30 19:58:32 host sshd[20095]: Disconnected from 209.141.55.27 port 42296 [preauth] Dec 30 20:02:13 host sshd[20580]: User root from 103.13.40.2 not allowed because not listed in AllowUsers Dec 30 20:02:13 host sshd[20580]: input_userauth_request: invalid user root [preauth] Dec 30 20:02:13 host unix_chkpwd[20582]: password check failed for user (root) Dec 30 20:02:13 host sshd[20580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 user=root Dec 30 20:02:13 host sshd[20580]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 20:02:15 host sshd[20580]: Failed password for invalid user root from 103.13.40.2 port 42386 ssh2 Dec 30 20:02:15 host sshd[20580]: Connection closed by 103.13.40.2 port 42386 [preauth] Dec 30 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 30 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 30 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 30 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 30 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 30 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 30 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 30 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 20:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 30 20:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 20:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 30 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=woodpeck user-2=wwwkapin user-3=disposeat user-4=remysagr user-5=wwwkmaorg user-6=pmcresources user-7=vfmassets user-8=shalinijames user-9=wwwtestugo user-10=wwwletsstalkfood user-11=straightcurve user-12=bonifacegroup user-13=wwwevmhonda user-14=wwwnexidigital user-15=mrsclean user-16=palco123 user-17=gifterman user-18=phmetals user-19=kottayamcalldriv user-20=cochintaxi user-21=wwwkaretakers user-22=laundryboniface user-23=a2zgroup user-24=dartsimp user-25=wwwpmcresource user-26=wwwresourcehunte user-27=keralaholi user-28=wwwrmswll user-29=ugotscom user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 30 20:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 30 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ox84X8vw8JaDTl7X.~ Dec 30 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ox84X8vw8JaDTl7X.~' Dec 30 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ox84X8vw8JaDTl7X.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 30 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 20:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 30 20:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 20:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 30 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 20:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 20:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 30 20:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 30 20:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 30 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 30 20:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 20:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 20:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 30 20:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 20:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 20:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 30 20:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 20:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 30 20:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 20:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 30 20:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 20:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 20:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 30 20:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 20:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 20:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 30 20:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 20:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 20:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 30 20:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 20:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 20:35:45 host sshd[25475]: Invalid user mob from 135.125.59.77 port 50476 Dec 30 20:35:45 host sshd[25475]: input_userauth_request: invalid user mob [preauth] Dec 30 20:35:45 host sshd[25475]: pam_unix(sshd:auth): check pass; user unknown Dec 30 20:35:45 host sshd[25475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=135.125.59.77 Dec 30 20:35:47 host sshd[25475]: Failed password for invalid user mob from 135.125.59.77 port 50476 ssh2 Dec 30 20:35:47 host sshd[25475]: Received disconnect from 135.125.59.77 port 50476:11: Bye Bye [preauth] Dec 30 20:35:47 host sshd[25475]: Disconnected from 135.125.59.77 port 50476 [preauth] Dec 30 20:36:01 host sshd[25504]: Invalid user view from 157.230.45.177 port 41104 Dec 30 20:36:01 host sshd[25504]: input_userauth_request: invalid user view [preauth] Dec 30 20:36:01 host sshd[25504]: pam_unix(sshd:auth): check pass; user unknown Dec 30 20:36:01 host sshd[25504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.45.177 Dec 30 20:36:02 host sshd[25504]: Failed password for invalid user view from 157.230.45.177 port 41104 ssh2 Dec 30 20:36:02 host sshd[25504]: Received disconnect from 157.230.45.177 port 41104:11: Bye Bye [preauth] Dec 30 20:36:02 host sshd[25504]: Disconnected from 157.230.45.177 port 41104 [preauth] Dec 30 20:36:48 host sshd[25595]: Invalid user lukas from 128.199.77.201 port 60986 Dec 30 20:36:48 host sshd[25595]: input_userauth_request: invalid user lukas [preauth] Dec 30 20:36:48 host sshd[25595]: pam_unix(sshd:auth): check pass; user unknown Dec 30 20:36:48 host sshd[25595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.77.201 Dec 30 20:36:50 host sshd[25595]: Failed password for invalid user lukas from 128.199.77.201 port 60986 ssh2 Dec 30 20:36:50 host sshd[25595]: Received disconnect from 128.199.77.201 port 60986:11: Bye Bye [preauth] Dec 30 20:36:50 host sshd[25595]: Disconnected from 128.199.77.201 port 60986 [preauth] Dec 30 20:37:50 host sshd[25700]: User root from 51.178.27.210 not allowed because not listed in AllowUsers Dec 30 20:37:50 host sshd[25700]: input_userauth_request: invalid user root [preauth] Dec 30 20:37:50 host unix_chkpwd[25703]: password check failed for user (root) Dec 30 20:37:50 host sshd[25700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.27.210 user=root Dec 30 20:37:50 host sshd[25700]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 20:37:52 host sshd[25700]: Failed password for invalid user root from 51.178.27.210 port 33900 ssh2 Dec 30 20:37:52 host sshd[25700]: Received disconnect from 51.178.27.210 port 33900:11: Bye Bye [preauth] Dec 30 20:37:52 host sshd[25700]: Disconnected from 51.178.27.210 port 33900 [preauth] Dec 30 20:39:04 host sshd[25940]: User root from 164.163.21.78 not allowed because not listed in AllowUsers Dec 30 20:39:04 host sshd[25940]: input_userauth_request: invalid user root [preauth] Dec 30 20:39:04 host unix_chkpwd[25943]: password check failed for user (root) Dec 30 20:39:04 host sshd[25940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.163.21.78 user=root Dec 30 20:39:04 host sshd[25940]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 20:39:06 host sshd[25940]: Failed password for invalid user root from 164.163.21.78 port 33604 ssh2 Dec 30 20:39:07 host sshd[25940]: Received disconnect from 164.163.21.78 port 33604:11: Bye Bye [preauth] Dec 30 20:39:07 host sshd[25940]: Disconnected from 164.163.21.78 port 33604 [preauth] Dec 30 20:40:29 host sshd[26104]: Invalid user demo from 135.125.59.77 port 51088 Dec 30 20:40:29 host sshd[26104]: input_userauth_request: invalid user demo [preauth] Dec 30 20:40:29 host sshd[26104]: pam_unix(sshd:auth): check pass; user unknown Dec 30 20:40:29 host sshd[26104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=135.125.59.77 Dec 30 20:40:31 host sshd[26104]: Failed password for invalid user demo from 135.125.59.77 port 51088 ssh2 Dec 30 20:40:31 host sshd[26104]: Received disconnect from 135.125.59.77 port 51088:11: Bye Bye [preauth] Dec 30 20:40:31 host sshd[26104]: Disconnected from 135.125.59.77 port 51088 [preauth] Dec 30 20:40:41 host sshd[26118]: User root from 51.178.27.210 not allowed because not listed in AllowUsers Dec 30 20:40:41 host sshd[26118]: input_userauth_request: invalid user root [preauth] Dec 30 20:40:41 host unix_chkpwd[26121]: password check failed for user (root) Dec 30 20:40:41 host sshd[26118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.27.210 user=root Dec 30 20:40:41 host sshd[26118]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 20:40:42 host sshd[26118]: Failed password for invalid user root from 51.178.27.210 port 53582 ssh2 Dec 30 20:40:43 host sshd[26118]: Received disconnect from 51.178.27.210 port 53582:11: Bye Bye [preauth] Dec 30 20:40:43 host sshd[26118]: Disconnected from 51.178.27.210 port 53582 [preauth] Dec 30 20:41:21 host sshd[26218]: Invalid user myftp from 157.230.45.177 port 35548 Dec 30 20:41:21 host sshd[26218]: input_userauth_request: invalid user myftp [preauth] Dec 30 20:41:21 host sshd[26218]: pam_unix(sshd:auth): check pass; user unknown Dec 30 20:41:21 host sshd[26218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.45.177 Dec 30 20:41:24 host sshd[26218]: Failed password for invalid user myftp from 157.230.45.177 port 35548 ssh2 Dec 30 20:41:24 host sshd[26218]: Received disconnect from 157.230.45.177 port 35548:11: Bye Bye [preauth] Dec 30 20:41:24 host sshd[26218]: Disconnected from 157.230.45.177 port 35548 [preauth] Dec 30 20:41:35 host sshd[26253]: Invalid user opc from 128.199.77.201 port 37004 Dec 30 20:41:35 host sshd[26253]: input_userauth_request: invalid user opc [preauth] Dec 30 20:41:35 host sshd[26253]: pam_unix(sshd:auth): check pass; user unknown Dec 30 20:41:35 host sshd[26253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.77.201 Dec 30 20:41:37 host sshd[26253]: Failed password for invalid user opc from 128.199.77.201 port 37004 ssh2 Dec 30 20:41:37 host sshd[26253]: Received disconnect from 128.199.77.201 port 37004:11: Bye Bye [preauth] Dec 30 20:41:37 host sshd[26253]: Disconnected from 128.199.77.201 port 37004 [preauth] Dec 30 20:41:42 host sshd[26261]: User root from 135.125.59.77 not allowed because not listed in AllowUsers Dec 30 20:41:42 host sshd[26261]: input_userauth_request: invalid user root [preauth] Dec 30 20:41:42 host unix_chkpwd[26265]: password check failed for user (root) Dec 30 20:41:42 host sshd[26261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=135.125.59.77 user=root Dec 30 20:41:42 host sshd[26261]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 20:41:43 host sshd[26261]: Failed password for invalid user root from 135.125.59.77 port 34558 ssh2 Dec 30 20:41:43 host sshd[26261]: Received disconnect from 135.125.59.77 port 34558:11: Bye Bye [preauth] Dec 30 20:41:43 host sshd[26261]: Disconnected from 135.125.59.77 port 34558 [preauth] Dec 30 20:42:37 host sshd[26408]: Invalid user www from 157.230.45.177 port 59464 Dec 30 20:42:37 host sshd[26408]: input_userauth_request: invalid user www [preauth] Dec 30 20:42:37 host sshd[26408]: pam_unix(sshd:auth): check pass; user unknown Dec 30 20:42:37 host sshd[26408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.45.177 Dec 30 20:42:38 host sshd[26408]: Failed password for invalid user www from 157.230.45.177 port 59464 ssh2 Dec 30 20:42:38 host sshd[26408]: Received disconnect from 157.230.45.177 port 59464:11: Bye Bye [preauth] Dec 30 20:42:38 host sshd[26408]: Disconnected from 157.230.45.177 port 59464 [preauth] Dec 30 20:42:51 host sshd[26467]: User root from 128.199.77.201 not allowed because not listed in AllowUsers Dec 30 20:42:51 host sshd[26467]: input_userauth_request: invalid user root [preauth] Dec 30 20:42:51 host unix_chkpwd[26470]: password check failed for user (root) Dec 30 20:42:51 host sshd[26467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.77.201 user=root Dec 30 20:42:51 host sshd[26467]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 20:42:53 host sshd[26467]: Failed password for invalid user root from 128.199.77.201 port 45920 ssh2 Dec 30 20:42:53 host sshd[26467]: Received disconnect from 128.199.77.201 port 45920:11: Bye Bye [preauth] Dec 30 20:42:53 host sshd[26467]: Disconnected from 128.199.77.201 port 45920 [preauth] Dec 30 20:43:36 host sshd[26703]: Invalid user phion from 164.163.21.78 port 45080 Dec 30 20:43:36 host sshd[26703]: input_userauth_request: invalid user phion [preauth] Dec 30 20:43:36 host sshd[26703]: pam_unix(sshd:auth): check pass; user unknown Dec 30 20:43:36 host sshd[26703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.163.21.78 Dec 30 20:43:38 host sshd[26703]: Failed password for invalid user phion from 164.163.21.78 port 45080 ssh2 Dec 30 20:43:38 host sshd[26703]: Received disconnect from 164.163.21.78 port 45080:11: Bye Bye [preauth] Dec 30 20:43:38 host sshd[26703]: Disconnected from 164.163.21.78 port 45080 [preauth] Dec 30 20:47:40 host sshd[27161]: Invalid user ff from 45.93.201.90 port 51234 Dec 30 20:47:40 host sshd[27161]: input_userauth_request: invalid user ff [preauth] Dec 30 20:47:40 host sshd[27161]: pam_unix(sshd:auth): check pass; user unknown Dec 30 20:47:40 host sshd[27161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 30 20:47:42 host sshd[27161]: Failed password for invalid user ff from 45.93.201.90 port 51234 ssh2 Dec 30 20:47:46 host sshd[27161]: pam_unix(sshd:auth): check pass; user unknown Dec 30 20:47:47 host sshd[27161]: Failed password for invalid user ff from 45.93.201.90 port 51234 ssh2 Dec 30 20:47:51 host sshd[27161]: pam_unix(sshd:auth): check pass; user unknown Dec 30 20:47:53 host sshd[27161]: Failed password for invalid user ff from 45.93.201.90 port 51234 ssh2 Dec 30 20:47:56 host sshd[27161]: Connection closed by 45.93.201.90 port 51234 [preauth] Dec 30 20:47:56 host sshd[27161]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 30 20:52:54 host sshd[27809]: Invalid user inspur from 162.218.126.136 port 39844 Dec 30 20:52:54 host sshd[27809]: input_userauth_request: invalid user inspur [preauth] Dec 30 20:52:54 host sshd[27809]: pam_unix(sshd:auth): check pass; user unknown Dec 30 20:52:54 host sshd[27809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 30 20:52:56 host sshd[27809]: Failed password for invalid user inspur from 162.218.126.136 port 39844 ssh2 Dec 30 20:52:56 host sshd[27809]: Connection closed by 162.218.126.136 port 39844 [preauth] Dec 30 20:53:11 host sshd[27842]: Invalid user ubuntu from 106.10.122.53 port 50242 Dec 30 20:53:11 host sshd[27842]: input_userauth_request: invalid user ubuntu [preauth] Dec 30 20:53:11 host sshd[27842]: pam_unix(sshd:auth): check pass; user unknown Dec 30 20:53:11 host sshd[27842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 30 20:53:13 host sshd[27842]: Failed password for invalid user ubuntu from 106.10.122.53 port 50242 ssh2 Dec 30 20:53:14 host sshd[27842]: Connection closed by 106.10.122.53 port 50242 [preauth] Dec 30 21:00:27 host sshd[28785]: Invalid user composer from 41.197.31.178 port 52264 Dec 30 21:00:27 host sshd[28785]: input_userauth_request: invalid user composer [preauth] Dec 30 21:00:27 host sshd[28785]: pam_unix(sshd:auth): check pass; user unknown Dec 30 21:00:27 host sshd[28785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 30 21:00:29 host sshd[28785]: Failed password for invalid user composer from 41.197.31.178 port 52264 ssh2 Dec 30 21:00:30 host sshd[28785]: Connection closed by 41.197.31.178 port 52264 [preauth] Dec 30 21:08:25 host sshd[29856]: Invalid user admin from 125.132.41.164 port 46727 Dec 30 21:08:25 host sshd[29856]: input_userauth_request: invalid user admin [preauth] Dec 30 21:08:25 host sshd[29856]: pam_unix(sshd:auth): check pass; user unknown Dec 30 21:08:25 host sshd[29856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.132.41.164 Dec 30 21:08:27 host sshd[29856]: Failed password for invalid user admin from 125.132.41.164 port 46727 ssh2 Dec 30 21:08:27 host sshd[29856]: Connection closed by 125.132.41.164 port 46727 [preauth] Dec 30 21:12:11 host sshd[30431]: Did not receive identification string from 205.185.123.43 port 58120 Dec 30 21:18:49 host sshd[31291]: Invalid user bbs from 104.244.74.6 port 37768 Dec 30 21:18:49 host sshd[31291]: input_userauth_request: invalid user bbs [preauth] Dec 30 21:18:49 host sshd[31291]: pam_unix(sshd:auth): check pass; user unknown Dec 30 21:18:49 host sshd[31291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Dec 30 21:18:51 host sshd[31291]: Failed password for invalid user bbs from 104.244.74.6 port 37768 ssh2 Dec 30 21:18:52 host sshd[31291]: Connection closed by 104.244.74.6 port 37768 [preauth] Dec 30 21:21:25 host sshd[31640]: Invalid user qa from 39.109.127.242 port 38292 Dec 30 21:21:25 host sshd[31640]: input_userauth_request: invalid user qa [preauth] Dec 30 21:21:25 host sshd[31640]: pam_unix(sshd:auth): check pass; user unknown Dec 30 21:21:25 host sshd[31640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.109.127.242 Dec 30 21:21:27 host sshd[31640]: Failed password for invalid user qa from 39.109.127.242 port 38292 ssh2 Dec 30 21:21:27 host sshd[31640]: Received disconnect from 39.109.127.242 port 38292:11: Bye Bye [preauth] Dec 30 21:21:27 host sshd[31640]: Disconnected from 39.109.127.242 port 38292 [preauth] Dec 30 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 30 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 30 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 30 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 30 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 30 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 30 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 30 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 21:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 30 21:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 21:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 30 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=vfmassets user-3=shalinijames user-4=wwwtestugo user-5=woodpeck user-6=wwwkapin user-7=wwwkmaorg user-8=disposeat user-9=remysagr user-10=wwwnexidigital user-11=mrsclean user-12=palco123 user-13=gifterman user-14=phmetals user-15=kottayamcalldriv user-16=straightcurve user-17=wwwletsstalkfood user-18=bonifacegroup user-19=wwwevmhonda user-20=laundryboniface user-21=a2zgroup user-22=dartsimp user-23=cochintaxi user-24=wwwkaretakers user-25=wwwresourcehunte user-26=keralaholi user-27=wwwrmswll user-28=ugotscom user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 30 21:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 30 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ZRUamxem8hVoadqn.~ Dec 30 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ZRUamxem8hVoadqn.~' Dec 30 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ZRUamxem8hVoadqn.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 30 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 21:21:50 host sshd[31736]: Invalid user vq from 206.189.86.91 port 49998 Dec 30 21:21:50 host sshd[31736]: input_userauth_request: invalid user vq [preauth] Dec 30 21:21:50 host sshd[31736]: pam_unix(sshd:auth): check pass; user unknown Dec 30 21:21:50 host sshd[31736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.86.91 Dec 30 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 30 21:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 21:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 30 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 21:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 21:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 21:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 21:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 30 21:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 30 21:21:51 host sshd[31736]: Failed password for invalid user vq from 206.189.86.91 port 49998 ssh2 Dec 30 21:21:51 host sshd[31736]: Received disconnect from 206.189.86.91 port 49998:11: Bye Bye [preauth] Dec 30 21:21:51 host sshd[31736]: Disconnected from 206.189.86.91 port 49998 [preauth] Dec 30 21:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 30 21:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 30 21:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 21:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 21:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 30 21:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 21:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 30 21:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 21:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 21:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 30 21:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 21:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 30 21:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 21:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 21:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 30 21:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 21:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 21:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 30 21:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 21:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 21:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 30 21:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 21:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 21:22:40 host sshd[31958]: Invalid user mc from 128.199.68.220 port 52680 Dec 30 21:22:40 host sshd[31958]: input_userauth_request: invalid user mc [preauth] Dec 30 21:22:40 host sshd[31958]: pam_unix(sshd:auth): check pass; user unknown Dec 30 21:22:40 host sshd[31958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.68.220 Dec 30 21:22:42 host sshd[31958]: Failed password for invalid user mc from 128.199.68.220 port 52680 ssh2 Dec 30 21:22:42 host sshd[31958]: Received disconnect from 128.199.68.220 port 52680:11: Bye Bye [preauth] Dec 30 21:22:42 host sshd[31958]: Disconnected from 128.199.68.220 port 52680 [preauth] Dec 30 21:22:46 host sshd[31967]: Invalid user bbs from 104.244.74.6 port 51338 Dec 30 21:22:46 host sshd[31967]: input_userauth_request: invalid user bbs [preauth] Dec 30 21:22:46 host sshd[31967]: pam_unix(sshd:auth): check pass; user unknown Dec 30 21:22:46 host sshd[31967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Dec 30 21:22:47 host sshd[31967]: Failed password for invalid user bbs from 104.244.74.6 port 51338 ssh2 Dec 30 21:22:48 host sshd[31967]: Connection closed by 104.244.74.6 port 51338 [preauth] Dec 30 21:25:47 host sshd[32281]: Invalid user oo from 175.196.129.174 port 35842 Dec 30 21:25:47 host sshd[32281]: input_userauth_request: invalid user oo [preauth] Dec 30 21:25:47 host sshd[32281]: pam_unix(sshd:auth): check pass; user unknown Dec 30 21:25:47 host sshd[32281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.196.129.174 Dec 30 21:25:48 host sshd[32281]: Failed password for invalid user oo from 175.196.129.174 port 35842 ssh2 Dec 30 21:25:49 host sshd[32281]: Received disconnect from 175.196.129.174 port 35842:11: Bye Bye [preauth] Dec 30 21:25:49 host sshd[32281]: Disconnected from 175.196.129.174 port 35842 [preauth] Dec 30 21:26:20 host sshd[32449]: Invalid user guest from 103.13.40.2 port 33936 Dec 30 21:26:20 host sshd[32449]: input_userauth_request: invalid user guest [preauth] Dec 30 21:26:20 host sshd[32449]: pam_unix(sshd:auth): check pass; user unknown Dec 30 21:26:20 host sshd[32449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 30 21:26:22 host sshd[32449]: Failed password for invalid user guest from 103.13.40.2 port 33936 ssh2 Dec 30 21:26:22 host sshd[32449]: Connection closed by 103.13.40.2 port 33936 [preauth] Dec 30 21:27:18 host sshd[32553]: Invalid user hs from 39.109.127.242 port 41782 Dec 30 21:27:18 host sshd[32553]: input_userauth_request: invalid user hs [preauth] Dec 30 21:27:18 host sshd[32553]: pam_unix(sshd:auth): check pass; user unknown Dec 30 21:27:18 host sshd[32553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.109.127.242 Dec 30 21:27:19 host sshd[32553]: Failed password for invalid user hs from 39.109.127.242 port 41782 ssh2 Dec 30 21:27:19 host sshd[32553]: Received disconnect from 39.109.127.242 port 41782:11: Bye Bye [preauth] Dec 30 21:27:19 host sshd[32553]: Disconnected from 39.109.127.242 port 41782 [preauth] Dec 30 21:27:35 host sshd[32592]: Invalid user ye from 128.199.68.220 port 48572 Dec 30 21:27:35 host sshd[32592]: input_userauth_request: invalid user ye [preauth] Dec 30 21:27:35 host sshd[32592]: pam_unix(sshd:auth): check pass; user unknown Dec 30 21:27:35 host sshd[32592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.68.220 Dec 30 21:27:37 host sshd[32595]: Invalid user md from 103.224.36.226 port 64160 Dec 30 21:27:37 host sshd[32595]: input_userauth_request: invalid user md [preauth] Dec 30 21:27:37 host sshd[32595]: pam_unix(sshd:auth): check pass; user unknown Dec 30 21:27:37 host sshd[32595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.224.36.226 Dec 30 21:27:38 host sshd[32592]: Failed password for invalid user ye from 128.199.68.220 port 48572 ssh2 Dec 30 21:27:38 host sshd[32592]: Received disconnect from 128.199.68.220 port 48572:11: Bye Bye [preauth] Dec 30 21:27:38 host sshd[32592]: Disconnected from 128.199.68.220 port 48572 [preauth] Dec 30 21:27:38 host sshd[32595]: Failed password for invalid user md from 103.224.36.226 port 64160 ssh2 Dec 30 21:27:38 host sshd[32595]: Received disconnect from 103.224.36.226 port 64160:11: Bye Bye [preauth] Dec 30 21:27:38 host sshd[32595]: Disconnected from 103.224.36.226 port 64160 [preauth] Dec 30 21:27:43 host sshd[32602]: Invalid user ut from 94.153.212.68 port 52400 Dec 30 21:27:43 host sshd[32602]: input_userauth_request: invalid user ut [preauth] Dec 30 21:27:43 host sshd[32602]: pam_unix(sshd:auth): check pass; user unknown Dec 30 21:27:43 host sshd[32602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.153.212.68 Dec 30 21:27:44 host sshd[32602]: Failed password for invalid user ut from 94.153.212.68 port 52400 ssh2 Dec 30 21:27:44 host sshd[32602]: Received disconnect from 94.153.212.68 port 52400:11: Bye Bye [preauth] Dec 30 21:27:44 host sshd[32602]: Disconnected from 94.153.212.68 port 52400 [preauth] Dec 30 21:28:15 host sshd[32661]: Invalid user mc from 206.189.86.91 port 50988 Dec 30 21:28:15 host sshd[32661]: input_userauth_request: invalid user mc [preauth] Dec 30 21:28:15 host sshd[32661]: pam_unix(sshd:auth): check pass; user unknown Dec 30 21:28:15 host sshd[32661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.86.91 Dec 30 21:28:16 host sshd[32661]: Failed password for invalid user mc from 206.189.86.91 port 50988 ssh2 Dec 30 21:28:16 host sshd[32661]: Received disconnect from 206.189.86.91 port 50988:11: Bye Bye [preauth] Dec 30 21:28:16 host sshd[32661]: Disconnected from 206.189.86.91 port 50988 [preauth] Dec 30 21:28:55 host sshd[32756]: Invalid user ia from 175.196.129.174 port 34138 Dec 30 21:28:55 host sshd[32756]: input_userauth_request: invalid user ia [preauth] Dec 30 21:28:55 host sshd[32756]: pam_unix(sshd:auth): check pass; user unknown Dec 30 21:28:55 host sshd[32756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.196.129.174 Dec 30 21:28:56 host sshd[32760]: Invalid user jd from 128.199.68.220 port 48806 Dec 30 21:28:56 host sshd[32760]: input_userauth_request: invalid user jd [preauth] Dec 30 21:28:56 host sshd[32760]: pam_unix(sshd:auth): check pass; user unknown Dec 30 21:28:56 host sshd[32760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.68.220 Dec 30 21:28:57 host sshd[32760]: Failed password for invalid user jd from 128.199.68.220 port 48806 ssh2 Dec 30 21:28:58 host sshd[32760]: Received disconnect from 128.199.68.220 port 48806:11: Bye Bye [preauth] Dec 30 21:28:58 host sshd[32760]: Disconnected from 128.199.68.220 port 48806 [preauth] Dec 30 21:28:58 host sshd[32756]: Failed password for invalid user ia from 175.196.129.174 port 34138 ssh2 Dec 30 21:28:58 host sshd[32765]: Invalid user bq from 94.153.212.68 port 47632 Dec 30 21:28:58 host sshd[32765]: input_userauth_request: invalid user bq [preauth] Dec 30 21:28:58 host sshd[32765]: pam_unix(sshd:auth): check pass; user unknown Dec 30 21:28:58 host sshd[32765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.153.212.68 Dec 30 21:28:58 host sshd[32756]: Received disconnect from 175.196.129.174 port 34138:11: Bye Bye [preauth] Dec 30 21:28:58 host sshd[32756]: Disconnected from 175.196.129.174 port 34138 [preauth] Dec 30 21:29:00 host sshd[32765]: Failed password for invalid user bq from 94.153.212.68 port 47632 ssh2 Dec 30 21:29:00 host sshd[32765]: Received disconnect from 94.153.212.68 port 47632:11: Bye Bye [preauth] Dec 30 21:29:00 host sshd[32765]: Disconnected from 94.153.212.68 port 47632 [preauth] Dec 30 21:29:01 host sshd[354]: Invalid user ep from 39.109.127.242 port 42548 Dec 30 21:29:01 host sshd[354]: input_userauth_request: invalid user ep [preauth] Dec 30 21:29:01 host sshd[354]: pam_unix(sshd:auth): check pass; user unknown Dec 30 21:29:01 host sshd[354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.109.127.242 Dec 30 21:29:03 host sshd[354]: Failed password for invalid user ep from 39.109.127.242 port 42548 ssh2 Dec 30 21:29:03 host sshd[354]: Received disconnect from 39.109.127.242 port 42548:11: Bye Bye [preauth] Dec 30 21:29:03 host sshd[354]: Disconnected from 39.109.127.242 port 42548 [preauth] Dec 30 21:29:29 host sshd[447]: Invalid user zl from 206.189.86.91 port 46294 Dec 30 21:29:29 host sshd[447]: input_userauth_request: invalid user zl [preauth] Dec 30 21:29:29 host sshd[447]: pam_unix(sshd:auth): check pass; user unknown Dec 30 21:29:29 host sshd[447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.86.91 Dec 30 21:29:32 host sshd[447]: Failed password for invalid user zl from 206.189.86.91 port 46294 ssh2 Dec 30 21:29:32 host sshd[447]: Received disconnect from 206.189.86.91 port 46294:11: Bye Bye [preauth] Dec 30 21:29:32 host sshd[447]: Disconnected from 206.189.86.91 port 46294 [preauth] Dec 30 21:29:36 host sshd[491]: Invalid user ix from 14.99.4.82 port 33226 Dec 30 21:29:36 host sshd[491]: input_userauth_request: invalid user ix [preauth] Dec 30 21:29:36 host sshd[491]: pam_unix(sshd:auth): check pass; user unknown Dec 30 21:29:36 host sshd[491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.99.4.82 Dec 30 21:29:38 host sshd[491]: Failed password for invalid user ix from 14.99.4.82 port 33226 ssh2 Dec 30 21:29:38 host sshd[491]: Received disconnect from 14.99.4.82 port 33226:11: Bye Bye [preauth] Dec 30 21:29:38 host sshd[491]: Disconnected from 14.99.4.82 port 33226 [preauth] Dec 30 21:30:15 host sshd[563]: Invalid user wj from 94.153.212.68 port 42454 Dec 30 21:30:15 host sshd[563]: input_userauth_request: invalid user wj [preauth] Dec 30 21:30:15 host sshd[563]: pam_unix(sshd:auth): check pass; user unknown Dec 30 21:30:15 host sshd[563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.153.212.68 Dec 30 21:30:17 host sshd[563]: Failed password for invalid user wj from 94.153.212.68 port 42454 ssh2 Dec 30 21:30:17 host sshd[563]: Received disconnect from 94.153.212.68 port 42454:11: Bye Bye [preauth] Dec 30 21:30:17 host sshd[563]: Disconnected from 94.153.212.68 port 42454 [preauth] Dec 30 21:30:17 host sshd[567]: Invalid user bh from 175.196.129.174 port 49334 Dec 30 21:30:17 host sshd[567]: input_userauth_request: invalid user bh [preauth] Dec 30 21:30:17 host sshd[567]: pam_unix(sshd:auth): check pass; user unknown Dec 30 21:30:17 host sshd[567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.196.129.174 Dec 30 21:30:19 host sshd[567]: Failed password for invalid user bh from 175.196.129.174 port 49334 ssh2 Dec 30 21:31:00 host sshd[832]: Invalid user ye from 103.224.36.226 port 61958 Dec 30 21:31:00 host sshd[832]: input_userauth_request: invalid user ye [preauth] Dec 30 21:31:00 host sshd[832]: pam_unix(sshd:auth): check pass; user unknown Dec 30 21:31:00 host sshd[832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.224.36.226 Dec 30 21:31:02 host sshd[832]: Failed password for invalid user ye from 103.224.36.226 port 61958 ssh2 Dec 30 21:31:02 host sshd[832]: Received disconnect from 103.224.36.226 port 61958:11: Bye Bye [preauth] Dec 30 21:31:02 host sshd[832]: Disconnected from 103.224.36.226 port 61958 [preauth] Dec 30 21:32:22 host sshd[990]: Invalid user iu from 103.224.36.226 port 57802 Dec 30 21:32:22 host sshd[990]: input_userauth_request: invalid user iu [preauth] Dec 30 21:32:22 host sshd[990]: pam_unix(sshd:auth): check pass; user unknown Dec 30 21:32:22 host sshd[990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.224.36.226 Dec 30 21:32:25 host sshd[990]: Failed password for invalid user iu from 103.224.36.226 port 57802 ssh2 Dec 30 21:35:05 host sshd[1362]: Invalid user yl from 14.99.4.82 port 49378 Dec 30 21:35:05 host sshd[1362]: input_userauth_request: invalid user yl [preauth] Dec 30 21:35:05 host sshd[1362]: pam_unix(sshd:auth): check pass; user unknown Dec 30 21:35:05 host sshd[1362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.99.4.82 Dec 30 21:35:07 host sshd[1362]: Failed password for invalid user yl from 14.99.4.82 port 49378 ssh2 Dec 30 21:35:07 host sshd[1362]: Received disconnect from 14.99.4.82 port 49378:11: Bye Bye [preauth] Dec 30 21:35:07 host sshd[1362]: Disconnected from 14.99.4.82 port 49378 [preauth] Dec 30 21:39:10 host sshd[1943]: Invalid user mt from 106.51.65.5 port 36838 Dec 30 21:39:10 host sshd[1943]: input_userauth_request: invalid user mt [preauth] Dec 30 21:39:10 host sshd[1943]: pam_unix(sshd:auth): check pass; user unknown Dec 30 21:39:10 host sshd[1943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.65.5 Dec 30 21:39:12 host sshd[1943]: Failed password for invalid user mt from 106.51.65.5 port 36838 ssh2 Dec 30 21:39:12 host sshd[1943]: Received disconnect from 106.51.65.5 port 36838:11: Bye Bye [preauth] Dec 30 21:39:12 host sshd[1943]: Disconnected from 106.51.65.5 port 36838 [preauth] Dec 30 21:40:28 host sshd[2115]: Invalid user ne from 106.51.65.5 port 65222 Dec 30 21:40:28 host sshd[2115]: input_userauth_request: invalid user ne [preauth] Dec 30 21:40:28 host sshd[2115]: pam_unix(sshd:auth): check pass; user unknown Dec 30 21:40:28 host sshd[2115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.65.5 Dec 30 21:40:30 host sshd[2115]: Failed password for invalid user ne from 106.51.65.5 port 65222 ssh2 Dec 30 21:40:30 host sshd[2115]: Received disconnect from 106.51.65.5 port 65222:11: Bye Bye [preauth] Dec 30 21:40:30 host sshd[2115]: Disconnected from 106.51.65.5 port 65222 [preauth] Dec 30 21:41:49 host sshd[2260]: Invalid user dd from 106.51.65.5 port 61018 Dec 30 21:41:49 host sshd[2260]: input_userauth_request: invalid user dd [preauth] Dec 30 21:41:49 host sshd[2260]: pam_unix(sshd:auth): check pass; user unknown Dec 30 21:41:49 host sshd[2260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.65.5 Dec 30 21:41:51 host sshd[2260]: Failed password for invalid user dd from 106.51.65.5 port 61018 ssh2 Dec 30 21:41:51 host sshd[2260]: Received disconnect from 106.51.65.5 port 61018:11: Bye Bye [preauth] Dec 30 21:41:51 host sshd[2260]: Disconnected from 106.51.65.5 port 61018 [preauth] Dec 30 21:47:15 host sshd[3006]: Invalid user wb from 14.99.4.82 port 44216 Dec 30 21:47:15 host sshd[3006]: input_userauth_request: invalid user wb [preauth] Dec 30 21:47:15 host sshd[3006]: pam_unix(sshd:auth): check pass; user unknown Dec 30 21:47:15 host sshd[3006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.99.4.82 Dec 30 21:47:17 host sshd[3006]: Failed password for invalid user wb from 14.99.4.82 port 44216 ssh2 Dec 30 21:47:17 host sshd[3006]: Received disconnect from 14.99.4.82 port 44216:11: Bye Bye [preauth] Dec 30 21:47:17 host sshd[3006]: Disconnected from 14.99.4.82 port 44216 [preauth] Dec 30 21:52:17 host sshd[3723]: Invalid user bbs from 104.244.74.6 port 56178 Dec 30 21:52:17 host sshd[3723]: input_userauth_request: invalid user bbs [preauth] Dec 30 21:52:17 host sshd[3723]: pam_unix(sshd:auth): check pass; user unknown Dec 30 21:52:17 host sshd[3723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Dec 30 21:52:18 host sshd[3723]: Failed password for invalid user bbs from 104.244.74.6 port 56178 ssh2 Dec 30 21:52:19 host sshd[3723]: Connection closed by 104.244.74.6 port 56178 [preauth] Dec 30 21:58:48 host sshd[4837]: Did not receive identification string from 185.173.145.103 port 50544 Dec 30 21:58:58 host sshd[4862]: User root from 185.173.145.103 not allowed because not listed in AllowUsers Dec 30 21:58:58 host sshd[4862]: input_userauth_request: invalid user root [preauth] Dec 30 21:58:58 host unix_chkpwd[4865]: password check failed for user (root) Dec 30 21:58:58 host sshd[4862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.173.145.103 user=root Dec 30 21:58:58 host sshd[4862]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 21:59:00 host sshd[4862]: Failed password for invalid user root from 185.173.145.103 port 50552 ssh2 Dec 30 21:59:01 host sshd[4862]: Received disconnect from 185.173.145.103 port 50552:11: Normal Shutdown, Thank you for playing [preauth] Dec 30 21:59:01 host sshd[4862]: Disconnected from 185.173.145.103 port 50552 [preauth] Dec 30 21:59:07 host sshd[4893]: Invalid user user1 from 162.218.126.136 port 47202 Dec 30 21:59:07 host sshd[4893]: input_userauth_request: invalid user user1 [preauth] Dec 30 21:59:07 host sshd[4893]: pam_unix(sshd:auth): check pass; user unknown Dec 30 21:59:07 host sshd[4893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 30 21:59:08 host sshd[4901]: User root from 185.173.145.103 not allowed because not listed in AllowUsers Dec 30 21:59:08 host sshd[4901]: input_userauth_request: invalid user root [preauth] Dec 30 21:59:08 host unix_chkpwd[4906]: password check failed for user (root) Dec 30 21:59:08 host sshd[4901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.173.145.103 user=root Dec 30 21:59:08 host sshd[4901]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 21:59:08 host sshd[4893]: Failed password for invalid user user1 from 162.218.126.136 port 47202 ssh2 Dec 30 21:59:09 host sshd[4893]: Connection closed by 162.218.126.136 port 47202 [preauth] Dec 30 21:59:10 host sshd[4901]: Failed password for invalid user root from 185.173.145.103 port 57102 ssh2 Dec 30 22:08:18 host sshd[6379]: User root from 92.46.108.20 not allowed because not listed in AllowUsers Dec 30 22:08:18 host sshd[6379]: input_userauth_request: invalid user root [preauth] Dec 30 22:08:18 host unix_chkpwd[6387]: password check failed for user (root) Dec 30 22:08:18 host sshd[6379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 user=root Dec 30 22:08:18 host sshd[6379]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 22:08:20 host sshd[6379]: Failed password for invalid user root from 92.46.108.20 port 51378 ssh2 Dec 30 22:08:20 host sshd[6379]: Connection closed by 92.46.108.20 port 51378 [preauth] Dec 30 22:08:20 host sshd[6379]: Failed password for invalid user root from 92.46.108.20 port 51378 ssh2 Dec 30 22:08:20 host sshd[6379]: Connection closed by 92.46.108.20 port 51378 [preauth] Dec 30 22:17:16 host sshd[7696]: Invalid user sasaki from 106.10.122.53 port 58000 Dec 30 22:17:16 host sshd[7696]: input_userauth_request: invalid user sasaki [preauth] Dec 30 22:17:16 host sshd[7696]: pam_unix(sshd:auth): check pass; user unknown Dec 30 22:17:16 host sshd[7696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 30 22:17:18 host sshd[7696]: Failed password for invalid user sasaki from 106.10.122.53 port 58000 ssh2 Dec 30 22:17:18 host sshd[7696]: Connection closed by 106.10.122.53 port 58000 [preauth] Dec 30 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 30 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 30 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 30 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 30 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 30 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 30 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 30 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 22:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 30 22:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 22:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 22:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 30 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=a2zgroup user-3=dartsimp user-4=cochintaxi user-5=wwwkaretakers user-6=ugotscom user-7=keralaholi user-8=wwwresourcehunte user-9=wwwrmswll user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=shalinijames user-14=wwwtestugo user-15=vfmassets user-16=woodpeck user-17=wwwkapin user-18=wwwkmaorg user-19=disposeat user-20=remysagr user-21=mrsclean user-22=wwwnexidigital user-23=kottayamcalldriv user-24=phmetals user-25=palco123 user-26=gifterman user-27=wwwletsstalkfood user-28=straightcurve user-29=wwwevmhonda user-30=bonifacegroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 30 22:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 30 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fXGRm9bI5C0iVEjz.~ Dec 30 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fXGRm9bI5C0iVEjz.~' Dec 30 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fXGRm9bI5C0iVEjz.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 30 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 22:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 30 22:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 22:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 22:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 30 22:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 22:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 22:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 22:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 22:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 22:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 30 22:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 30 22:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 30 22:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 30 22:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 22:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 22:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 30 22:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 22:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 22:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 30 22:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 22:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 30 22:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 22:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 22:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 30 22:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 22:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 22:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 30 22:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 22:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 22:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 30 22:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 22:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 22:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 30 22:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 22:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 22:27:03 host sshd[9174]: Invalid user timothy from 107.189.30.59 port 53612 Dec 30 22:27:03 host sshd[9174]: input_userauth_request: invalid user timothy [preauth] Dec 30 22:27:03 host sshd[9174]: pam_unix(sshd:auth): check pass; user unknown Dec 30 22:27:03 host sshd[9174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Dec 30 22:27:05 host sshd[9174]: Failed password for invalid user timothy from 107.189.30.59 port 53612 ssh2 Dec 30 22:27:06 host sshd[9174]: Connection closed by 107.189.30.59 port 53612 [preauth] Dec 30 22:28:06 host sshd[9319]: Invalid user zc from 117.102.69.147 port 38022 Dec 30 22:28:06 host sshd[9319]: input_userauth_request: invalid user zc [preauth] Dec 30 22:28:06 host sshd[9319]: pam_unix(sshd:auth): check pass; user unknown Dec 30 22:28:06 host sshd[9319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.102.69.147 Dec 30 22:28:08 host sshd[9319]: Failed password for invalid user zc from 117.102.69.147 port 38022 ssh2 Dec 30 22:28:08 host sshd[9319]: Received disconnect from 117.102.69.147 port 38022:11: Bye Bye [preauth] Dec 30 22:28:08 host sshd[9319]: Disconnected from 117.102.69.147 port 38022 [preauth] Dec 30 22:29:15 host sshd[9535]: Invalid user eb from 175.155.247.6 port 54038 Dec 30 22:29:15 host sshd[9535]: input_userauth_request: invalid user eb [preauth] Dec 30 22:29:15 host sshd[9535]: pam_unix(sshd:auth): check pass; user unknown Dec 30 22:29:15 host sshd[9535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.155.247.6 Dec 30 22:29:17 host sshd[9535]: Failed password for invalid user eb from 175.155.247.6 port 54038 ssh2 Dec 30 22:29:18 host sshd[9535]: Received disconnect from 175.155.247.6 port 54038:11: Bye Bye [preauth] Dec 30 22:29:18 host sshd[9535]: Disconnected from 175.155.247.6 port 54038 [preauth] Dec 30 22:30:50 host sshd[9707]: Invalid user fg from 45.93.201.90 port 32836 Dec 30 22:30:50 host sshd[9707]: input_userauth_request: invalid user fg [preauth] Dec 30 22:30:50 host sshd[9707]: pam_unix(sshd:auth): check pass; user unknown Dec 30 22:30:50 host sshd[9707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 30 22:30:52 host sshd[9707]: Failed password for invalid user fg from 45.93.201.90 port 32836 ssh2 Dec 30 22:30:55 host sshd[9707]: pam_unix(sshd:auth): check pass; user unknown Dec 30 22:30:57 host sshd[9707]: Failed password for invalid user fg from 45.93.201.90 port 32836 ssh2 Dec 30 22:31:00 host sshd[9707]: pam_unix(sshd:auth): check pass; user unknown Dec 30 22:31:02 host sshd[9707]: Failed password for invalid user fg from 45.93.201.90 port 32836 ssh2 Dec 30 22:31:05 host sshd[9707]: Connection closed by 45.93.201.90 port 32836 [preauth] Dec 30 22:31:05 host sshd[9707]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 30 22:33:26 host sshd[10036]: Invalid user lz from 101.32.98.188 port 57400 Dec 30 22:33:26 host sshd[10036]: input_userauth_request: invalid user lz [preauth] Dec 30 22:33:26 host sshd[10036]: pam_unix(sshd:auth): check pass; user unknown Dec 30 22:33:26 host sshd[10036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.32.98.188 Dec 30 22:33:29 host sshd[10036]: Failed password for invalid user lz from 101.32.98.188 port 57400 ssh2 Dec 30 22:33:29 host sshd[10036]: Received disconnect from 101.32.98.188 port 57400:11: Bye Bye [preauth] Dec 30 22:33:29 host sshd[10036]: Disconnected from 101.32.98.188 port 57400 [preauth] Dec 30 22:33:52 host sshd[10163]: Invalid user rd from 170.64.156.206 port 51858 Dec 30 22:33:52 host sshd[10163]: input_userauth_request: invalid user rd [preauth] Dec 30 22:33:52 host sshd[10163]: pam_unix(sshd:auth): check pass; user unknown Dec 30 22:33:52 host sshd[10163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.156.206 Dec 30 22:33:54 host sshd[10163]: Failed password for invalid user rd from 170.64.156.206 port 51858 ssh2 Dec 30 22:33:54 host sshd[10163]: Received disconnect from 170.64.156.206 port 51858:11: Bye Bye [preauth] Dec 30 22:33:54 host sshd[10163]: Disconnected from 170.64.156.206 port 51858 [preauth] Dec 30 22:34:32 host sshd[10262]: Invalid user ux from 117.102.69.147 port 59598 Dec 30 22:34:32 host sshd[10262]: input_userauth_request: invalid user ux [preauth] Dec 30 22:34:32 host sshd[10262]: pam_unix(sshd:auth): check pass; user unknown Dec 30 22:34:32 host sshd[10262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.102.69.147 Dec 30 22:34:35 host sshd[10262]: Failed password for invalid user ux from 117.102.69.147 port 59598 ssh2 Dec 30 22:34:35 host sshd[10262]: Received disconnect from 117.102.69.147 port 59598:11: Bye Bye [preauth] Dec 30 22:34:35 host sshd[10262]: Disconnected from 117.102.69.147 port 59598 [preauth] Dec 30 22:35:38 host sshd[10401]: Invalid user mr from 101.32.98.188 port 59364 Dec 30 22:35:38 host sshd[10401]: input_userauth_request: invalid user mr [preauth] Dec 30 22:35:38 host sshd[10401]: pam_unix(sshd:auth): check pass; user unknown Dec 30 22:35:38 host sshd[10401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.32.98.188 Dec 30 22:35:41 host sshd[10401]: Failed password for invalid user mr from 101.32.98.188 port 59364 ssh2 Dec 30 22:35:41 host sshd[10401]: Received disconnect from 101.32.98.188 port 59364:11: Bye Bye [preauth] Dec 30 22:35:41 host sshd[10401]: Disconnected from 101.32.98.188 port 59364 [preauth] Dec 30 22:35:55 host sshd[10428]: Invalid user by from 117.102.69.147 port 44224 Dec 30 22:35:55 host sshd[10428]: input_userauth_request: invalid user by [preauth] Dec 30 22:35:55 host sshd[10428]: pam_unix(sshd:auth): check pass; user unknown Dec 30 22:35:55 host sshd[10428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.102.69.147 Dec 30 22:35:56 host sshd[10443]: User root from 157.245.227.165 not allowed because not listed in AllowUsers Dec 30 22:35:56 host sshd[10443]: input_userauth_request: invalid user root [preauth] Dec 30 22:35:56 host unix_chkpwd[10446]: password check failed for user (root) Dec 30 22:35:56 host sshd[10443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.227.165 user=root Dec 30 22:35:56 host sshd[10443]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 22:35:57 host sshd[10428]: Failed password for invalid user by from 117.102.69.147 port 44224 ssh2 Dec 30 22:35:57 host sshd[10428]: Received disconnect from 117.102.69.147 port 44224:11: Bye Bye [preauth] Dec 30 22:35:57 host sshd[10428]: Disconnected from 117.102.69.147 port 44224 [preauth] Dec 30 22:35:58 host sshd[10443]: Failed password for invalid user root from 157.245.227.165 port 48920 ssh2 Dec 30 22:35:59 host sshd[10443]: Received disconnect from 157.245.227.165 port 48920:11: Bye Bye [preauth] Dec 30 22:35:59 host sshd[10443]: Disconnected from 157.245.227.165 port 48920 [preauth] Dec 30 22:36:32 host sshd[10541]: Invalid user postgres from 199.195.253.222 port 38104 Dec 30 22:36:32 host sshd[10541]: input_userauth_request: invalid user postgres [preauth] Dec 30 22:36:32 host sshd[10541]: pam_unix(sshd:auth): check pass; user unknown Dec 30 22:36:32 host sshd[10541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.253.222 Dec 30 22:36:34 host sshd[10541]: Failed password for invalid user postgres from 199.195.253.222 port 38104 ssh2 Dec 30 22:36:35 host sshd[10541]: Received disconnect from 199.195.253.222 port 38104:11: Bye Bye [preauth] Dec 30 22:36:35 host sshd[10541]: Disconnected from 199.195.253.222 port 38104 [preauth] Dec 30 22:36:38 host sshd[10548]: Invalid user hm from 170.64.156.206 port 54434 Dec 30 22:36:38 host sshd[10548]: input_userauth_request: invalid user hm [preauth] Dec 30 22:36:38 host sshd[10548]: pam_unix(sshd:auth): check pass; user unknown Dec 30 22:36:38 host sshd[10548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.156.206 Dec 30 22:36:41 host sshd[10548]: Failed password for invalid user hm from 170.64.156.206 port 54434 ssh2 Dec 30 22:36:41 host sshd[10548]: Received disconnect from 170.64.156.206 port 54434:11: Bye Bye [preauth] Dec 30 22:36:41 host sshd[10548]: Disconnected from 170.64.156.206 port 54434 [preauth] Dec 30 22:36:50 host sshd[10562]: Invalid user red from 157.230.53.66 port 51716 Dec 30 22:36:50 host sshd[10562]: input_userauth_request: invalid user red [preauth] Dec 30 22:36:50 host sshd[10562]: pam_unix(sshd:auth): check pass; user unknown Dec 30 22:36:50 host sshd[10562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.53.66 Dec 30 22:36:51 host sshd[10567]: Invalid user sy from 101.32.98.188 port 55332 Dec 30 22:36:51 host sshd[10567]: input_userauth_request: invalid user sy [preauth] Dec 30 22:36:51 host sshd[10567]: pam_unix(sshd:auth): check pass; user unknown Dec 30 22:36:51 host sshd[10567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.32.98.188 Dec 30 22:36:52 host sshd[10562]: Failed password for invalid user red from 157.230.53.66 port 51716 ssh2 Dec 30 22:36:52 host sshd[10562]: Received disconnect from 157.230.53.66 port 51716:11: Bye Bye [preauth] Dec 30 22:36:52 host sshd[10562]: Disconnected from 157.230.53.66 port 51716 [preauth] Dec 30 22:36:53 host sshd[10567]: Failed password for invalid user sy from 101.32.98.188 port 55332 ssh2 Dec 30 22:36:53 host sshd[10567]: Received disconnect from 101.32.98.188 port 55332:11: Bye Bye [preauth] Dec 30 22:36:53 host sshd[10567]: Disconnected from 101.32.98.188 port 55332 [preauth] Dec 30 22:37:52 host sshd[10733]: Invalid user ip from 170.64.156.206 port 48110 Dec 30 22:37:52 host sshd[10733]: input_userauth_request: invalid user ip [preauth] Dec 30 22:37:52 host sshd[10733]: pam_unix(sshd:auth): check pass; user unknown Dec 30 22:37:52 host sshd[10733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.156.206 Dec 30 22:37:54 host sshd[10733]: Failed password for invalid user ip from 170.64.156.206 port 48110 ssh2 Dec 30 22:37:54 host sshd[10733]: Received disconnect from 170.64.156.206 port 48110:11: Bye Bye [preauth] Dec 30 22:37:54 host sshd[10733]: Disconnected from 170.64.156.206 port 48110 [preauth] Dec 30 22:40:15 host sshd[11173]: User root from 157.230.53.66 not allowed because not listed in AllowUsers Dec 30 22:40:15 host sshd[11173]: input_userauth_request: invalid user root [preauth] Dec 30 22:40:15 host unix_chkpwd[11177]: password check failed for user (root) Dec 30 22:40:15 host sshd[11173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.53.66 user=root Dec 30 22:40:15 host sshd[11173]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 22:40:18 host sshd[11173]: Failed password for invalid user root from 157.230.53.66 port 46312 ssh2 Dec 30 22:40:18 host sshd[11173]: Received disconnect from 157.230.53.66 port 46312:11: Bye Bye [preauth] Dec 30 22:40:18 host sshd[11173]: Disconnected from 157.230.53.66 port 46312 [preauth] Dec 30 22:40:50 host sshd[11265]: Invalid user training from 199.195.253.222 port 52038 Dec 30 22:40:50 host sshd[11265]: input_userauth_request: invalid user training [preauth] Dec 30 22:40:50 host sshd[11265]: pam_unix(sshd:auth): check pass; user unknown Dec 30 22:40:50 host sshd[11265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.253.222 Dec 30 22:40:51 host sshd[11265]: Failed password for invalid user training from 199.195.253.222 port 52038 ssh2 Dec 30 22:40:52 host sshd[11265]: Received disconnect from 199.195.253.222 port 52038:11: Bye Bye [preauth] Dec 30 22:40:52 host sshd[11265]: Disconnected from 199.195.253.222 port 52038 [preauth] Dec 30 22:41:07 host sshd[11305]: User root from 157.245.227.165 not allowed because not listed in AllowUsers Dec 30 22:41:07 host sshd[11305]: input_userauth_request: invalid user root [preauth] Dec 30 22:41:08 host unix_chkpwd[11308]: password check failed for user (root) Dec 30 22:41:08 host sshd[11305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.227.165 user=root Dec 30 22:41:08 host sshd[11305]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 22:41:10 host sshd[11305]: Failed password for invalid user root from 157.245.227.165 port 40198 ssh2 Dec 30 22:41:10 host sshd[11305]: Received disconnect from 157.245.227.165 port 40198:11: Bye Bye [preauth] Dec 30 22:41:10 host sshd[11305]: Disconnected from 157.245.227.165 port 40198 [preauth] Dec 30 22:42:00 host sshd[11435]: Invalid user user1 from 199.195.253.222 port 47488 Dec 30 22:42:00 host sshd[11435]: input_userauth_request: invalid user user1 [preauth] Dec 30 22:42:00 host sshd[11435]: pam_unix(sshd:auth): check pass; user unknown Dec 30 22:42:00 host sshd[11435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.253.222 Dec 30 22:42:01 host sshd[11435]: Failed password for invalid user user1 from 199.195.253.222 port 47488 ssh2 Dec 30 22:42:57 host sshd[11568]: Invalid user steam from 41.197.31.178 port 44146 Dec 30 22:42:57 host sshd[11568]: input_userauth_request: invalid user steam [preauth] Dec 30 22:42:57 host sshd[11568]: pam_unix(sshd:auth): check pass; user unknown Dec 30 22:42:57 host sshd[11568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 30 22:42:59 host sshd[11568]: Failed password for invalid user steam from 41.197.31.178 port 44146 ssh2 Dec 30 22:42:59 host sshd[11568]: Connection closed by 41.197.31.178 port 44146 [preauth] Dec 30 22:43:20 host sshd[11616]: Invalid user ha from 175.155.247.6 port 48410 Dec 30 22:43:20 host sshd[11616]: input_userauth_request: invalid user ha [preauth] Dec 30 22:43:20 host sshd[11616]: pam_unix(sshd:auth): check pass; user unknown Dec 30 22:43:20 host sshd[11616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.155.247.6 Dec 30 22:43:22 host sshd[11616]: Failed password for invalid user ha from 175.155.247.6 port 48410 ssh2 Dec 30 22:43:22 host sshd[11616]: Received disconnect from 175.155.247.6 port 48410:11: Bye Bye [preauth] Dec 30 22:43:22 host sshd[11616]: Disconnected from 175.155.247.6 port 48410 [preauth] Dec 30 22:44:27 host sshd[11848]: Invalid user js from 175.155.247.6 port 51963 Dec 30 22:44:27 host sshd[11848]: input_userauth_request: invalid user js [preauth] Dec 30 22:44:27 host sshd[11848]: pam_unix(sshd:auth): check pass; user unknown Dec 30 22:44:27 host sshd[11848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.155.247.6 Dec 30 22:44:29 host sshd[11848]: Failed password for invalid user js from 175.155.247.6 port 51963 ssh2 Dec 30 22:44:30 host sshd[11848]: Received disconnect from 175.155.247.6 port 51963:11: Bye Bye [preauth] Dec 30 22:44:30 host sshd[11848]: Disconnected from 175.155.247.6 port 51963 [preauth] Dec 30 22:49:19 host sshd[12541]: Invalid user tmp from 103.13.40.2 port 46266 Dec 30 22:49:19 host sshd[12541]: input_userauth_request: invalid user tmp [preauth] Dec 30 22:49:19 host sshd[12541]: pam_unix(sshd:auth): check pass; user unknown Dec 30 22:49:19 host sshd[12541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 30 22:49:21 host sshd[12541]: Failed password for invalid user tmp from 103.13.40.2 port 46266 ssh2 Dec 30 22:49:21 host sshd[12541]: Connection closed by 103.13.40.2 port 46266 [preauth] Dec 30 22:51:54 host sshd[12827]: Did not receive identification string from 192.241.226.46 port 58362 Dec 30 23:00:04 host sshd[13846]: Connection reset by 205.210.31.168 port 60662 [preauth] Dec 30 23:05:16 host sshd[14670]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Dec 30 23:05:16 host sshd[14670]: input_userauth_request: invalid user root [preauth] Dec 30 23:05:16 host unix_chkpwd[14673]: password check failed for user (root) Dec 30 23:05:16 host sshd[14670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Dec 30 23:05:16 host sshd[14670]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 23:05:17 host sshd[14670]: Failed password for invalid user root from 162.218.126.136 port 60594 ssh2 Dec 30 23:05:18 host sshd[14670]: Connection closed by 162.218.126.136 port 60594 [preauth] Dec 30 23:05:40 host sshd[14721]: Did not receive identification string from 185.173.145.146 port 33588 Dec 30 23:05:50 host sshd[14729]: User root from 185.173.145.146 not allowed because not listed in AllowUsers Dec 30 23:05:50 host sshd[14729]: input_userauth_request: invalid user root [preauth] Dec 30 23:05:50 host unix_chkpwd[14732]: password check failed for user (root) Dec 30 23:05:50 host sshd[14729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.173.145.146 user=root Dec 30 23:05:50 host sshd[14729]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 23:05:52 host sshd[14729]: Failed password for invalid user root from 185.173.145.146 port 58764 ssh2 Dec 30 23:05:52 host sshd[14729]: Received disconnect from 185.173.145.146 port 58764:11: Normal Shutdown, Thank you for playing [preauth] Dec 30 23:05:52 host sshd[14729]: Disconnected from 185.173.145.146 port 58764 [preauth] Dec 30 23:06:02 host sshd[14828]: User root from 185.173.145.146 not allowed because not listed in AllowUsers Dec 30 23:06:02 host sshd[14828]: input_userauth_request: invalid user root [preauth] Dec 30 23:06:02 host unix_chkpwd[14834]: password check failed for user (root) Dec 30 23:06:02 host sshd[14828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.173.145.146 user=root Dec 30 23:06:02 host sshd[14828]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 23:06:05 host sshd[14828]: Failed password for invalid user root from 185.173.145.146 port 36762 ssh2 Dec 30 23:06:05 host sshd[14828]: Received disconnect from 185.173.145.146 port 36762:11: Normal Shutdown, Thank you for playing [preauth] Dec 30 23:06:05 host sshd[14828]: Disconnected from 185.173.145.146 port 36762 [preauth] Dec 30 23:09:15 host sshd[15240]: Did not receive identification string from 165.232.69.156 port 41890 Dec 30 23:09:17 host sshd[15245]: Invalid user elastic from 165.232.69.156 port 42218 Dec 30 23:09:17 host sshd[15248]: Invalid user ec2-user from 165.232.69.156 port 42180 Dec 30 23:09:17 host sshd[15245]: input_userauth_request: invalid user elastic [preauth] Dec 30 23:09:17 host sshd[15244]: Invalid user discordbot from 165.232.69.156 port 42148 Dec 30 23:09:17 host sshd[15248]: input_userauth_request: invalid user ec2-user [preauth] Dec 30 23:09:17 host sshd[15243]: Invalid user ec2-user from 165.232.69.156 port 42188 Dec 30 23:09:17 host sshd[15244]: input_userauth_request: invalid user discordbot [preauth] Dec 30 23:09:17 host sshd[15243]: input_userauth_request: invalid user ec2-user [preauth] Dec 30 23:09:17 host sshd[15254]: Invalid user postgres from 165.232.69.156 port 42190 Dec 30 23:09:17 host sshd[15247]: Invalid user admin from 165.232.69.156 port 42204 Dec 30 23:09:17 host sshd[15254]: input_userauth_request: invalid user postgres [preauth] Dec 30 23:09:17 host sshd[15242]: Invalid user oracle from 165.232.69.156 port 42174 Dec 30 23:09:17 host sshd[15255]: Invalid user es from 165.232.69.156 port 42200 Dec 30 23:09:17 host sshd[15250]: Invalid user discord from 165.232.69.156 port 42140 Dec 30 23:09:17 host sshd[15246]: Invalid user emqx from 165.232.69.156 port 42168 Dec 30 23:09:17 host sshd[15242]: input_userauth_request: invalid user oracle [preauth] Dec 30 23:09:17 host sshd[15250]: input_userauth_request: invalid user discord [preauth] Dec 30 23:09:17 host sshd[15255]: input_userauth_request: invalid user es [preauth] Dec 30 23:09:17 host sshd[15246]: input_userauth_request: invalid user emqx [preauth] Dec 30 23:09:17 host sshd[15257]: Invalid user admin from 165.232.69.156 port 42186 Dec 30 23:09:17 host sshd[15257]: input_userauth_request: invalid user admin [preauth] Dec 30 23:09:17 host sshd[15247]: input_userauth_request: invalid user admin [preauth] Dec 30 23:09:17 host sshd[15258]: Invalid user fa from 165.232.69.156 port 42184 Dec 30 23:09:17 host sshd[15261]: Invalid user web from 165.232.69.156 port 42164 Dec 30 23:09:17 host sshd[15259]: Invalid user deploy from 165.232.69.156 port 42212 Dec 30 23:09:17 host sshd[15258]: input_userauth_request: invalid user fa [preauth] Dec 30 23:09:17 host sshd[15259]: input_userauth_request: invalid user deploy [preauth] Dec 30 23:09:17 host sshd[15261]: input_userauth_request: invalid user web [preauth] Dec 30 23:09:17 host sshd[15264]: Invalid user odoo15 from 165.232.69.156 port 42198 Dec 30 23:09:17 host sshd[15264]: input_userauth_request: invalid user odoo15 [preauth] Dec 30 23:09:17 host sshd[15265]: User mail from 165.232.69.156 not allowed because not listed in AllowUsers Dec 30 23:09:17 host sshd[15265]: input_userauth_request: invalid user mail [preauth] Dec 30 23:09:17 host sshd[15262]: Invalid user test from 165.232.69.156 port 42216 Dec 30 23:09:17 host sshd[15273]: Invalid user ts3 from 165.232.69.156 port 42208 Dec 30 23:09:17 host sshd[15273]: input_userauth_request: invalid user ts3 [preauth] Dec 30 23:09:17 host sshd[15270]: User centos from 165.232.69.156 not allowed because not listed in AllowUsers Dec 30 23:09:17 host sshd[15262]: input_userauth_request: invalid user test [preauth] Dec 30 23:09:17 host sshd[15270]: input_userauth_request: invalid user centos [preauth] Dec 30 23:09:17 host sshd[15266]: User centos from 165.232.69.156 not allowed because not listed in AllowUsers Dec 30 23:09:17 host sshd[15266]: input_userauth_request: invalid user centos [preauth] Dec 30 23:09:17 host sshd[15272]: Invalid user user from 165.232.69.156 port 42158 Dec 30 23:09:17 host sshd[15272]: input_userauth_request: invalid user user [preauth] Dec 30 23:09:17 host sshd[15251]: Invalid user esuser from 165.232.69.156 port 42214 Dec 30 23:09:17 host sshd[15251]: input_userauth_request: invalid user esuser [preauth] Dec 30 23:09:17 host sshd[15263]: User ftp from 165.232.69.156 not allowed because not listed in AllowUsers Dec 30 23:09:17 host sshd[15263]: input_userauth_request: invalid user ftp [preauth] Dec 30 23:09:17 host sshd[15271]: Invalid user user from 165.232.69.156 port 42196 Dec 30 23:09:17 host sshd[15271]: input_userauth_request: invalid user user [preauth] Dec 30 23:09:17 host sshd[15252]: Invalid user git from 165.232.69.156 port 42166 Dec 30 23:09:17 host sshd[15253]: Invalid user dockeradmin from 165.232.69.156 port 42202 Dec 30 23:09:17 host sshd[15252]: input_userauth_request: invalid user git [preauth] Dec 30 23:09:17 host sshd[15253]: input_userauth_request: invalid user dockeradmin [preauth] Dec 30 23:09:17 host sshd[15256]: Invalid user git from 165.232.69.156 port 42146 Dec 30 23:09:17 host sshd[15256]: input_userauth_request: invalid user git [preauth] Dec 30 23:09:17 host sshd[15269]: User centos from 165.232.69.156 not allowed because not listed in AllowUsers Dec 30 23:09:17 host sshd[15269]: input_userauth_request: invalid user centos [preauth] Dec 30 23:09:17 host sshd[15249]: User centos from 165.232.69.156 not allowed because not listed in AllowUsers Dec 30 23:09:17 host sshd[15249]: input_userauth_request: invalid user centos [preauth] Dec 30 23:09:17 host sshd[15274]: User centos from 165.232.69.156 not allowed because not listed in AllowUsers Dec 30 23:09:17 host sshd[15274]: input_userauth_request: invalid user centos [preauth] Dec 30 23:09:17 host sshd[15279]: Invalid user ansadmin from 165.232.69.156 port 42150 Dec 30 23:09:17 host sshd[15279]: input_userauth_request: invalid user ansadmin [preauth] Dec 30 23:09:17 host sshd[15245]: pam_unix(sshd:auth): check pass; user unknown Dec 30 23:09:17 host sshd[15248]: pam_unix(sshd:auth): check pass; user unknown Dec 30 23:09:17 host sshd[15248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Dec 30 23:09:17 host sshd[15245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Dec 30 23:09:17 host sshd[15243]: pam_unix(sshd:auth): check pass; user unknown Dec 30 23:09:17 host sshd[15243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Dec 30 23:09:17 host sshd[15244]: pam_unix(sshd:auth): check pass; user unknown Dec 30 23:09:17 host sshd[15244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Dec 30 23:09:17 host sshd[15247]: pam_unix(sshd:auth): check pass; user unknown Dec 30 23:09:17 host sshd[15247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Dec 30 23:09:17 host sshd[15242]: pam_unix(sshd:auth): check pass; user unknown Dec 30 23:09:17 host sshd[15242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Dec 30 23:09:17 host sshd[15246]: pam_unix(sshd:auth): check pass; user unknown Dec 30 23:09:17 host sshd[15246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Dec 30 23:09:17 host sshd[15250]: pam_unix(sshd:auth): check pass; user unknown Dec 30 23:09:17 host sshd[15250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Dec 30 23:09:17 host sshd[15255]: pam_unix(sshd:auth): check pass; user unknown Dec 30 23:09:17 host sshd[15255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Dec 30 23:09:17 host sshd[15254]: pam_unix(sshd:auth): check pass; user unknown Dec 30 23:09:17 host sshd[15254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Dec 30 23:09:17 host sshd[15257]: pam_unix(sshd:auth): check pass; user unknown Dec 30 23:09:17 host sshd[15257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Dec 30 23:09:17 host sshd[15259]: pam_unix(sshd:auth): check pass; user unknown Dec 30 23:09:17 host sshd[15259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Dec 30 23:09:17 host sshd[15258]: pam_unix(sshd:auth): check pass; user unknown Dec 30 23:09:17 host sshd[15258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Dec 30 23:09:17 host sshd[15261]: pam_unix(sshd:auth): check pass; user unknown Dec 30 23:09:17 host sshd[15261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Dec 30 23:09:17 host sshd[15264]: pam_unix(sshd:auth): check pass; user unknown Dec 30 23:09:17 host sshd[15264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Dec 30 23:09:17 host sshd[15262]: pam_unix(sshd:auth): check pass; user unknown Dec 30 23:09:17 host sshd[15262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Dec 30 23:09:17 host sshd[15273]: pam_unix(sshd:auth): check pass; user unknown Dec 30 23:09:17 host sshd[15273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Dec 30 23:09:17 host unix_chkpwd[15305]: password check failed for user (mail) Dec 30 23:09:17 host sshd[15265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 user=mail Dec 30 23:09:17 host sshd[15265]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mail" Dec 30 23:09:17 host sshd[15251]: pam_unix(sshd:auth): check pass; user unknown Dec 30 23:09:17 host sshd[15251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Dec 30 23:09:17 host sshd[15252]: pam_unix(sshd:auth): check pass; user unknown Dec 30 23:09:17 host sshd[15252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Dec 30 23:09:17 host unix_chkpwd[15306]: password check failed for user (centos) Dec 30 23:09:17 host sshd[15270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 user=centos Dec 30 23:09:17 host unix_chkpwd[15307]: password check failed for user (centos) Dec 30 23:09:17 host sshd[15266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 user=centos Dec 30 23:09:17 host sshd[15271]: pam_unix(sshd:auth): check pass; user unknown Dec 30 23:09:17 host sshd[15271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Dec 30 23:09:17 host unix_chkpwd[15308]: password check failed for user (ftp) Dec 30 23:09:17 host sshd[15263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 user=ftp Dec 30 23:09:17 host sshd[15263]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Dec 30 23:09:17 host sshd[15272]: pam_unix(sshd:auth): check pass; user unknown Dec 30 23:09:17 host sshd[15272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Dec 30 23:09:17 host sshd[15253]: pam_unix(sshd:auth): check pass; user unknown Dec 30 23:09:17 host sshd[15253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Dec 30 23:09:17 host unix_chkpwd[15309]: password check failed for user (centos) Dec 30 23:09:17 host sshd[15249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 user=centos Dec 30 23:09:17 host sshd[15256]: pam_unix(sshd:auth): check pass; user unknown Dec 30 23:09:17 host sshd[15256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Dec 30 23:09:17 host unix_chkpwd[15310]: password check failed for user (centos) Dec 30 23:09:17 host sshd[15269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 user=centos Dec 30 23:09:17 host unix_chkpwd[15311]: password check failed for user (centos) Dec 30 23:09:17 host sshd[15274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 user=centos Dec 30 23:09:17 host sshd[15279]: pam_unix(sshd:auth): check pass; user unknown Dec 30 23:09:17 host sshd[15279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Dec 30 23:09:18 host sshd[15245]: Failed password for invalid user elastic from 165.232.69.156 port 42218 ssh2 Dec 30 23:09:18 host sshd[15248]: Failed password for invalid user ec2-user from 165.232.69.156 port 42180 ssh2 Dec 30 23:09:18 host sshd[15243]: Failed password for invalid user ec2-user from 165.232.69.156 port 42188 ssh2 Dec 30 23:09:18 host sshd[15244]: Failed password for invalid user discordbot from 165.232.69.156 port 42148 ssh2 Dec 30 23:09:18 host sshd[15247]: Failed password for invalid user admin from 165.232.69.156 port 42204 ssh2 Dec 30 23:09:18 host sshd[15246]: Failed password for invalid user emqx from 165.232.69.156 port 42168 ssh2 Dec 30 23:09:18 host sshd[15242]: Failed password for invalid user oracle from 165.232.69.156 port 42174 ssh2 Dec 30 23:09:18 host sshd[15250]: Failed password for invalid user discord from 165.232.69.156 port 42140 ssh2 Dec 30 23:09:18 host sshd[15255]: Failed password for invalid user es from 165.232.69.156 port 42200 ssh2 Dec 30 23:09:18 host sshd[15254]: Failed password for invalid user postgres from 165.232.69.156 port 42190 ssh2 Dec 30 23:09:18 host sshd[15257]: Failed password for invalid user admin from 165.232.69.156 port 42186 ssh2 Dec 30 23:09:18 host sshd[15259]: Failed password for invalid user deploy from 165.232.69.156 port 42212 ssh2 Dec 30 23:09:18 host sshd[15258]: Failed password for invalid user fa from 165.232.69.156 port 42184 ssh2 Dec 30 23:09:18 host sshd[15261]: Failed password for invalid user web from 165.232.69.156 port 42164 ssh2 Dec 30 23:09:18 host sshd[15264]: Failed password for invalid user odoo15 from 165.232.69.156 port 42198 ssh2 Dec 30 23:09:18 host sshd[15262]: Failed password for invalid user test from 165.232.69.156 port 42216 ssh2 Dec 30 23:09:18 host sshd[15273]: Failed password for invalid user ts3 from 165.232.69.156 port 42208 ssh2 Dec 30 23:09:18 host sshd[15265]: Failed password for invalid user mail from 165.232.69.156 port 42156 ssh2 Dec 30 23:09:18 host sshd[15251]: Failed password for invalid user esuser from 165.232.69.156 port 42214 ssh2 Dec 30 23:09:18 host sshd[15252]: Failed password for invalid user git from 165.232.69.156 port 42166 ssh2 Dec 30 23:09:18 host sshd[15270]: Failed password for invalid user centos from 165.232.69.156 port 42210 ssh2 Dec 30 23:09:18 host sshd[15266]: Failed password for invalid user centos from 165.232.69.156 port 42160 ssh2 Dec 30 23:09:18 host sshd[15271]: Failed password for invalid user user from 165.232.69.156 port 42196 ssh2 Dec 30 23:09:18 host sshd[15263]: Failed password for invalid user ftp from 165.232.69.156 port 42154 ssh2 Dec 30 23:09:18 host sshd[15272]: Failed password for invalid user user from 165.232.69.156 port 42158 ssh2 Dec 30 23:09:18 host sshd[15253]: Failed password for invalid user dockeradmin from 165.232.69.156 port 42202 ssh2 Dec 30 23:09:18 host sshd[15249]: Failed password for invalid user centos from 165.232.69.156 port 42192 ssh2 Dec 30 23:09:18 host sshd[15256]: Failed password for invalid user git from 165.232.69.156 port 42146 ssh2 Dec 30 23:09:18 host sshd[15269]: Failed password for invalid user centos from 165.232.69.156 port 42172 ssh2 Dec 30 23:09:18 host sshd[15274]: Failed password for invalid user centos from 165.232.69.156 port 42194 ssh2 Dec 30 23:09:18 host sshd[15279]: Failed password for invalid user ansadmin from 165.232.69.156 port 42150 ssh2 Dec 30 23:09:19 host sshd[15245]: Connection closed by 165.232.69.156 port 42218 [preauth] Dec 30 23:09:19 host sshd[15248]: Connection closed by 165.232.69.156 port 42180 [preauth] Dec 30 23:09:19 host sshd[15242]: Connection closed by 165.232.69.156 port 42174 [preauth] Dec 30 23:09:19 host sshd[15247]: Connection closed by 165.232.69.156 port 42204 [preauth] Dec 30 23:09:19 host sshd[15243]: Connection closed by 165.232.69.156 port 42188 [preauth] Dec 30 23:09:19 host sshd[15244]: Connection closed by 165.232.69.156 port 42148 [preauth] Dec 30 23:09:19 host sshd[15246]: Connection closed by 165.232.69.156 port 42168 [preauth] Dec 30 23:09:19 host sshd[15250]: Connection closed by 165.232.69.156 port 42140 [preauth] Dec 30 23:09:19 host sshd[15255]: Connection closed by 165.232.69.156 port 42200 [preauth] Dec 30 23:09:19 host sshd[15254]: Connection closed by 165.232.69.156 port 42190 [preauth] Dec 30 23:09:19 host sshd[15257]: Connection closed by 165.232.69.156 port 42186 [preauth] Dec 30 23:09:19 host sshd[15259]: Connection closed by 165.232.69.156 port 42212 [preauth] Dec 30 23:09:19 host sshd[15258]: Connection closed by 165.232.69.156 port 42184 [preauth] Dec 30 23:09:19 host sshd[15262]: Connection closed by 165.232.69.156 port 42216 [preauth] Dec 30 23:09:19 host sshd[15251]: Connection closed by 165.232.69.156 port 42214 [preauth] Dec 30 23:09:19 host sshd[15261]: Connection closed by 165.232.69.156 port 42164 [preauth] Dec 30 23:09:19 host sshd[15264]: Connection closed by 165.232.69.156 port 42198 [preauth] Dec 30 23:09:19 host sshd[15252]: Connection closed by 165.232.69.156 port 42166 [preauth] Dec 30 23:09:19 host sshd[15265]: Connection closed by 165.232.69.156 port 42156 [preauth] Dec 30 23:09:19 host sshd[15273]: Connection closed by 165.232.69.156 port 42208 [preauth] Dec 30 23:09:19 host sshd[15266]: Connection closed by 165.232.69.156 port 42160 [preauth] Dec 30 23:09:19 host sshd[15253]: Connection closed by 165.232.69.156 port 42202 [preauth] Dec 30 23:09:19 host sshd[15270]: Connection closed by 165.232.69.156 port 42210 [preauth] Dec 30 23:09:19 host sshd[15249]: Connection closed by 165.232.69.156 port 42192 [preauth] Dec 30 23:09:19 host sshd[15263]: Connection closed by 165.232.69.156 port 42154 [preauth] Dec 30 23:09:19 host sshd[15271]: Connection closed by 165.232.69.156 port 42196 [preauth] Dec 30 23:09:19 host sshd[15256]: Connection closed by 165.232.69.156 port 42146 [preauth] Dec 30 23:09:19 host sshd[15272]: Connection closed by 165.232.69.156 port 42158 [preauth] Dec 30 23:09:19 host sshd[15269]: Connection closed by 165.232.69.156 port 42172 [preauth] Dec 30 23:09:19 host sshd[15274]: Connection closed by 165.232.69.156 port 42194 [preauth] Dec 30 23:09:19 host sshd[15279]: Connection closed by 165.232.69.156 port 42150 [preauth] Dec 30 23:10:57 host sshd[15510]: User root from 201.33.192.17 not allowed because not listed in AllowUsers Dec 30 23:10:57 host sshd[15510]: input_userauth_request: invalid user root [preauth] Dec 30 23:10:57 host unix_chkpwd[15524]: password check failed for user (root) Dec 30 23:10:57 host sshd[15510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.33.192.17 user=root Dec 30 23:10:57 host sshd[15510]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 23:10:59 host sshd[15510]: Failed password for invalid user root from 201.33.192.17 port 49204 ssh2 Dec 30 23:10:59 host sshd[15510]: Received disconnect from 201.33.192.17 port 49204:11: Bye Bye [preauth] Dec 30 23:10:59 host sshd[15510]: Disconnected from 201.33.192.17 port 49204 [preauth] Dec 30 23:11:01 host sshd[15527]: User root from 201.33.192.17 not allowed because not listed in AllowUsers Dec 30 23:11:01 host sshd[15527]: input_userauth_request: invalid user root [preauth] Dec 30 23:11:02 host unix_chkpwd[15539]: password check failed for user (root) Dec 30 23:11:02 host sshd[15527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.33.192.17 user=root Dec 30 23:11:02 host sshd[15527]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 30 23:11:03 host sshd[15527]: Failed password for invalid user root from 201.33.192.17 port 49410 ssh2 Dec 30 23:11:04 host sshd[15527]: Received disconnect from 201.33.192.17 port 49410:11: Bye Bye [preauth] Dec 30 23:11:04 host sshd[15527]: Disconnected from 201.33.192.17 port 49410 [preauth] Dec 30 23:11:06 host sshd[15544]: Invalid user ubnt from 201.33.192.17 port 49654 Dec 30 23:11:06 host sshd[15544]: input_userauth_request: invalid user ubnt [preauth] Dec 30 23:11:06 host sshd[15544]: pam_unix(sshd:auth): check pass; user unknown Dec 30 23:11:06 host sshd[15544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.33.192.17 Dec 30 23:11:08 host sshd[15544]: Failed password for invalid user ubnt from 201.33.192.17 port 49654 ssh2 Dec 30 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 30 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 30 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 30 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 30 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 30 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 30 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 30 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 23:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 30 23:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 23:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 30 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=mrsclean user-2=wwwnexidigital user-3=gifterman user-4=palco123 user-5=phmetals user-6=kottayamcalldriv user-7=straightcurve user-8=wwwletsstalkfood user-9=bonifacegroup user-10=wwwevmhonda user-11=pmcresources user-12=vfmassets user-13=wwwtestugo user-14=shalinijames user-15=wwwkapin user-16=woodpeck user-17=disposeat user-18=wwwkmaorg user-19=remysagr user-20=wwwrmswll user-21=wwwresourcehunte user-22=keralaholi user-23=ugotscom user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=dartsimp user-28=a2zgroup user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 30 23:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 30 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-YpIScw3KYKolZ2To.~ Dec 30 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 23:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-YpIScw3KYKolZ2To.~' Dec 30 23:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 23:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-YpIScw3KYKolZ2To.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 30 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 30 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 30 23:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 23:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 23:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 30 23:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 23:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 23:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 30 23:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 23:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 23:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 30 23:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 23:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 23:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 30 23:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 23:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 30 23:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 30 23:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 30 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 30 23:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 30 23:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 30 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 30 23:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 30 23:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 30 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 30 23:21:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 30 23:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 30 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 30 23:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 23:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 30 23:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 23:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 30 23:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 30 23:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 30 23:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 30 23:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 23:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 23:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 30 23:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 30 23:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 30 23:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 30 23:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 30 23:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 30 23:41:19 host sshd[19943]: Invalid user user from 106.10.122.53 port 50380 Dec 30 23:41:19 host sshd[19943]: input_userauth_request: invalid user user [preauth] Dec 30 23:41:19 host sshd[19943]: pam_unix(sshd:auth): check pass; user unknown Dec 30 23:41:19 host sshd[19943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 30 23:41:20 host sshd[19943]: Failed password for invalid user user from 106.10.122.53 port 50380 ssh2 Dec 30 23:41:20 host sshd[19943]: Connection closed by 106.10.122.53 port 50380 [preauth] Dec 30 23:51:39 host sshd[21391]: Invalid user rq from 144.217.87.192 port 58868 Dec 30 23:51:39 host sshd[21391]: input_userauth_request: invalid user rq [preauth] Dec 30 23:51:39 host sshd[21391]: pam_unix(sshd:auth): check pass; user unknown Dec 30 23:51:39 host sshd[21391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.87.192 Dec 30 23:51:41 host sshd[21391]: Failed password for invalid user rq from 144.217.87.192 port 58868 ssh2 Dec 30 23:51:41 host sshd[21391]: Received disconnect from 144.217.87.192 port 58868:11: Bye Bye [preauth] Dec 30 23:51:41 host sshd[21391]: Disconnected from 144.217.87.192 port 58868 [preauth] Dec 30 23:53:43 host sshd[21827]: Invalid user bm from 165.227.167.225 port 35228 Dec 30 23:53:43 host sshd[21827]: input_userauth_request: invalid user bm [preauth] Dec 30 23:53:43 host sshd[21827]: pam_unix(sshd:auth): check pass; user unknown Dec 30 23:53:43 host sshd[21827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.167.225 Dec 30 23:53:45 host sshd[21827]: Failed password for invalid user bm from 165.227.167.225 port 35228 ssh2 Dec 30 23:53:45 host sshd[21827]: Received disconnect from 165.227.167.225 port 35228:11: Bye Bye [preauth] Dec 30 23:53:45 host sshd[21827]: Disconnected from 165.227.167.225 port 35228 [preauth] Dec 30 23:54:54 host sshd[22081]: Invalid user gc from 165.227.167.225 port 51314 Dec 30 23:54:54 host sshd[22081]: input_userauth_request: invalid user gc [preauth] Dec 30 23:54:54 host sshd[22081]: pam_unix(sshd:auth): check pass; user unknown Dec 30 23:54:54 host sshd[22081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.167.225 Dec 30 23:54:55 host sshd[22081]: Failed password for invalid user gc from 165.227.167.225 port 51314 ssh2 Dec 30 23:54:55 host sshd[22081]: Received disconnect from 165.227.167.225 port 51314:11: Bye Bye [preauth] Dec 30 23:54:55 host sshd[22081]: Disconnected from 165.227.167.225 port 51314 [preauth] Dec 30 23:55:48 host sshd[22386]: Invalid user pl from 144.217.87.192 port 48680 Dec 30 23:55:48 host sshd[22386]: input_userauth_request: invalid user pl [preauth] Dec 30 23:55:48 host sshd[22386]: pam_unix(sshd:auth): check pass; user unknown Dec 30 23:55:48 host sshd[22386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.87.192 Dec 30 23:55:49 host sshd[22386]: Failed password for invalid user pl from 144.217.87.192 port 48680 ssh2 Dec 30 23:55:50 host sshd[22386]: Received disconnect from 144.217.87.192 port 48680:11: Bye Bye [preauth] Dec 30 23:55:50 host sshd[22386]: Disconnected from 144.217.87.192 port 48680 [preauth] Dec 30 23:55:55 host sshd[22412]: Invalid user jq from 165.227.167.225 port 39098 Dec 30 23:55:55 host sshd[22412]: input_userauth_request: invalid user jq [preauth] Dec 30 23:55:55 host sshd[22412]: pam_unix(sshd:auth): check pass; user unknown Dec 30 23:55:55 host sshd[22412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.167.225 Dec 30 23:55:57 host sshd[22412]: Failed password for invalid user jq from 165.227.167.225 port 39098 ssh2 Dec 30 23:55:58 host sshd[22412]: Received disconnect from 165.227.167.225 port 39098:11: Bye Bye [preauth] Dec 30 23:55:58 host sshd[22412]: Disconnected from 165.227.167.225 port 39098 [preauth] Dec 30 23:57:05 host sshd[22732]: Invalid user ga from 144.217.87.192 port 48900 Dec 30 23:57:05 host sshd[22732]: input_userauth_request: invalid user ga [preauth] Dec 30 23:57:05 host sshd[22732]: pam_unix(sshd:auth): check pass; user unknown Dec 30 23:57:05 host sshd[22732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.87.192 Dec 30 23:57:06 host sshd[22732]: Failed password for invalid user ga from 144.217.87.192 port 48900 ssh2 Dec 30 23:57:06 host sshd[22732]: Received disconnect from 144.217.87.192 port 48900:11: Bye Bye [preauth] Dec 30 23:57:06 host sshd[22732]: Disconnected from 144.217.87.192 port 48900 [preauth] Dec 31 00:11:38 host sshd[24960]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Dec 31 00:11:38 host sshd[24960]: input_userauth_request: invalid user root [preauth] Dec 31 00:11:39 host unix_chkpwd[24963]: password check failed for user (root) Dec 31 00:11:39 host sshd[24960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Dec 31 00:11:39 host sshd[24960]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 00:11:41 host sshd[24960]: Failed password for invalid user root from 162.218.126.136 port 56452 ssh2 Dec 31 00:11:41 host sshd[24960]: Connection closed by 162.218.126.136 port 56452 [preauth] Dec 31 00:12:21 host sshd[25021]: User root from 103.13.40.2 not allowed because not listed in AllowUsers Dec 31 00:12:21 host sshd[25021]: input_userauth_request: invalid user root [preauth] Dec 31 00:12:21 host unix_chkpwd[25023]: password check failed for user (root) Dec 31 00:12:21 host sshd[25021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 user=root Dec 31 00:12:21 host sshd[25021]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 00:12:23 host sshd[25021]: Failed password for invalid user root from 103.13.40.2 port 60034 ssh2 Dec 31 00:12:23 host sshd[25021]: Connection closed by 103.13.40.2 port 60034 [preauth] Dec 31 00:12:35 host sshd[25060]: Connection closed by 172.104.11.34 port 49278 [preauth] Dec 31 00:12:37 host sshd[25064]: Connection closed by 172.104.11.34 port 59220 [preauth] Dec 31 00:12:38 host sshd[25067]: Connection closed by 172.104.11.34 port 59228 [preauth] Dec 31 00:14:35 host sshd[25436]: Invalid user fh from 45.93.201.90 port 58194 Dec 31 00:14:35 host sshd[25436]: input_userauth_request: invalid user fh [preauth] Dec 31 00:14:35 host sshd[25436]: pam_unix(sshd:auth): check pass; user unknown Dec 31 00:14:35 host sshd[25436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 31 00:14:37 host sshd[25436]: Failed password for invalid user fh from 45.93.201.90 port 58194 ssh2 Dec 31 00:14:40 host sshd[25436]: pam_unix(sshd:auth): check pass; user unknown Dec 31 00:14:43 host sshd[25436]: Failed password for invalid user fh from 45.93.201.90 port 58194 ssh2 Dec 31 00:14:46 host sshd[25436]: pam_unix(sshd:auth): check pass; user unknown Dec 31 00:14:49 host sshd[25436]: Failed password for invalid user fh from 45.93.201.90 port 58194 ssh2 Dec 31 00:14:52 host sshd[25436]: Connection closed by 45.93.201.90 port 58194 [preauth] Dec 31 00:14:52 host sshd[25436]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 31 00:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 00:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 00:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 00:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 00:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 00:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 00:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 00:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 00:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 00:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 31 00:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 00:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 00:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 31 00:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 00:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 00:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 31 00:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 00:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 00:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 31 00:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 00:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 00:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 31 00:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 00:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 00:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 31 00:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 00:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 00:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 31 00:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 00:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 00:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 31 00:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 00:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 31 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=laundryboniface user-4=dartsimp user-5=a2zgroup user-6=wwwpmcresource user-7=wwwrmswll user-8=keralaholi user-9=wwwresourcehunte user-10=ugotscom user-11=travelboniface user-12=wwwkapin user-13=woodpeck user-14=disposeat user-15=wwwkmaorg user-16=remysagr user-17=pmcresources user-18=vfmassets user-19=wwwtestugo user-20=shalinijames user-21=straightcurve user-22=wwwletsstalkfood user-23=bonifacegroup user-24=wwwevmhonda user-25=wwwnexidigital user-26=mrsclean user-27=gifterman user-28=palco123 user-29=kottayamcalldriv user-30=phmetals feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 31 00:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 31 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 00:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 00:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 00:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-rjz4XJ6f35xdLYE7.~ Dec 31 00:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 00:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-rjz4XJ6f35xdLYE7.~' Dec 31 00:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 00:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-rjz4XJ6f35xdLYE7.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 00:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 00:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 31 00:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 00:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 00:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 31 00:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 00:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 00:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 00:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 00:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 00:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 00:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 00:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 00:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 00:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 00:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 00:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 31 00:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 00:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 00:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 00:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 00:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 00:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 31 00:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 31 00:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 31 00:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 31 00:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 00:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 31 00:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 00:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 00:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 31 00:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 00:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 00:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 31 00:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 00:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 00:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 31 00:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 00:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 00:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 31 00:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 00:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 00:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 31 00:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 00:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 00:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 31 00:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 31 00:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 31 00:22:14 host sshd[27586]: Invalid user pi from 86.161.240.15 port 38136 Dec 31 00:22:14 host sshd[27586]: input_userauth_request: invalid user pi [preauth] Dec 31 00:22:15 host sshd[27587]: Invalid user pi from 86.161.240.15 port 38140 Dec 31 00:22:15 host sshd[27587]: input_userauth_request: invalid user pi [preauth] Dec 31 00:22:15 host sshd[27586]: pam_unix(sshd:auth): check pass; user unknown Dec 31 00:22:15 host sshd[27586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.161.240.15 Dec 31 00:22:15 host sshd[27587]: pam_unix(sshd:auth): check pass; user unknown Dec 31 00:22:15 host sshd[27587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.161.240.15 Dec 31 00:22:17 host sshd[27586]: Failed password for invalid user pi from 86.161.240.15 port 38136 ssh2 Dec 31 00:22:17 host sshd[27587]: Failed password for invalid user pi from 86.161.240.15 port 38140 ssh2 Dec 31 00:22:17 host sshd[27586]: Connection closed by 86.161.240.15 port 38136 [preauth] Dec 31 00:22:17 host sshd[27587]: Connection closed by 86.161.240.15 port 38140 [preauth] Dec 31 00:25:09 host sshd[27914]: User root from 41.197.31.178 not allowed because not listed in AllowUsers Dec 31 00:25:09 host sshd[27914]: input_userauth_request: invalid user root [preauth] Dec 31 00:25:10 host unix_chkpwd[27920]: password check failed for user (root) Dec 31 00:25:10 host sshd[27914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 user=root Dec 31 00:25:10 host sshd[27914]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 00:25:12 host sshd[27914]: Failed password for invalid user root from 41.197.31.178 port 46014 ssh2 Dec 31 00:25:12 host sshd[27914]: Connection closed by 41.197.31.178 port 46014 [preauth] Dec 31 00:33:55 host sshd[29123]: Invalid user zy from 159.203.182.218 port 47984 Dec 31 00:33:55 host sshd[29123]: input_userauth_request: invalid user zy [preauth] Dec 31 00:33:55 host sshd[29123]: pam_unix(sshd:auth): check pass; user unknown Dec 31 00:33:55 host sshd[29123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.182.218 Dec 31 00:33:57 host sshd[29123]: Failed password for invalid user zy from 159.203.182.218 port 47984 ssh2 Dec 31 00:33:57 host sshd[29123]: Received disconnect from 159.203.182.218 port 47984:11: Bye Bye [preauth] Dec 31 00:33:57 host sshd[29123]: Disconnected from 159.203.182.218 port 47984 [preauth] Dec 31 00:35:03 host sshd[29288]: Invalid user lt from 85.18.236.229 port 49560 Dec 31 00:35:03 host sshd[29288]: input_userauth_request: invalid user lt [preauth] Dec 31 00:35:03 host sshd[29288]: pam_unix(sshd:auth): check pass; user unknown Dec 31 00:35:03 host sshd[29288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.18.236.229 Dec 31 00:35:05 host sshd[29288]: Failed password for invalid user lt from 85.18.236.229 port 49560 ssh2 Dec 31 00:35:06 host sshd[29288]: Received disconnect from 85.18.236.229 port 49560:11: Bye Bye [preauth] Dec 31 00:35:06 host sshd[29288]: Disconnected from 85.18.236.229 port 49560 [preauth] Dec 31 00:35:36 host sshd[29371]: Invalid user iw from 46.219.39.19 port 47224 Dec 31 00:35:36 host sshd[29371]: input_userauth_request: invalid user iw [preauth] Dec 31 00:35:36 host sshd[29371]: pam_unix(sshd:auth): check pass; user unknown Dec 31 00:35:36 host sshd[29371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.219.39.19 Dec 31 00:35:38 host sshd[29371]: Failed password for invalid user iw from 46.219.39.19 port 47224 ssh2 Dec 31 00:35:38 host sshd[29371]: Received disconnect from 46.219.39.19 port 47224:11: Bye Bye [preauth] Dec 31 00:35:38 host sshd[29371]: Disconnected from 46.219.39.19 port 47224 [preauth] Dec 31 00:38:55 host sshd[29839]: Invalid user zb from 159.203.182.218 port 45572 Dec 31 00:38:55 host sshd[29839]: input_userauth_request: invalid user zb [preauth] Dec 31 00:38:55 host sshd[29839]: pam_unix(sshd:auth): check pass; user unknown Dec 31 00:38:55 host sshd[29839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.182.218 Dec 31 00:38:56 host sshd[29839]: Failed password for invalid user zb from 159.203.182.218 port 45572 ssh2 Dec 31 00:38:56 host sshd[29839]: Received disconnect from 159.203.182.218 port 45572:11: Bye Bye [preauth] Dec 31 00:38:56 host sshd[29839]: Disconnected from 159.203.182.218 port 45572 [preauth] Dec 31 00:39:25 host sshd[29915]: Invalid user vf from 85.18.236.229 port 39072 Dec 31 00:39:25 host sshd[29915]: input_userauth_request: invalid user vf [preauth] Dec 31 00:39:25 host sshd[29915]: pam_unix(sshd:auth): check pass; user unknown Dec 31 00:39:25 host sshd[29915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.18.236.229 Dec 31 00:39:27 host sshd[29915]: Failed password for invalid user vf from 85.18.236.229 port 39072 ssh2 Dec 31 00:39:27 host sshd[29915]: Received disconnect from 85.18.236.229 port 39072:11: Bye Bye [preauth] Dec 31 00:39:27 host sshd[29915]: Disconnected from 85.18.236.229 port 39072 [preauth] Dec 31 00:40:00 host sshd[29960]: Invalid user ng from 159.203.182.218 port 44762 Dec 31 00:40:00 host sshd[29960]: input_userauth_request: invalid user ng [preauth] Dec 31 00:40:00 host sshd[29960]: pam_unix(sshd:auth): check pass; user unknown Dec 31 00:40:00 host sshd[29960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.182.218 Dec 31 00:40:02 host sshd[29960]: Failed password for invalid user ng from 159.203.182.218 port 44762 ssh2 Dec 31 00:40:02 host sshd[29960]: Received disconnect from 159.203.182.218 port 44762:11: Bye Bye [preauth] Dec 31 00:40:02 host sshd[29960]: Disconnected from 159.203.182.218 port 44762 [preauth] Dec 31 00:40:35 host sshd[30084]: Invalid user oz from 85.18.236.229 port 35368 Dec 31 00:40:35 host sshd[30084]: input_userauth_request: invalid user oz [preauth] Dec 31 00:40:35 host sshd[30084]: pam_unix(sshd:auth): check pass; user unknown Dec 31 00:40:35 host sshd[30084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.18.236.229 Dec 31 00:40:37 host sshd[30084]: Failed password for invalid user oz from 85.18.236.229 port 35368 ssh2 Dec 31 00:40:37 host sshd[30084]: Received disconnect from 85.18.236.229 port 35368:11: Bye Bye [preauth] Dec 31 00:40:37 host sshd[30084]: Disconnected from 85.18.236.229 port 35368 [preauth] Dec 31 00:40:41 host sshd[30120]: Invalid user hq from 46.219.39.19 port 52018 Dec 31 00:40:41 host sshd[30120]: input_userauth_request: invalid user hq [preauth] Dec 31 00:40:41 host sshd[30120]: pam_unix(sshd:auth): check pass; user unknown Dec 31 00:40:41 host sshd[30120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.219.39.19 Dec 31 00:40:43 host sshd[30120]: Failed password for invalid user hq from 46.219.39.19 port 52018 ssh2 Dec 31 00:40:43 host sshd[30120]: Received disconnect from 46.219.39.19 port 52018:11: Bye Bye [preauth] Dec 31 00:40:43 host sshd[30120]: Disconnected from 46.219.39.19 port 52018 [preauth] Dec 31 00:41:54 host sshd[30276]: Invalid user me from 46.219.39.19 port 39366 Dec 31 00:41:54 host sshd[30276]: input_userauth_request: invalid user me [preauth] Dec 31 00:41:54 host sshd[30276]: pam_unix(sshd:auth): check pass; user unknown Dec 31 00:41:54 host sshd[30276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.219.39.19 Dec 31 00:41:56 host sshd[30276]: Failed password for invalid user me from 46.219.39.19 port 39366 ssh2 Dec 31 00:41:56 host sshd[30276]: Received disconnect from 46.219.39.19 port 39366:11: Bye Bye [preauth] Dec 31 00:41:56 host sshd[30276]: Disconnected from 46.219.39.19 port 39366 [preauth] Dec 31 00:46:34 host sshd[30952]: Invalid user grid from 92.46.108.20 port 37838 Dec 31 00:46:34 host sshd[30952]: input_userauth_request: invalid user grid [preauth] Dec 31 00:46:34 host sshd[30952]: pam_unix(sshd:auth): check pass; user unknown Dec 31 00:46:34 host sshd[30952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 31 00:46:37 host sshd[30952]: Failed password for invalid user grid from 92.46.108.20 port 37838 ssh2 Dec 31 00:46:37 host sshd[30952]: Connection closed by 92.46.108.20 port 37838 [preauth] Dec 31 01:05:24 host sshd[1321]: User root from 106.10.122.53 not allowed because not listed in AllowUsers Dec 31 01:05:24 host sshd[1321]: input_userauth_request: invalid user root [preauth] Dec 31 01:05:24 host unix_chkpwd[1325]: password check failed for user (root) Dec 31 01:05:24 host sshd[1321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 user=root Dec 31 01:05:24 host sshd[1321]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 01:05:26 host sshd[1321]: Failed password for invalid user root from 106.10.122.53 port 35122 ssh2 Dec 31 01:05:26 host sshd[1321]: Connection closed by 106.10.122.53 port 35122 [preauth] Dec 31 01:17:28 host sshd[3025]: Invalid user user from 162.218.126.136 port 55770 Dec 31 01:17:28 host sshd[3025]: input_userauth_request: invalid user user [preauth] Dec 31 01:17:29 host sshd[3025]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:17:29 host sshd[3025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 31 01:17:30 host sshd[3025]: Failed password for invalid user user from 162.218.126.136 port 55770 ssh2 Dec 31 01:17:31 host sshd[3025]: Connection closed by 162.218.126.136 port 55770 [preauth] Dec 31 01:18:19 host sshd[3124]: Invalid user vl from 170.210.46.4 port 47208 Dec 31 01:18:19 host sshd[3124]: input_userauth_request: invalid user vl [preauth] Dec 31 01:18:19 host sshd[3124]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:18:19 host sshd[3124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.210.46.4 Dec 31 01:18:21 host sshd[3124]: Failed password for invalid user vl from 170.210.46.4 port 47208 ssh2 Dec 31 01:18:21 host sshd[3124]: Received disconnect from 170.210.46.4 port 47208:11: Bye Bye [preauth] Dec 31 01:18:21 host sshd[3124]: Disconnected from 170.210.46.4 port 47208 [preauth] Dec 31 01:20:07 host sshd[3387]: Invalid user it from 139.59.6.169 port 40358 Dec 31 01:20:07 host sshd[3387]: input_userauth_request: invalid user it [preauth] Dec 31 01:20:07 host sshd[3387]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:20:07 host sshd[3387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.6.169 Dec 31 01:20:08 host sshd[3387]: Failed password for invalid user it from 139.59.6.169 port 40358 ssh2 Dec 31 01:20:08 host sshd[3387]: Received disconnect from 139.59.6.169 port 40358:11: Bye Bye [preauth] Dec 31 01:20:08 host sshd[3387]: Disconnected from 139.59.6.169 port 40358 [preauth] Dec 31 01:20:29 host sshd[3445]: Invalid user id from 167.86.92.193 port 33494 Dec 31 01:20:29 host sshd[3445]: input_userauth_request: invalid user id [preauth] Dec 31 01:20:29 host sshd[3445]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:20:29 host sshd[3445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.86.92.193 Dec 31 01:20:31 host sshd[3445]: Failed password for invalid user id from 167.86.92.193 port 33494 ssh2 Dec 31 01:20:31 host sshd[3445]: Received disconnect from 167.86.92.193 port 33494:11: Bye Bye [preauth] Dec 31 01:20:31 host sshd[3445]: Disconnected from 167.86.92.193 port 33494 [preauth] Dec 31 01:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 01:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 01:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 01:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 01:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 01:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 01:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 01:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 01:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 01:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 31 01:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 01:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 01:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 31 01:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 01:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 01:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 31 01:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 01:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 01:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 31 01:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 01:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 01:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 31 01:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 01:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 01:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 31 01:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 01:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 01:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 31 01:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 01:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 01:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 31 01:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 01:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 01:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 31 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 01:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=a2zgroup user-3=dartsimp user-4=cochintaxi user-5=wwwkaretakers user-6=wwwresourcehunte user-7=keralaholi user-8=wwwrmswll user-9=ugotscom user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=vfmassets user-14=shalinijames user-15=wwwtestugo user-16=wwwkapin user-17=woodpeck user-18=wwwkmaorg user-19=disposeat user-20=remysagr user-21=wwwnexidigital user-22=mrsclean user-23=palco123 user-24=gifterman user-25=phmetals user-26=kottayamcalldriv user-27=straightcurve user-28=wwwletsstalkfood user-29=bonifacegroup user-30=wwwevmhonda feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 31 01:21:53 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 31 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 01:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 01:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-IQQrQPmEI82pDLk3.~ Dec 31 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 01:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-IQQrQPmEI82pDLk3.~' Dec 31 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 01:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-IQQrQPmEI82pDLk3.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 01:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 31 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 01:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 31 01:21:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 01:21:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 01:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 01:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 01:21:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 01:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 01:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 01:21:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 01:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 01:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 01:21:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 01:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 31 01:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 01:21:55 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 01:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 01:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 01:21:56 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 01:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 31 01:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 31 01:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 31 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 31 01:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 01:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 01:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 31 01:21:59 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 01:22:00 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 01:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 31 01:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 01:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 01:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 31 01:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 01:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 01:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 31 01:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 01:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 01:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 31 01:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 01:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 01:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 31 01:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 01:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 01:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 31 01:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 31 01:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 31 01:23:19 host sshd[4010]: Invalid user na from 167.86.92.193 port 33656 Dec 31 01:23:19 host sshd[4010]: input_userauth_request: invalid user na [preauth] Dec 31 01:23:19 host sshd[4010]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:23:19 host sshd[4010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.86.92.193 Dec 31 01:23:21 host sshd[4010]: Failed password for invalid user na from 167.86.92.193 port 33656 ssh2 Dec 31 01:23:21 host sshd[4010]: Received disconnect from 167.86.92.193 port 33656:11: Bye Bye [preauth] Dec 31 01:23:21 host sshd[4010]: Disconnected from 167.86.92.193 port 33656 [preauth] Dec 31 01:24:37 host sshd[4153]: Invalid user ya from 167.86.92.193 port 33770 Dec 31 01:24:37 host sshd[4153]: input_userauth_request: invalid user ya [preauth] Dec 31 01:24:37 host sshd[4153]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:24:37 host sshd[4153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.86.92.193 Dec 31 01:24:37 host sshd[4156]: Invalid user js from 139.59.6.169 port 58600 Dec 31 01:24:37 host sshd[4156]: input_userauth_request: invalid user js [preauth] Dec 31 01:24:37 host sshd[4156]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:24:37 host sshd[4156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.6.169 Dec 31 01:24:39 host sshd[4153]: Failed password for invalid user ya from 167.86.92.193 port 33770 ssh2 Dec 31 01:24:39 host sshd[4156]: Failed password for invalid user js from 139.59.6.169 port 58600 ssh2 Dec 31 01:24:39 host sshd[4156]: Received disconnect from 139.59.6.169 port 58600:11: Bye Bye [preauth] Dec 31 01:24:39 host sshd[4156]: Disconnected from 139.59.6.169 port 58600 [preauth] Dec 31 01:24:39 host sshd[4153]: Received disconnect from 167.86.92.193 port 33770:11: Bye Bye [preauth] Dec 31 01:24:39 host sshd[4153]: Disconnected from 167.86.92.193 port 33770 [preauth] Dec 31 01:24:44 host sshd[4193]: Invalid user mm from 170.210.46.4 port 47386 Dec 31 01:24:44 host sshd[4193]: input_userauth_request: invalid user mm [preauth] Dec 31 01:24:44 host sshd[4193]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:24:44 host sshd[4193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.210.46.4 Dec 31 01:24:45 host sshd[4193]: Failed password for invalid user mm from 170.210.46.4 port 47386 ssh2 Dec 31 01:24:46 host sshd[4193]: Received disconnect from 170.210.46.4 port 47386:11: Bye Bye [preauth] Dec 31 01:24:46 host sshd[4193]: Disconnected from 170.210.46.4 port 47386 [preauth] Dec 31 01:26:08 host sshd[4357]: Invalid user iz from 111.85.167.234 port 63119 Dec 31 01:26:08 host sshd[4357]: input_userauth_request: invalid user iz [preauth] Dec 31 01:26:08 host sshd[4357]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:26:08 host sshd[4357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.85.167.234 Dec 31 01:26:10 host sshd[4357]: Failed password for invalid user iz from 111.85.167.234 port 63119 ssh2 Dec 31 01:26:10 host sshd[4357]: Received disconnect from 111.85.167.234 port 63119:11: Bye Bye [preauth] Dec 31 01:26:10 host sshd[4357]: Disconnected from 111.85.167.234 port 63119 [preauth] Dec 31 01:26:10 host sshd[4364]: Invalid user sz from 139.59.6.169 port 58734 Dec 31 01:26:10 host sshd[4364]: input_userauth_request: invalid user sz [preauth] Dec 31 01:26:10 host sshd[4364]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:26:10 host sshd[4364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.6.169 Dec 31 01:26:13 host sshd[4364]: Failed password for invalid user sz from 139.59.6.169 port 58734 ssh2 Dec 31 01:26:13 host sshd[4364]: Received disconnect from 139.59.6.169 port 58734:11: Bye Bye [preauth] Dec 31 01:26:13 host sshd[4364]: Disconnected from 139.59.6.169 port 58734 [preauth] Dec 31 01:26:13 host sshd[4366]: Invalid user sn from 170.210.46.4 port 43180 Dec 31 01:26:13 host sshd[4366]: input_userauth_request: invalid user sn [preauth] Dec 31 01:26:13 host sshd[4366]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:26:13 host sshd[4366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.210.46.4 Dec 31 01:26:16 host sshd[4366]: Failed password for invalid user sn from 170.210.46.4 port 43180 ssh2 Dec 31 01:28:05 host sshd[4641]: Invalid user hm from 111.85.167.234 port 11804 Dec 31 01:28:05 host sshd[4641]: input_userauth_request: invalid user hm [preauth] Dec 31 01:28:05 host sshd[4641]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:28:05 host sshd[4641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.85.167.234 Dec 31 01:28:07 host sshd[4641]: Failed password for invalid user hm from 111.85.167.234 port 11804 ssh2 Dec 31 01:28:07 host sshd[4641]: Received disconnect from 111.85.167.234 port 11804:11: Bye Bye [preauth] Dec 31 01:28:07 host sshd[4641]: Disconnected from 111.85.167.234 port 11804 [preauth] Dec 31 01:28:53 host sshd[4831]: Invalid user ac from 111.85.167.234 port 19882 Dec 31 01:28:53 host sshd[4831]: input_userauth_request: invalid user ac [preauth] Dec 31 01:28:53 host sshd[4831]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:28:53 host sshd[4831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.85.167.234 Dec 31 01:28:55 host sshd[4831]: Failed password for invalid user ac from 111.85.167.234 port 19882 ssh2 Dec 31 01:28:55 host sshd[4831]: Received disconnect from 111.85.167.234 port 19882:11: Bye Bye [preauth] Dec 31 01:28:55 host sshd[4831]: Disconnected from 111.85.167.234 port 19882 [preauth] Dec 31 01:33:47 host sshd[5525]: Invalid user hq from 161.35.108.241 port 57894 Dec 31 01:33:47 host sshd[5525]: input_userauth_request: invalid user hq [preauth] Dec 31 01:33:47 host sshd[5525]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:33:47 host sshd[5525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.108.241 Dec 31 01:33:50 host sshd[5525]: Failed password for invalid user hq from 161.35.108.241 port 57894 ssh2 Dec 31 01:33:50 host sshd[5525]: Received disconnect from 161.35.108.241 port 57894:11: Bye Bye [preauth] Dec 31 01:33:50 host sshd[5525]: Disconnected from 161.35.108.241 port 57894 [preauth] Dec 31 01:34:22 host sshd[5611]: Invalid user ib from 167.99.12.43 port 45630 Dec 31 01:34:22 host sshd[5611]: input_userauth_request: invalid user ib [preauth] Dec 31 01:34:22 host sshd[5611]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:34:22 host sshd[5611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.12.43 Dec 31 01:34:23 host sshd[5615]: Invalid user ss from 69.55.54.65 port 35256 Dec 31 01:34:23 host sshd[5615]: input_userauth_request: invalid user ss [preauth] Dec 31 01:34:23 host sshd[5615]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:34:23 host sshd[5615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.55.54.65 Dec 31 01:34:23 host sshd[5611]: Failed password for invalid user ib from 167.99.12.43 port 45630 ssh2 Dec 31 01:34:24 host sshd[5611]: Received disconnect from 167.99.12.43 port 45630:11: Bye Bye [preauth] Dec 31 01:34:24 host sshd[5611]: Disconnected from 167.99.12.43 port 45630 [preauth] Dec 31 01:34:24 host sshd[5618]: Invalid user ru from 179.40.112.6 port 58408 Dec 31 01:34:24 host sshd[5618]: input_userauth_request: invalid user ru [preauth] Dec 31 01:34:24 host sshd[5618]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:34:24 host sshd[5618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.40.112.6 Dec 31 01:34:25 host sshd[5615]: Failed password for invalid user ss from 69.55.54.65 port 35256 ssh2 Dec 31 01:34:25 host sshd[5615]: Received disconnect from 69.55.54.65 port 35256:11: Bye Bye [preauth] Dec 31 01:34:25 host sshd[5615]: Disconnected from 69.55.54.65 port 35256 [preauth] Dec 31 01:34:26 host sshd[5618]: Failed password for invalid user ru from 179.40.112.6 port 58408 ssh2 Dec 31 01:34:26 host sshd[5618]: Received disconnect from 179.40.112.6 port 58408:11: Bye Bye [preauth] Dec 31 01:34:26 host sshd[5618]: Disconnected from 179.40.112.6 port 58408 [preauth] Dec 31 01:35:25 host sshd[5801]: Invalid user yn from 69.55.54.65 port 46388 Dec 31 01:35:25 host sshd[5801]: input_userauth_request: invalid user yn [preauth] Dec 31 01:35:25 host sshd[5801]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:35:25 host sshd[5801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.55.54.65 Dec 31 01:35:27 host sshd[5801]: Failed password for invalid user yn from 69.55.54.65 port 46388 ssh2 Dec 31 01:35:27 host sshd[5801]: Received disconnect from 69.55.54.65 port 46388:11: Bye Bye [preauth] Dec 31 01:35:27 host sshd[5801]: Disconnected from 69.55.54.65 port 46388 [preauth] Dec 31 01:35:46 host sshd[5849]: Invalid user ax from 43.156.97.145 port 48796 Dec 31 01:35:46 host sshd[5849]: input_userauth_request: invalid user ax [preauth] Dec 31 01:35:46 host sshd[5849]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:35:46 host sshd[5849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.97.145 Dec 31 01:35:48 host sshd[5849]: Failed password for invalid user ax from 43.156.97.145 port 48796 ssh2 Dec 31 01:35:48 host sshd[5849]: Received disconnect from 43.156.97.145 port 48796:11: Bye Bye [preauth] Dec 31 01:35:48 host sshd[5849]: Disconnected from 43.156.97.145 port 48796 [preauth] Dec 31 01:35:49 host sshd[5857]: Invalid user kz from 139.59.36.71 port 44166 Dec 31 01:35:49 host sshd[5857]: input_userauth_request: invalid user kz [preauth] Dec 31 01:35:49 host sshd[5857]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:35:49 host sshd[5857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.36.71 Dec 31 01:35:50 host sshd[5857]: Failed password for invalid user kz from 139.59.36.71 port 44166 ssh2 Dec 31 01:35:50 host sshd[5857]: Received disconnect from 139.59.36.71 port 44166:11: Bye Bye [preauth] Dec 31 01:35:50 host sshd[5857]: Disconnected from 139.59.36.71 port 44166 [preauth] Dec 31 01:35:53 host sshd[5866]: Invalid user user from 103.13.40.2 port 55352 Dec 31 01:35:53 host sshd[5866]: input_userauth_request: invalid user user [preauth] Dec 31 01:35:53 host sshd[5866]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:35:53 host sshd[5866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 31 01:35:53 host sshd[5863]: Invalid user xc from 69.55.54.65 port 53658 Dec 31 01:35:53 host sshd[5863]: input_userauth_request: invalid user xc [preauth] Dec 31 01:35:53 host sshd[5863]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:35:53 host sshd[5863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.55.54.65 Dec 31 01:35:54 host sshd[5866]: Failed password for invalid user user from 103.13.40.2 port 55352 ssh2 Dec 31 01:35:54 host sshd[5866]: Connection closed by 103.13.40.2 port 55352 [preauth] Dec 31 01:35:55 host sshd[5863]: Failed password for invalid user xc from 69.55.54.65 port 53658 ssh2 Dec 31 01:35:55 host sshd[5863]: Received disconnect from 69.55.54.65 port 53658:11: Bye Bye [preauth] Dec 31 01:35:55 host sshd[5863]: Disconnected from 69.55.54.65 port 53658 [preauth] Dec 31 01:36:06 host sshd[5930]: Invalid user zo from 154.222.224.94 port 54090 Dec 31 01:36:06 host sshd[5930]: input_userauth_request: invalid user zo [preauth] Dec 31 01:36:06 host sshd[5930]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:36:06 host sshd[5930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.222.224.94 Dec 31 01:36:08 host sshd[5933]: Invalid user bb from 203.129.220.82 port 46708 Dec 31 01:36:08 host sshd[5933]: input_userauth_request: invalid user bb [preauth] Dec 31 01:36:08 host sshd[5933]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:36:08 host sshd[5933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.129.220.82 Dec 31 01:36:08 host sshd[5930]: Failed password for invalid user zo from 154.222.224.94 port 54090 ssh2 Dec 31 01:36:09 host sshd[5930]: Received disconnect from 154.222.224.94 port 54090:11: Bye Bye [preauth] Dec 31 01:36:09 host sshd[5930]: Disconnected from 154.222.224.94 port 54090 [preauth] Dec 31 01:36:10 host sshd[5933]: Failed password for invalid user bb from 203.129.220.82 port 46708 ssh2 Dec 31 01:36:10 host sshd[5933]: Received disconnect from 203.129.220.82 port 46708:11: Bye Bye [preauth] Dec 31 01:36:10 host sshd[5933]: Disconnected from 203.129.220.82 port 46708 [preauth] Dec 31 01:36:15 host sshd[5949]: Invalid user jw from 31.210.52.84 port 44168 Dec 31 01:36:15 host sshd[5949]: input_userauth_request: invalid user jw [preauth] Dec 31 01:36:15 host sshd[5949]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:36:15 host sshd[5949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.210.52.84 Dec 31 01:36:17 host sshd[5949]: Failed password for invalid user jw from 31.210.52.84 port 44168 ssh2 Dec 31 01:36:17 host sshd[5949]: Received disconnect from 31.210.52.84 port 44168:11: Bye Bye [preauth] Dec 31 01:36:17 host sshd[5949]: Disconnected from 31.210.52.84 port 44168 [preauth] Dec 31 01:36:31 host sshd[6002]: Invalid user jw from 69.75.129.174 port 52028 Dec 31 01:36:31 host sshd[6002]: input_userauth_request: invalid user jw [preauth] Dec 31 01:36:31 host sshd[6002]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:36:31 host sshd[6002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.75.129.174 Dec 31 01:36:32 host sshd[6002]: Failed password for invalid user jw from 69.75.129.174 port 52028 ssh2 Dec 31 01:36:32 host sshd[6002]: Received disconnect from 69.75.129.174 port 52028:11: Bye Bye [preauth] Dec 31 01:36:32 host sshd[6002]: Disconnected from 69.75.129.174 port 52028 [preauth] Dec 31 01:36:41 host sshd[6023]: Invalid user pl from 179.105.65.53 port 21695 Dec 31 01:36:41 host sshd[6023]: input_userauth_request: invalid user pl [preauth] Dec 31 01:36:41 host sshd[6023]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:36:41 host sshd[6023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.105.65.53 Dec 31 01:36:43 host sshd[6023]: Failed password for invalid user pl from 179.105.65.53 port 21695 ssh2 Dec 31 01:36:43 host sshd[6023]: Received disconnect from 179.105.65.53 port 21695:11: Bye Bye [preauth] Dec 31 01:36:43 host sshd[6023]: Disconnected from 179.105.65.53 port 21695 [preauth] Dec 31 01:37:17 host sshd[6124]: Invalid user xc from 31.210.52.84 port 48860 Dec 31 01:37:17 host sshd[6124]: input_userauth_request: invalid user xc [preauth] Dec 31 01:37:17 host sshd[6124]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:37:17 host sshd[6124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.210.52.84 Dec 31 01:37:19 host sshd[6124]: Failed password for invalid user xc from 31.210.52.84 port 48860 ssh2 Dec 31 01:37:20 host sshd[6124]: Received disconnect from 31.210.52.84 port 48860:11: Bye Bye [preauth] Dec 31 01:37:20 host sshd[6124]: Disconnected from 31.210.52.84 port 48860 [preauth] Dec 31 01:37:20 host sshd[6131]: Invalid user ve from 1.221.214.60 port 37918 Dec 31 01:37:20 host sshd[6131]: input_userauth_request: invalid user ve [preauth] Dec 31 01:37:20 host sshd[6131]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:37:20 host sshd[6131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.221.214.60 Dec 31 01:37:21 host sshd[6131]: Failed password for invalid user ve from 1.221.214.60 port 37918 ssh2 Dec 31 01:37:22 host sshd[6131]: Received disconnect from 1.221.214.60 port 37918:11: Bye Bye [preauth] Dec 31 01:37:22 host sshd[6131]: Disconnected from 1.221.214.60 port 37918 [preauth] Dec 31 01:37:41 host sshd[6177]: Invalid user fu from 211.21.113.128 port 51588 Dec 31 01:37:41 host sshd[6177]: input_userauth_request: invalid user fu [preauth] Dec 31 01:37:41 host sshd[6177]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:37:41 host sshd[6177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.21.113.128 Dec 31 01:37:44 host sshd[6177]: Failed password for invalid user fu from 211.21.113.128 port 51588 ssh2 Dec 31 01:37:44 host sshd[6177]: Received disconnect from 211.21.113.128 port 51588:11: Bye Bye [preauth] Dec 31 01:37:44 host sshd[6177]: Disconnected from 211.21.113.128 port 51588 [preauth] Dec 31 01:38:07 host sshd[6216]: Invalid user iw from 31.210.52.84 port 33670 Dec 31 01:38:07 host sshd[6216]: input_userauth_request: invalid user iw [preauth] Dec 31 01:38:07 host sshd[6216]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:38:07 host sshd[6216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.210.52.84 Dec 31 01:38:08 host sshd[6216]: Failed password for invalid user iw from 31.210.52.84 port 33670 ssh2 Dec 31 01:38:08 host sshd[6216]: Received disconnect from 31.210.52.84 port 33670:11: Bye Bye [preauth] Dec 31 01:38:08 host sshd[6216]: Disconnected from 31.210.52.84 port 33670 [preauth] Dec 31 01:38:35 host sshd[6307]: Invalid user hb from 137.184.69.227 port 51952 Dec 31 01:38:35 host sshd[6307]: input_userauth_request: invalid user hb [preauth] Dec 31 01:38:35 host sshd[6307]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:38:35 host sshd[6307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.69.227 Dec 31 01:38:38 host sshd[6307]: Failed password for invalid user hb from 137.184.69.227 port 51952 ssh2 Dec 31 01:38:38 host sshd[6307]: Received disconnect from 137.184.69.227 port 51952:11: Bye Bye [preauth] Dec 31 01:38:38 host sshd[6307]: Disconnected from 137.184.69.227 port 51952 [preauth] Dec 31 01:38:56 host sshd[6421]: Invalid user rx from 146.185.137.240 port 59044 Dec 31 01:38:56 host sshd[6421]: input_userauth_request: invalid user rx [preauth] Dec 31 01:38:56 host sshd[6421]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:38:56 host sshd[6421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.185.137.240 Dec 31 01:38:58 host sshd[6421]: Failed password for invalid user rx from 146.185.137.240 port 59044 ssh2 Dec 31 01:38:58 host sshd[6421]: Received disconnect from 146.185.137.240 port 59044:11: Bye Bye [preauth] Dec 31 01:38:58 host sshd[6421]: Disconnected from 146.185.137.240 port 59044 [preauth] Dec 31 01:39:09 host sshd[6476]: Invalid user we from 159.203.72.14 port 47750 Dec 31 01:39:09 host sshd[6476]: input_userauth_request: invalid user we [preauth] Dec 31 01:39:09 host sshd[6476]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:39:09 host sshd[6476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.72.14 Dec 31 01:39:11 host sshd[6476]: Failed password for invalid user we from 159.203.72.14 port 47750 ssh2 Dec 31 01:39:11 host sshd[6476]: Received disconnect from 159.203.72.14 port 47750:11: Bye Bye [preauth] Dec 31 01:39:11 host sshd[6476]: Disconnected from 159.203.72.14 port 47750 [preauth] Dec 31 01:39:13 host sshd[6483]: Invalid user zb from 161.35.108.241 port 59760 Dec 31 01:39:13 host sshd[6483]: input_userauth_request: invalid user zb [preauth] Dec 31 01:39:13 host sshd[6483]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:39:13 host sshd[6483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.108.241 Dec 31 01:39:15 host sshd[6483]: Failed password for invalid user zb from 161.35.108.241 port 59760 ssh2 Dec 31 01:39:15 host sshd[6483]: Received disconnect from 161.35.108.241 port 59760:11: Bye Bye [preauth] Dec 31 01:39:15 host sshd[6483]: Disconnected from 161.35.108.241 port 59760 [preauth] Dec 31 01:39:19 host sshd[6500]: Invalid user gp from 137.184.54.207 port 36836 Dec 31 01:39:19 host sshd[6500]: input_userauth_request: invalid user gp [preauth] Dec 31 01:39:19 host sshd[6500]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:39:19 host sshd[6500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.54.207 Dec 31 01:39:20 host sshd[6504]: Invalid user tf from 149.5.172.244 port 33506 Dec 31 01:39:20 host sshd[6504]: input_userauth_request: invalid user tf [preauth] Dec 31 01:39:20 host sshd[6504]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:39:20 host sshd[6504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.5.172.244 Dec 31 01:39:21 host sshd[6500]: Failed password for invalid user gp from 137.184.54.207 port 36836 ssh2 Dec 31 01:39:21 host sshd[6500]: Received disconnect from 137.184.54.207 port 36836:11: Bye Bye [preauth] Dec 31 01:39:21 host sshd[6500]: Disconnected from 137.184.54.207 port 36836 [preauth] Dec 31 01:39:22 host sshd[6504]: Failed password for invalid user tf from 149.5.172.244 port 33506 ssh2 Dec 31 01:39:22 host sshd[6504]: Received disconnect from 149.5.172.244 port 33506:11: Bye Bye [preauth] Dec 31 01:39:22 host sshd[6504]: Disconnected from 149.5.172.244 port 33506 [preauth] Dec 31 01:39:39 host sshd[6548]: Invalid user qi from 23.105.217.33 port 43960 Dec 31 01:39:39 host sshd[6548]: input_userauth_request: invalid user qi [preauth] Dec 31 01:39:39 host sshd[6548]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:39:39 host sshd[6548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.105.217.33 Dec 31 01:39:41 host sshd[6548]: Failed password for invalid user qi from 23.105.217.33 port 43960 ssh2 Dec 31 01:39:41 host sshd[6548]: Received disconnect from 23.105.217.33 port 43960:11: Bye Bye [preauth] Dec 31 01:39:41 host sshd[6548]: Disconnected from 23.105.217.33 port 43960 [preauth] Dec 31 01:40:05 host sshd[6610]: Invalid user gz from 43.156.97.145 port 43942 Dec 31 01:40:05 host sshd[6610]: input_userauth_request: invalid user gz [preauth] Dec 31 01:40:05 host sshd[6610]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:40:05 host sshd[6610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.97.145 Dec 31 01:40:07 host sshd[6610]: Failed password for invalid user gz from 43.156.97.145 port 43942 ssh2 Dec 31 01:40:07 host sshd[6610]: Received disconnect from 43.156.97.145 port 43942:11: Bye Bye [preauth] Dec 31 01:40:07 host sshd[6610]: Disconnected from 43.156.97.145 port 43942 [preauth] Dec 31 01:40:11 host sshd[6635]: Invalid user kc from 137.184.69.227 port 58182 Dec 31 01:40:11 host sshd[6635]: input_userauth_request: invalid user kc [preauth] Dec 31 01:40:11 host sshd[6635]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:40:11 host sshd[6635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.69.227 Dec 31 01:40:13 host sshd[6635]: Failed password for invalid user kc from 137.184.69.227 port 58182 ssh2 Dec 31 01:40:13 host sshd[6635]: Received disconnect from 137.184.69.227 port 58182:11: Bye Bye [preauth] Dec 31 01:40:13 host sshd[6635]: Disconnected from 137.184.69.227 port 58182 [preauth] Dec 31 01:40:21 host sshd[6652]: Invalid user kw from 161.35.108.241 port 60208 Dec 31 01:40:21 host sshd[6652]: input_userauth_request: invalid user kw [preauth] Dec 31 01:40:21 host sshd[6652]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:40:21 host sshd[6652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.108.241 Dec 31 01:40:23 host sshd[6656]: Invalid user zw from 167.99.12.43 port 34708 Dec 31 01:40:23 host sshd[6656]: input_userauth_request: invalid user zw [preauth] Dec 31 01:40:23 host sshd[6656]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:40:23 host sshd[6656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.12.43 Dec 31 01:40:23 host sshd[6652]: Failed password for invalid user kw from 161.35.108.241 port 60208 ssh2 Dec 31 01:40:23 host sshd[6652]: Received disconnect from 161.35.108.241 port 60208:11: Bye Bye [preauth] Dec 31 01:40:23 host sshd[6652]: Disconnected from 161.35.108.241 port 60208 [preauth] Dec 31 01:40:24 host sshd[6682]: Invalid user nh from 203.129.220.82 port 37920 Dec 31 01:40:24 host sshd[6682]: input_userauth_request: invalid user nh [preauth] Dec 31 01:40:24 host sshd[6682]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:40:24 host sshd[6682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.129.220.82 Dec 31 01:40:25 host sshd[6656]: Failed password for invalid user zw from 167.99.12.43 port 34708 ssh2 Dec 31 01:40:25 host sshd[6656]: Received disconnect from 167.99.12.43 port 34708:11: Bye Bye [preauth] Dec 31 01:40:25 host sshd[6656]: Disconnected from 167.99.12.43 port 34708 [preauth] Dec 31 01:40:26 host sshd[6682]: Failed password for invalid user nh from 203.129.220.82 port 37920 ssh2 Dec 31 01:40:26 host sshd[6682]: Received disconnect from 203.129.220.82 port 37920:11: Bye Bye [preauth] Dec 31 01:40:26 host sshd[6682]: Disconnected from 203.129.220.82 port 37920 [preauth] Dec 31 01:40:31 host sshd[6724]: Invalid user ms from 146.185.137.240 port 57444 Dec 31 01:40:31 host sshd[6724]: input_userauth_request: invalid user ms [preauth] Dec 31 01:40:31 host sshd[6724]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:40:31 host sshd[6724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.185.137.240 Dec 31 01:40:33 host sshd[6724]: Failed password for invalid user ms from 146.185.137.240 port 57444 ssh2 Dec 31 01:40:34 host sshd[6724]: Received disconnect from 146.185.137.240 port 57444:11: Bye Bye [preauth] Dec 31 01:40:34 host sshd[6724]: Disconnected from 146.185.137.240 port 57444 [preauth] Dec 31 01:40:41 host sshd[6746]: Invalid user mo from 149.5.172.244 port 58320 Dec 31 01:40:41 host sshd[6746]: input_userauth_request: invalid user mo [preauth] Dec 31 01:40:41 host sshd[6746]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:40:41 host sshd[6746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.5.172.244 Dec 31 01:40:43 host sshd[6746]: Failed password for invalid user mo from 149.5.172.244 port 58320 ssh2 Dec 31 01:40:43 host sshd[6746]: Received disconnect from 149.5.172.244 port 58320:11: Bye Bye [preauth] Dec 31 01:40:43 host sshd[6746]: Disconnected from 149.5.172.244 port 58320 [preauth] Dec 31 01:40:48 host sshd[6754]: Invalid user ac from 154.222.224.94 port 45112 Dec 31 01:40:48 host sshd[6754]: input_userauth_request: invalid user ac [preauth] Dec 31 01:40:48 host sshd[6754]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:40:48 host sshd[6754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.222.224.94 Dec 31 01:40:50 host sshd[6754]: Failed password for invalid user ac from 154.222.224.94 port 45112 ssh2 Dec 31 01:40:50 host sshd[6754]: Received disconnect from 154.222.224.94 port 45112:11: Bye Bye [preauth] Dec 31 01:40:50 host sshd[6754]: Disconnected from 154.222.224.94 port 45112 [preauth] Dec 31 01:40:50 host sshd[6757]: Invalid user xg from 137.184.54.207 port 35196 Dec 31 01:40:50 host sshd[6757]: input_userauth_request: invalid user xg [preauth] Dec 31 01:40:50 host sshd[6757]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:40:50 host sshd[6757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.54.207 Dec 31 01:40:52 host sshd[6757]: Failed password for invalid user xg from 137.184.54.207 port 35196 ssh2 Dec 31 01:40:52 host sshd[6757]: Received disconnect from 137.184.54.207 port 35196:11: Bye Bye [preauth] Dec 31 01:40:52 host sshd[6757]: Disconnected from 137.184.54.207 port 35196 [preauth] Dec 31 01:40:54 host sshd[6768]: Invalid user gz from 139.59.36.71 port 35768 Dec 31 01:40:54 host sshd[6768]: input_userauth_request: invalid user gz [preauth] Dec 31 01:40:54 host sshd[6768]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:40:54 host sshd[6768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.36.71 Dec 31 01:40:54 host sshd[6765]: Invalid user uv from 159.203.72.14 port 47468 Dec 31 01:40:54 host sshd[6765]: input_userauth_request: invalid user uv [preauth] Dec 31 01:40:54 host sshd[6765]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:40:54 host sshd[6765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.72.14 Dec 31 01:40:56 host sshd[6768]: Failed password for invalid user gz from 139.59.36.71 port 35768 ssh2 Dec 31 01:40:56 host sshd[6768]: Received disconnect from 139.59.36.71 port 35768:11: Bye Bye [preauth] Dec 31 01:40:56 host sshd[6768]: Disconnected from 139.59.36.71 port 35768 [preauth] Dec 31 01:40:56 host sshd[6765]: Failed password for invalid user uv from 159.203.72.14 port 47468 ssh2 Dec 31 01:40:57 host sshd[6765]: Received disconnect from 159.203.72.14 port 47468:11: Bye Bye [preauth] Dec 31 01:40:57 host sshd[6765]: Disconnected from 159.203.72.14 port 47468 [preauth] Dec 31 01:41:03 host sshd[6790]: Invalid user ru from 211.21.113.128 port 32986 Dec 31 01:41:03 host sshd[6790]: input_userauth_request: invalid user ru [preauth] Dec 31 01:41:03 host sshd[6790]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:41:03 host sshd[6790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.21.113.128 Dec 31 01:41:05 host sshd[6790]: Failed password for invalid user ru from 211.21.113.128 port 32986 ssh2 Dec 31 01:41:05 host sshd[6790]: Received disconnect from 211.21.113.128 port 32986:11: Bye Bye [preauth] Dec 31 01:41:05 host sshd[6790]: Disconnected from 211.21.113.128 port 32986 [preauth] Dec 31 01:41:08 host sshd[6802]: Invalid user sq from 179.105.65.53 port 25887 Dec 31 01:41:08 host sshd[6802]: input_userauth_request: invalid user sq [preauth] Dec 31 01:41:08 host sshd[6802]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:41:08 host sshd[6802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.105.65.53 Dec 31 01:41:10 host sshd[6802]: Failed password for invalid user sq from 179.105.65.53 port 25887 ssh2 Dec 31 01:41:11 host sshd[6802]: Received disconnect from 179.105.65.53 port 25887:11: Bye Bye [preauth] Dec 31 01:41:11 host sshd[6802]: Disconnected from 179.105.65.53 port 25887 [preauth] Dec 31 01:41:18 host sshd[6824]: Invalid user ez from 137.184.69.227 port 43320 Dec 31 01:41:18 host sshd[6824]: input_userauth_request: invalid user ez [preauth] Dec 31 01:41:18 host sshd[6824]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:41:18 host sshd[6824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.69.227 Dec 31 01:41:18 host sshd[6826]: Invalid user di from 69.75.129.174 port 43322 Dec 31 01:41:18 host sshd[6826]: input_userauth_request: invalid user di [preauth] Dec 31 01:41:18 host sshd[6826]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:41:18 host sshd[6826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.75.129.174 Dec 31 01:41:20 host sshd[6829]: Invalid user ru from 1.221.214.60 port 52806 Dec 31 01:41:20 host sshd[6829]: input_userauth_request: invalid user ru [preauth] Dec 31 01:41:20 host sshd[6829]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:41:20 host sshd[6829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.221.214.60 Dec 31 01:41:20 host sshd[6824]: Failed password for invalid user ez from 137.184.69.227 port 43320 ssh2 Dec 31 01:41:20 host sshd[6824]: Received disconnect from 137.184.69.227 port 43320:11: Bye Bye [preauth] Dec 31 01:41:20 host sshd[6824]: Disconnected from 137.184.69.227 port 43320 [preauth] Dec 31 01:41:21 host sshd[6826]: Failed password for invalid user di from 69.75.129.174 port 43322 ssh2 Dec 31 01:41:21 host sshd[6826]: Received disconnect from 69.75.129.174 port 43322:11: Bye Bye [preauth] Dec 31 01:41:21 host sshd[6826]: Disconnected from 69.75.129.174 port 43322 [preauth] Dec 31 01:41:22 host sshd[6829]: Failed password for invalid user ru from 1.221.214.60 port 52806 ssh2 Dec 31 01:41:22 host sshd[6829]: Received disconnect from 1.221.214.60 port 52806:11: Bye Bye [preauth] Dec 31 01:41:22 host sshd[6829]: Disconnected from 1.221.214.60 port 52806 [preauth] Dec 31 01:41:24 host sshd[6889]: Invalid user hj from 167.99.12.43 port 47634 Dec 31 01:41:24 host sshd[6889]: input_userauth_request: invalid user hj [preauth] Dec 31 01:41:24 host sshd[6889]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:41:24 host sshd[6889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.12.43 Dec 31 01:41:26 host sshd[6889]: Failed password for invalid user hj from 167.99.12.43 port 47634 ssh2 Dec 31 01:41:29 host sshd[6937]: Invalid user pt from 43.156.97.145 port 37004 Dec 31 01:41:29 host sshd[6937]: input_userauth_request: invalid user pt [preauth] Dec 31 01:41:29 host sshd[6937]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:41:29 host sshd[6937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.97.145 Dec 31 01:41:32 host sshd[6937]: Failed password for invalid user pt from 43.156.97.145 port 37004 ssh2 Dec 31 01:41:40 host sshd[6981]: Invalid user ru from 146.185.137.240 port 53178 Dec 31 01:41:40 host sshd[6981]: input_userauth_request: invalid user ru [preauth] Dec 31 01:41:40 host sshd[6981]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:41:40 host sshd[6981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.185.137.240 Dec 31 01:41:42 host sshd[6981]: Failed password for invalid user ru from 146.185.137.240 port 53178 ssh2 Dec 31 01:41:49 host sshd[7022]: Invalid user ve from 179.40.112.6 port 60748 Dec 31 01:41:49 host sshd[7022]: input_userauth_request: invalid user ve [preauth] Dec 31 01:41:49 host sshd[7022]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:41:49 host sshd[7022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.40.112.6 Dec 31 01:41:51 host sshd[7022]: Failed password for invalid user ve from 179.40.112.6 port 60748 ssh2 Dec 31 01:41:51 host sshd[7022]: Received disconnect from 179.40.112.6 port 60748:11: Bye Bye [preauth] Dec 31 01:41:51 host sshd[7022]: Disconnected from 179.40.112.6 port 60748 [preauth] Dec 31 01:41:52 host sshd[7028]: Invalid user ft from 137.184.54.207 port 58924 Dec 31 01:41:52 host sshd[7028]: input_userauth_request: invalid user ft [preauth] Dec 31 01:41:52 host sshd[7028]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:41:52 host sshd[7028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.54.207 Dec 31 01:41:53 host sshd[7030]: Invalid user py from 149.5.172.244 port 54334 Dec 31 01:41:53 host sshd[7030]: input_userauth_request: invalid user py [preauth] Dec 31 01:41:53 host sshd[7030]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:41:53 host sshd[7030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.5.172.244 Dec 31 01:41:54 host sshd[7030]: Failed password for invalid user py from 149.5.172.244 port 54334 ssh2 Dec 31 01:41:54 host sshd[7028]: Failed password for invalid user ft from 137.184.54.207 port 58924 ssh2 Dec 31 01:41:55 host sshd[7030]: Received disconnect from 149.5.172.244 port 54334:11: Bye Bye [preauth] Dec 31 01:41:55 host sshd[7030]: Disconnected from 149.5.172.244 port 54334 [preauth] Dec 31 01:41:55 host sshd[7028]: Received disconnect from 137.184.54.207 port 58924:11: Bye Bye [preauth] Dec 31 01:41:55 host sshd[7028]: Disconnected from 137.184.54.207 port 58924 [preauth] Dec 31 01:41:55 host sshd[7035]: Invalid user ky from 203.129.220.82 port 38838 Dec 31 01:41:55 host sshd[7035]: input_userauth_request: invalid user ky [preauth] Dec 31 01:41:55 host sshd[7035]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:41:55 host sshd[7035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.129.220.82 Dec 31 01:41:57 host sshd[7035]: Failed password for invalid user ky from 203.129.220.82 port 38838 ssh2 Dec 31 01:42:02 host sshd[7129]: Invalid user kz from 159.203.72.14 port 42876 Dec 31 01:42:02 host sshd[7129]: input_userauth_request: invalid user kz [preauth] Dec 31 01:42:02 host sshd[7129]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:42:02 host sshd[7129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.72.14 Dec 31 01:42:03 host sshd[7129]: Failed password for invalid user kz from 159.203.72.14 port 42876 ssh2 Dec 31 01:42:04 host sshd[7129]: Received disconnect from 159.203.72.14 port 42876:11: Bye Bye [preauth] Dec 31 01:42:04 host sshd[7129]: Disconnected from 159.203.72.14 port 42876 [preauth] Dec 31 01:42:14 host sshd[7189]: Invalid user sj from 139.59.36.71 port 59464 Dec 31 01:42:14 host sshd[7189]: input_userauth_request: invalid user sj [preauth] Dec 31 01:42:14 host sshd[7189]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:42:14 host sshd[7189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.36.71 Dec 31 01:42:16 host sshd[7192]: Invalid user xi from 211.21.113.128 port 57080 Dec 31 01:42:16 host sshd[7192]: input_userauth_request: invalid user xi [preauth] Dec 31 01:42:16 host sshd[7192]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:42:16 host sshd[7192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.21.113.128 Dec 31 01:42:16 host sshd[7195]: Invalid user dl from 154.222.224.94 port 44240 Dec 31 01:42:16 host sshd[7195]: input_userauth_request: invalid user dl [preauth] Dec 31 01:42:16 host sshd[7195]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:42:16 host sshd[7195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.222.224.94 Dec 31 01:42:16 host sshd[7189]: Failed password for invalid user sj from 139.59.36.71 port 59464 ssh2 Dec 31 01:42:16 host sshd[7189]: Received disconnect from 139.59.36.71 port 59464:11: Bye Bye [preauth] Dec 31 01:42:16 host sshd[7189]: Disconnected from 139.59.36.71 port 59464 [preauth] Dec 31 01:42:18 host sshd[7192]: Failed password for invalid user xi from 211.21.113.128 port 57080 ssh2 Dec 31 01:42:18 host sshd[7195]: Failed password for invalid user dl from 154.222.224.94 port 44240 ssh2 Dec 31 01:42:18 host sshd[7195]: Received disconnect from 154.222.224.94 port 44240:11: Bye Bye [preauth] Dec 31 01:42:18 host sshd[7195]: Disconnected from 154.222.224.94 port 44240 [preauth] Dec 31 01:42:26 host sshd[7317]: Invalid user yq from 69.75.129.174 port 39356 Dec 31 01:42:26 host sshd[7317]: input_userauth_request: invalid user yq [preauth] Dec 31 01:42:26 host sshd[7317]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:42:26 host sshd[7317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.75.129.174 Dec 31 01:42:28 host sshd[7317]: Failed password for invalid user yq from 69.75.129.174 port 39356 ssh2 Dec 31 01:42:44 host sshd[7388]: Invalid user bk from 179.105.65.53 port 39215 Dec 31 01:42:44 host sshd[7388]: input_userauth_request: invalid user bk [preauth] Dec 31 01:42:44 host sshd[7388]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:42:44 host sshd[7388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.105.65.53 Dec 31 01:42:46 host sshd[7388]: Failed password for invalid user bk from 179.105.65.53 port 39215 ssh2 Dec 31 01:42:46 host sshd[7388]: Received disconnect from 179.105.65.53 port 39215:11: Bye Bye [preauth] Dec 31 01:42:46 host sshd[7388]: Disconnected from 179.105.65.53 port 39215 [preauth] Dec 31 01:42:54 host sshd[7441]: Invalid user sq from 1.221.214.60 port 53414 Dec 31 01:42:54 host sshd[7441]: input_userauth_request: invalid user sq [preauth] Dec 31 01:42:54 host sshd[7441]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:42:54 host sshd[7441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.221.214.60 Dec 31 01:42:56 host sshd[7441]: Failed password for invalid user sq from 1.221.214.60 port 53414 ssh2 Dec 31 01:43:07 host sshd[7502]: Invalid user gy from 23.105.217.33 port 57242 Dec 31 01:43:07 host sshd[7502]: input_userauth_request: invalid user gy [preauth] Dec 31 01:43:07 host sshd[7502]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:43:07 host sshd[7502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.105.217.33 Dec 31 01:43:08 host sshd[7502]: Failed password for invalid user gy from 23.105.217.33 port 57242 ssh2 Dec 31 01:43:09 host sshd[7502]: Received disconnect from 23.105.217.33 port 57242:11: Bye Bye [preauth] Dec 31 01:43:09 host sshd[7502]: Disconnected from 23.105.217.33 port 57242 [preauth] Dec 31 01:43:22 host sshd[7524]: Invalid user xb from 179.40.112.6 port 56490 Dec 31 01:43:22 host sshd[7524]: input_userauth_request: invalid user xb [preauth] Dec 31 01:43:22 host sshd[7524]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:43:22 host sshd[7524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.40.112.6 Dec 31 01:43:24 host sshd[7524]: Failed password for invalid user xb from 179.40.112.6 port 56490 ssh2 Dec 31 01:43:24 host sshd[7524]: Received disconnect from 179.40.112.6 port 56490:11: Bye Bye [preauth] Dec 31 01:43:24 host sshd[7524]: Disconnected from 179.40.112.6 port 56490 [preauth] Dec 31 01:44:48 host sshd[7786]: Invalid user zv from 23.105.217.33 port 57796 Dec 31 01:44:48 host sshd[7786]: input_userauth_request: invalid user zv [preauth] Dec 31 01:44:48 host sshd[7786]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:44:48 host sshd[7786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.105.217.33 Dec 31 01:44:51 host sshd[7786]: Failed password for invalid user zv from 23.105.217.33 port 57796 ssh2 Dec 31 01:44:51 host sshd[7786]: Received disconnect from 23.105.217.33 port 57796:11: Bye Bye [preauth] Dec 31 01:44:51 host sshd[7786]: Disconnected from 23.105.217.33 port 57796 [preauth] Dec 31 01:51:44 host sshd[9137]: Invalid user kenneth from 209.141.56.48 port 60976 Dec 31 01:51:44 host sshd[9137]: input_userauth_request: invalid user kenneth [preauth] Dec 31 01:51:44 host sshd[9137]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:51:44 host sshd[9137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Dec 31 01:51:46 host sshd[9137]: Failed password for invalid user kenneth from 209.141.56.48 port 60976 ssh2 Dec 31 01:51:46 host sshd[9137]: Connection closed by 209.141.56.48 port 60976 [preauth] Dec 31 01:57:23 host sshd[9927]: Invalid user fi from 45.93.201.90 port 49164 Dec 31 01:57:23 host sshd[9927]: input_userauth_request: invalid user fi [preauth] Dec 31 01:57:23 host sshd[9927]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:57:23 host sshd[9927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 31 01:57:25 host sshd[9927]: Failed password for invalid user fi from 45.93.201.90 port 49164 ssh2 Dec 31 01:57:28 host sshd[9927]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:57:31 host sshd[9927]: Failed password for invalid user fi from 45.93.201.90 port 49164 ssh2 Dec 31 01:57:34 host sshd[9927]: pam_unix(sshd:auth): check pass; user unknown Dec 31 01:57:36 host sshd[9927]: Failed password for invalid user fi from 45.93.201.90 port 49164 ssh2 Dec 31 01:57:39 host sshd[9927]: Connection closed by 45.93.201.90 port 49164 [preauth] Dec 31 01:57:39 host sshd[9927]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 31 02:06:34 host sshd[11227]: Invalid user kenneth from 209.141.56.48 port 57356 Dec 31 02:06:34 host sshd[11227]: input_userauth_request: invalid user kenneth [preauth] Dec 31 02:06:34 host sshd[11227]: pam_unix(sshd:auth): check pass; user unknown Dec 31 02:06:34 host sshd[11227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Dec 31 02:06:36 host sshd[11227]: Failed password for invalid user kenneth from 209.141.56.48 port 57356 ssh2 Dec 31 02:06:36 host sshd[11227]: Connection closed by 209.141.56.48 port 57356 [preauth] Dec 31 02:07:41 host sshd[11475]: User root from 41.197.31.178 not allowed because not listed in AllowUsers Dec 31 02:07:41 host sshd[11475]: input_userauth_request: invalid user root [preauth] Dec 31 02:07:42 host unix_chkpwd[11478]: password check failed for user (root) Dec 31 02:07:42 host sshd[11475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 user=root Dec 31 02:07:42 host sshd[11475]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 02:07:43 host sshd[11475]: Failed password for invalid user root from 41.197.31.178 port 38750 ssh2 Dec 31 02:07:44 host sshd[11475]: Connection closed by 41.197.31.178 port 38750 [preauth] Dec 31 02:15:55 host sshd[12623]: Did not receive identification string from 34.92.211.177 port 34660 Dec 31 02:18:26 host sshd[12928]: Connection closed by 192.241.227.26 port 38824 [preauth] Dec 31 02:21:31 host sshd[13476]: Did not receive identification string from 185.173.145.4 port 39128 Dec 31 02:21:46 host sshd[13505]: User root from 185.173.145.4 not allowed because not listed in AllowUsers Dec 31 02:21:46 host sshd[13505]: input_userauth_request: invalid user root [preauth] Dec 31 02:21:46 host unix_chkpwd[13508]: password check failed for user (root) Dec 31 02:21:46 host sshd[13505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.173.145.4 user=root Dec 31 02:21:46 host sshd[13505]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 02:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 02:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 02:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 02:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 31 02:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 31 02:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 31 02:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 31 02:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 31 02:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 31 02:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 31 02:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 31 02:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 31 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=wwwtestugo user-3=shalinijames user-4=vfmassets user-5=woodpeck user-6=wwwkapin user-7=remysagr user-8=disposeat user-9=wwwkmaorg user-10=wwwnexidigital user-11=mrsclean user-12=phmetals user-13=kottayamcalldriv user-14=gifterman user-15=palco123 user-16=wwwletsstalkfood user-17=straightcurve user-18=wwwevmhonda user-19=bonifacegroup user-20=laundryboniface user-21=dartsimp user-22=a2zgroup user-23=cochintaxi user-24=wwwkaretakers user-25=ugotscom user-26=wwwrmswll user-27=wwwresourcehunte user-28=keralaholi user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 31 02:21:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 31 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fLjgH44p4iXmxIt8.~ Dec 31 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fLjgH44p4iXmxIt8.~' Dec 31 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:21:49 host sshd[13505]: Failed password for invalid user root from 185.173.145.4 port 44988 ssh2 Dec 31 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fLjgH44p4iXmxIt8.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 31 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:21:49 host sshd[13505]: Received disconnect from 185.173.145.4 port 44988:11: Normal Shutdown, Thank you for playing [preauth] Dec 31 02:21:49 host sshd[13505]: Disconnected from 185.173.145.4 port 44988 [preauth] Dec 31 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 31 02:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 02:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 31 02:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 02:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 31 02:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 31 02:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 31 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 31 02:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 02:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 31 02:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 02:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 02:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 31 02:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 31 02:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 31 02:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 31 02:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 31 02:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Dec 31 02:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 31 02:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 31 02:22:11 host sshd[13754]: User root from 185.173.145.4 not allowed because not listed in AllowUsers Dec 31 02:22:11 host sshd[13754]: input_userauth_request: invalid user root [preauth] Dec 31 02:22:11 host unix_chkpwd[13758]: password check failed for user (root) Dec 31 02:22:11 host sshd[13754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.173.145.4 user=root Dec 31 02:22:11 host sshd[13754]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 02:22:13 host sshd[13754]: Failed password for invalid user root from 185.173.145.4 port 36108 ssh2 Dec 31 02:23:15 host sshd[13915]: Did not receive identification string from 205.185.123.43 port 35526 Dec 31 02:23:29 host sshd[13953]: Invalid user jboss from 162.218.126.136 port 45704 Dec 31 02:23:29 host sshd[13953]: input_userauth_request: invalid user jboss [preauth] Dec 31 02:23:29 host sshd[13953]: pam_unix(sshd:auth): check pass; user unknown Dec 31 02:23:29 host sshd[13953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 31 02:23:32 host sshd[13953]: Failed password for invalid user jboss from 162.218.126.136 port 45704 ssh2 Dec 31 02:23:32 host sshd[13953]: Connection closed by 162.218.126.136 port 45704 [preauth] Dec 31 02:25:54 host sshd[14334]: Invalid user pi from 82.65.33.144 port 37668 Dec 31 02:25:54 host sshd[14334]: input_userauth_request: invalid user pi [preauth] Dec 31 02:25:54 host sshd[14335]: Invalid user pi from 82.65.33.144 port 37672 Dec 31 02:25:54 host sshd[14335]: input_userauth_request: invalid user pi [preauth] Dec 31 02:25:54 host sshd[14334]: pam_unix(sshd:auth): check pass; user unknown Dec 31 02:25:54 host sshd[14334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.65.33.144 Dec 31 02:25:54 host sshd[14335]: pam_unix(sshd:auth): check pass; user unknown Dec 31 02:25:54 host sshd[14335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.65.33.144 Dec 31 02:25:56 host sshd[14334]: Failed password for invalid user pi from 82.65.33.144 port 37668 ssh2 Dec 31 02:25:56 host sshd[14335]: Failed password for invalid user pi from 82.65.33.144 port 37672 ssh2 Dec 31 02:25:56 host sshd[14334]: Connection closed by 82.65.33.144 port 37668 [preauth] Dec 31 02:25:56 host sshd[14335]: Connection closed by 82.65.33.144 port 37672 [preauth] Dec 31 02:29:31 host sshd[14765]: Invalid user app from 106.10.122.53 port 52580 Dec 31 02:29:31 host sshd[14765]: input_userauth_request: invalid user app [preauth] Dec 31 02:29:31 host sshd[14765]: pam_unix(sshd:auth): check pass; user unknown Dec 31 02:29:31 host sshd[14765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 31 02:29:33 host sshd[14765]: Failed password for invalid user app from 106.10.122.53 port 52580 ssh2 Dec 31 02:29:33 host sshd[14765]: Connection closed by 106.10.122.53 port 52580 [preauth] Dec 31 02:29:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 02:29:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:29:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:29:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 02:29:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:29:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:29:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 02:29:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:29:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:29:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 31 02:29:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:29:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:29:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 02:29:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:29:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:29:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=ugotscom user-3=keralaholi user-4=wwwresourcehunte user-5=wwwrmswll user-6=travelboniface user-7=cochintaxi user-8=wwwkaretakers user-9=laundryboniface user-10=a2zgroup user-11=dartsimp user-12=straightcurve user-13=wwwletsstalkfood user-14=wwwevmhonda user-15=bonifacegroup user-16=wwwnexidigital user-17=mrsclean user-18=kottayamcalldriv user-19=phmetals user-20=palco123 user-21=gifterman user-22=woodpeck user-23=wwwkapin user-24=disposeat user-25=wwwkmaorg user-26=remysagr user-27=pmcresources user-28=shalinijames user-29=wwwtestugo user-30=vfmassets feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 31 02:29:47 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 31 02:29:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:29:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:29:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwevmhonda --output=json Dec 31 02:29:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:29:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:29:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color instance info --format=json --check-updates=true Dec 31 02:29:47 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 31 02:29:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 31 02:29:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 31 02:29:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 31 02:29:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 31 02:29:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 31 02:29:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 31 02:29:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 31 02:29:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 31 02:29:55 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 31 02:29:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 31 02:29:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwevmhonda LangPHP php_get_vhost_versions --output=json Dec 31 02:29:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:29:56 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:29:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 package_manager_get_package_info package-0=ea-php72 --output=json Dec 31 02:29:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:29:56 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:29:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color instance login-url --skip-plugins=false --format=json Dec 31 02:29:56 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 31 02:29:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 31 02:29:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwletsstalkfood --output=json Dec 31 02:29:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:29:57 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:29:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color instance info --format=json --check-updates=true Dec 31 02:29:57 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 02:30:04 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 02:30:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 31 02:30:04 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 02:30:05 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 02:30:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 31 02:30:05 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 02:30:11 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 02:30:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 31 02:30:11 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 02:30:11 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 02:30:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood LangPHP php_get_vhost_versions --output=json Dec 31 02:30:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:30:11 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:30:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color instance login-url --skip-plugins=false --format=json Dec 31 02:30:11 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 02:30:12 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 02:30:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DomainInfo single_domain_data domain=letsstalkfood.com return_https_redirect_status=1 --output=json Dec 31 02:30:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:30:12 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:30:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_vhost_ssl_components --output=json Dec 31 02:30:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:30:12 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:30:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_ssl_vhosts --output=json Dec 31 02:30:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:30:12 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:30:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood Mime list_redirects --output=json Dec 31 02:30:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:30:12 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:30:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 31 02:30:12 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 02:30:14 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 02:30:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 31 02:30:14 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 02:30:15 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 02:30:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 31 02:30:15 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 02:30:21 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 02:30:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 31 02:30:21 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 02:30:27 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 02:30:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/wp-config.php Dec 31 02:30:27 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 02:30:27 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 02:30:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 31 02:30:27 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 02:30:27 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 02:30:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/.maintenance Dec 31 02:30:27 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 02:30:27 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 02:30:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color db-prefix get Dec 31 02:30:27 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 02:30:28 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 02:30:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DirectoryPrivacy is_directory_protected dir=/home/wwwletsstalkfood/public_html --output=json Dec 31 02:30:28 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:30:28 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:30:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 31 02:30:28 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 02:30:28 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 02:30:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 31 02:30:29 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 02:30:29 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 02:30:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 31 02:30:29 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 02:30:29 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 02:30:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 31 02:30:29 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 02:30:30 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 02:30:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 31 02:30:30 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 02:30:30 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 02:30:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color admin-username is-secure Dec 31 02:30:30 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 02:30:31 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 31 02:30:31 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 02:30:31 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/wp-config.php Dec 31 02:30:31 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 02:30:31 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/stat -c %a /home/wwwletsstalkfood/public_html/wp-config.php Dec 31 02:30:31 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 02:30:31 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color pingbacks is_disabled Dec 31 02:30:31 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 02:30:32 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 31 02:30:32 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 02:30:32 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color security-keys are_keys_correct Dec 31 02:30:32 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 02:30:33 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 02:30:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=mrsclean --output=json Dec 31 02:30:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:30:33 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:30:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/backup --no-color instance info --format=json --check-updates=true Dec 31 02:30:33 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 31 02:30:33 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 31 02:30:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean DomainInfo single_domain_data domain=mrsclean.co.in return_https_redirect_status=1 --output=json Dec 31 02:30:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:30:33 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:30:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean Mime list_redirects --output=json Dec 31 02:30:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:30:33 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:30:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/public_html/backup/wp-includes/version.php Dec 31 02:30:34 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 31 02:30:34 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 31 02:30:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/public_html/backup/wp-includes/version.php Dec 31 02:30:34 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 31 02:30:34 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 31 02:30:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 31 02:30:34 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 31 02:30:34 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 31 02:30:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean LangPHP php_get_vhost_versions --output=json Dec 31 02:30:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:30:34 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:30:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 31 02:30:34 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:30:34 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:30:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/blog --no-color instance info --format=json --check-updates=true Dec 31 02:30:34 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 31 02:30:34 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 31 02:30:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/public_html/blog/wp-includes/version.php Dec 31 02:30:34 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 31 02:30:34 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 31 02:30:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/public_html/blog/wp-includes/version.php Dec 31 02:30:34 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 31 02:30:34 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 31 02:30:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 31 02:30:34 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 31 02:30:34 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 31 02:30:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=shalinijames --output=json Dec 31 02:30:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:30:34 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:30:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color instance info --format=json --check-updates=true Dec 31 02:30:34 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 02:30:42 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 02:30:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_plugins --format=json Dec 31 02:30:42 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 02:30:42 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 02:30:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_themes --format=json Dec 31 02:30:42 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 02:30:43 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 02:30:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 31 02:30:43 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 02:30:43 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 02:30:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames LangPHP php_get_vhost_versions --output=json Dec 31 02:30:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:30:43 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:30:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color instance login-url --skip-plugins=false --format=json Dec 31 02:30:43 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 02:30:43 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 02:30:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DomainInfo single_domain_data domain=shalinijames.com return_https_redirect_status=1 --output=json Dec 31 02:30:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:30:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:30:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames Mime list_redirects --output=json Dec 31 02:30:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:30:44 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:30:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 31 02:30:44 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 02:30:46 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 02:30:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_plugins --format=json Dec 31 02:30:46 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 02:30:46 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 02:30:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 31 02:30:46 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 02:30:51 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 02:30:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_themes --format=json Dec 31 02:30:51 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 02:30:51 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 02:30:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/wp-config.php Dec 31 02:30:51 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 02:30:51 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 02:30:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 31 02:30:51 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 02:30:52 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 02:30:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/.maintenance Dec 31 02:30:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 02:30:52 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 02:30:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color db-prefix get Dec 31 02:30:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 02:30:52 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 02:30:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DirectoryPrivacy is_directory_protected dir=/home/shalinijames/public_html --output=json Dec 31 02:30:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:30:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:30:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 31 02:30:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 02:30:53 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 02:30:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 31 02:30:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 02:30:53 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 02:30:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 31 02:30:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 02:30:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 02:30:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 31 02:30:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 02:30:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 02:30:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 31 02:30:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 02:30:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 02:30:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color admin-username is-secure Dec 31 02:30:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 02:30:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 02:30:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 31 02:30:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 02:30:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 02:30:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/wp-config.php Dec 31 02:30:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 02:30:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 02:30:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/stat -c %a /home/shalinijames/public_html/wp-config.php Dec 31 02:30:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 02:30:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 02:30:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color pingbacks is_disabled Dec 31 02:30:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 02:30:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 02:30:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 31 02:30:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 02:30:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 02:30:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color security-keys are_keys_correct Dec 31 02:30:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 02:30:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 02:30:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwtestugo --output=json Dec 31 02:30:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:30:57 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:30:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color instance info --format=json --check-updates=true Dec 31 02:30:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_plugins --format=json Dec 31 02:31:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_themes --format=json Dec 31 02:31:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 31 02:31:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo LangPHP php_get_vhost_versions --output=json Dec 31 02:31:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:31:03 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:31:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color instance login-url --skip-plugins=false --format=json Dec 31 02:31:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DomainInfo single_domain_data domain=testugo.in return_https_redirect_status=1 --output=json Dec 31 02:31:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:31:04 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:31:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo Mime list_redirects --output=json Dec 31 02:31:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:31:04 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:31:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 31 02:31:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_plugins --format=json Dec 31 02:31:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 31 02:31:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_themes --format=json Dec 31 02:31:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/wp-config.php Dec 31 02:31:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 31 02:31:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/.maintenance Dec 31 02:31:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color db-prefix get Dec 31 02:31:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt1 --output=json Dec 31 02:31:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:31:11 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:31:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 31 02:31:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 31 02:31:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 31 02:31:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 31 02:31:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 31 02:31:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color admin-username is-secure Dec 31 02:31:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 31 02:31:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/wp-config.php Dec 31 02:31:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/tt1/wp-config.php Dec 31 02:31:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color pingbacks is_disabled Dec 31 02:31:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 31 02:31:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color security-keys are_keys_correct Dec 31 02:31:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color instance info --format=json --check-updates=true Dec 31 02:31:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:19 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_plugins --format=json Dec 31 02:31:19 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:20 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_themes --format=json Dec 31 02:31:20 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:20 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 31 02:31:20 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:20 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color instance login-url --skip-plugins=false --format=json Dec 31 02:31:20 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:21 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 31 02:31:21 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:21 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_plugins --format=json Dec 31 02:31:21 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 31 02:31:22 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:26 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_themes --format=json Dec 31 02:31:26 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:26 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/wp-config.php Dec 31 02:31:26 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:26 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 31 02:31:26 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:26 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/.maintenance Dec 31 02:31:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color db-prefix get Dec 31 02:31:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt --output=json Dec 31 02:31:27 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:31:27 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:31:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 31 02:31:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:28 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 31 02:31:28 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:28 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 31 02:31:28 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:28 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 31 02:31:28 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:29 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 31 02:31:29 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:29 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color admin-username is-secure Dec 31 02:31:29 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:30 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 31 02:31:30 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:30 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/wp-config.php Dec 31 02:31:30 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:30 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/tt/wp-config.php Dec 31 02:31:30 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:30 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color pingbacks is_disabled Dec 31 02:31:30 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:31 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 31 02:31:31 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:31 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color security-keys are_keys_correct Dec 31 02:31:31 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:31 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color instance info --format=json --check-updates=true Dec 31 02:31:31 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:36 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_plugins --format=json Dec 31 02:31:36 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:36 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_themes --format=json Dec 31 02:31:36 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:37 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 31 02:31:37 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:37 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color instance login-url --skip-plugins=false --format=json Dec 31 02:31:37 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:38 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 31 02:31:38 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:38 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_plugins --format=json Dec 31 02:31:38 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:31:39 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:31:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 31 02:31:39 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:32:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:32:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_themes --format=json Dec 31 02:32:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:32:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:32:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/wp-config.php Dec 31 02:32:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:32:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:32:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 31 02:32:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:32:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:32:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/.maintenance Dec 31 02:32:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:32:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:32:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color db-prefix get Dec 31 02:32:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:32:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:32:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/HYPE --output=json Dec 31 02:32:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:32:13 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:32:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 31 02:32:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:32:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:32:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 31 02:32:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:32:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:32:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 31 02:32:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:32:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:32:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 31 02:32:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:32:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:32:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 31 02:32:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:32:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:32:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color admin-username is-secure Dec 31 02:32:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:32:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:32:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 31 02:32:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:32:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:32:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/wp-config.php Dec 31 02:32:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:32:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:32:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/HYPE/wp-config.php Dec 31 02:32:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:32:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:32:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color pingbacks is_disabled Dec 31 02:32:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:32:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:32:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 31 02:32:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:32:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:32:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color security-keys are_keys_correct Dec 31 02:32:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:32:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:32:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=ugotscom --output=json Dec 31 02:32:17 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:32:17 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:32:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/boniface/blog --no-color instance info --format=json --check-updates=true Dec 31 02:32:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:32:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:32:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DomainInfo single_domain_data domain=ugotechnologies.com return_https_redirect_status=1 --output=json Dec 31 02:32:18 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:32:18 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:32:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom Mime list_redirects --output=json Dec 31 02:32:18 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:32:18 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:32:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/boniface/blog/wp-includes/version.php Dec 31 02:32:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:32:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:32:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/public_html/boniface/blog/wp-includes/version.php Dec 31 02:32:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:32:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:32:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 31 02:32:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:32:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:32:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom LangPHP php_get_vhost_versions --output=json Dec 31 02:32:18 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:32:18 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:32:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color instance info --format=json --check-updates=true Dec 31 02:32:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:32:35 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:32:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_plugins --format=json Dec 31 02:32:35 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:32:36 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:32:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_themes --format=json Dec 31 02:32:36 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:32:36 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:32:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 31 02:32:36 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:32:36 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:32:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color instance login-url --skip-plugins=false --format=json Dec 31 02:32:36 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:32:37 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:32:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 31 02:32:37 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:32:38 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:32:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_plugins --format=json Dec 31 02:32:38 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:32:38 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:32:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 31 02:32:38 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_themes --format=json Dec 31 02:33:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php Dec 31 02:33:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 31 02:33:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/.maintenance Dec 31 02:33:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color db-prefix get Dec 31 02:33:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --output=json Dec 31 02:33:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:33:04 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:33:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 31 02:33:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 31 02:33:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 31 02:33:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 31 02:33:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 31 02:33:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color admin-username is-secure Dec 31 02:33:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 31 02:33:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php Dec 31 02:33:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/stat -c %a /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php Dec 31 02:33:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color pingbacks is_disabled Dec 31 02:33:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 31 02:33:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color security-keys are_keys_correct Dec 31 02:33:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color instance info --format=json --check-updates=true Dec 31 02:33:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_plugins --format=json Dec 31 02:33:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_themes --format=json Dec 31 02:33:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 31 02:33:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color instance login-url --skip-plugins=false --format=json Dec 31 02:33:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 31 02:33:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_plugins --format=json Dec 31 02:33:20 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 31 02:33:20 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_themes --format=json Dec 31 02:33:22 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/wp-config.php Dec 31 02:33:22 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 31 02:33:22 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/.maintenance Dec 31 02:33:22 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color db-prefix get Dec 31 02:33:22 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/site --output=json Dec 31 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 31 02:33:23 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 31 02:33:23 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:24 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 31 02:33:24 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:24 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 31 02:33:24 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:25 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 31 02:33:25 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:25 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color admin-username is-secure Dec 31 02:33:25 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:25 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 31 02:33:25 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:26 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/wp-config.php Dec 31 02:33:26 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:26 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/stat -c %a /home/ugotscom/public_html/old/site/wp-config.php Dec 31 02:33:26 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:26 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color pingbacks is_disabled Dec 31 02:33:26 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:26 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 31 02:33:26 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:26 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color security-keys are_keys_correct Dec 31 02:33:26 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:33:27 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:33:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=woodpeck --output=json Dec 31 02:33:27 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:33:27 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:33:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/woodpeck/public_html/wp --no-color instance info --format=json --check-updates=true Dec 31 02:33:27 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 31 02:33:27 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 31 02:33:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck DomainInfo single_domain_data domain=woodpeckerindia.com return_https_redirect_status=1 --output=json Dec 31 02:33:27 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:33:27 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:33:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck Mime list_redirects --output=json Dec 31 02:33:27 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:33:27 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:33:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/public_html/wp/wp-includes/version.php Dec 31 02:33:27 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 31 02:33:27 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 31 02:33:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 31 02:33:27 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 31 02:33:27 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 31 02:33:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck LangPHP php_get_vhost_versions --output=json Dec 31 02:33:27 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:33:28 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:33:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=palco123 --output=json Dec 31 02:33:28 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:33:28 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:33:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color instance info --format=json --check-updates=true Dec 31 02:33:28 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 31 02:33:55 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 31 02:33:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 31 02:33:55 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 31 02:33:56 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 31 02:33:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 31 02:33:56 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 31 02:34:12 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 31 02:34:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 31 02:34:12 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 31 02:34:12 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 31 02:34:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 LangPHP php_get_vhost_versions --output=json Dec 31 02:34:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:34:12 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:34:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color instance login-url --skip-plugins=false --format=json Dec 31 02:34:12 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 31 02:34:13 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 31 02:34:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DomainInfo single_domain_data domain=panlys.com return_https_redirect_status=1 --output=json Dec 31 02:34:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:34:13 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:34:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 Mime list_redirects --output=json Dec 31 02:34:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:34:13 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:34:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 31 02:34:13 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 31 02:34:14 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 31 02:34:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 31 02:34:14 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 31 02:34:14 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 31 02:34:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 31 02:34:14 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 31 02:34:49 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 31 02:34:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Dec 31 02:34:49 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 31 02:35:10 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 31 02:35:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/wp-config.php Dec 31 02:35:10 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 31 02:35:10 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 31 02:35:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 31 02:35:10 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 31 02:35:10 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 31 02:35:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/.maintenance Dec 31 02:35:10 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 31 02:35:10 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 31 02:35:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color db-prefix get Dec 31 02:35:10 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 31 02:35:11 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 31 02:35:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DirectoryPrivacy is_directory_protected dir=/home/palco123/public_html --output=json Dec 31 02:35:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:35:11 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:35:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 31 02:35:11 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 31 02:35:11 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 31 02:35:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color option get auto_update_core_major Dec 31 02:35:11 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 31 02:35:12 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 31 02:35:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Dec 31 02:35:12 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 31 02:35:13 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 31 02:35:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Dec 31 02:35:13 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 31 02:35:13 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 31 02:35:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color admin-username is-secure Dec 31 02:35:13 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 31 02:35:14 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 31 02:35:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 31 02:35:14 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 31 02:35:14 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 31 02:35:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/wp-config.php Dec 31 02:35:14 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 31 02:35:14 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 31 02:35:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/stat -c %a /home/palco123/public_html/wp-config.php Dec 31 02:35:14 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 31 02:35:14 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 31 02:35:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color pingbacks is_disabled Dec 31 02:35:14 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 31 02:35:15 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 31 02:35:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Dec 31 02:35:15 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 31 02:35:15 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 31 02:35:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color security-keys are_keys_correct Dec 31 02:35:15 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 31 02:35:16 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 31 02:35:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwresourcehunte --output=json Dec 31 02:35:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:35:16 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:35:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color instance info --format=json --check-updates=true Dec 31 02:35:16 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 31 02:35:22 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 31 02:35:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_plugins --format=json Dec 31 02:35:22 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 31 02:35:23 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 31 02:35:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_themes --format=json Dec 31 02:35:23 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 31 02:35:23 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 31 02:35:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Dec 31 02:35:23 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 31 02:35:23 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 31 02:35:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte LangPHP php_get_vhost_versions --output=json Dec 31 02:35:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:35:23 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:35:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color instance login-url --skip-plugins=false --format=json Dec 31 02:35:23 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 31 02:35:24 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 31 02:35:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DomainInfo single_domain_data domain=resourcehunters.com return_https_redirect_status=1 --output=json Dec 31 02:35:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:35:24 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:35:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte Mime list_redirects --output=json Dec 31 02:35:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:35:24 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:35:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 31 02:35:24 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 31 02:35:24 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 31 02:35:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_plugins --format=json Dec 31 02:35:24 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 31 02:35:25 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 31 02:35:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Dec 31 02:35:25 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 31 02:36:25 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 31 02:36:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwpmcresource WpToolkitNotification send_admin_suspicious_instance_notification 'suspicious_instance_text=The following WordPress installations are quarantined:<br/>' 'suspicious_instance_details_info=Website "Resource Hunters" (http://resourcehunters.com): WP Toolkit was not able to finish running an operation on this site in 60 seconds, so the operation was terminated. This could mean that your WordPress installation might be infected with malware. Check the wp-config.php file of the installation for potential malware code or run an anti-virus scan. If you cannot find any traces of malware, try running the operation again later.' --output=json Dec 31 02:36:25 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:36:25 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:36:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-themes=theme1,twentyfifteen,twentyfourteen,twentythirteen,twentytwelve Dec 31 02:36:25 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 31 02:37:25 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 31 02:37:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwpmcresource WpToolkitNotification send_admin_auto_updates_notification available_updates_text= available_updates_list= installed_updates_text= installed_updates_list= 'failure_updates_text=Updates were not installed for the following items:<br/><br/>' 'failure_updates_list=1. Website "EVM Honda Cochin" (http://www.evmhonda.com): Failed to reset cache for the instance #1: Fatal error: Uncaught Error: Call to undefined function cardealer_is_wpml_active() in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php:1041#012Stack trace:#012#0 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-init.php(22): require_once()#012#1 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/cardealer-helper-library.php(183): Dec 31 02:37:25 host sudo: wp-toolkit : (command continued) require_once('"'"'/home/wwwevmhon...'"'"')#012#2 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(287): cdhl_include_admin_files('"'"''"'"')#012#3 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(311): WP_Hook->apply_filters(NULL, Array)#012#4 /home/wwwevmhonda/public_html/wp-includes/plugin.php(478): WP_Hook->do_action(Array)#012#5 /home/wwwevmhonda/public_html/wp-settings.php(546): do_action('"'"'init'"'"')#012#6 /usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/vendor/wp-cli/wp-cli/php/WP_CLI/Runner.php(1356): require('"'"'/home/wwwevmhon...'"'"')#012#7 /usr/local/cpanel/3rdparty/wp-toolkit/plib/ve in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php on line 1041#012Error: There has been a critical error on your website.Learn more about debugging in WordPress. There has been a critical error on your website.#012<br/><br/>2. Website Dec 31 02:37:25 host sudo: wp-toolkit : (command continued) "/home/mrsclean/public_html/backup" (http://mrsclean.co.in/backup): Failed to reset cache for the instance #5: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012<br/><br/>3. Website "/home/mrsclean/public_html/blog" (http://mrsclean.co.in/blog): Failed to reset cache for the instance #6: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012<br/><br/>4. Website "/home/ugotscom/public_html/boniface/blog" (http://ugotechnologies.com/boniface/blog): Failed to reset cache for the instance #13: Dec 31 02:37:25 host sudo: wp-toolkit : (command continued) Error: Error establishing a database connection.#012<br/><br/>5. Website "/home/woodpeck/public_html/wp" (http://woodpeckerindia.com/wp): Failed to reset cache for the instance #16: /bin/sh: line 0: cd: /home/woodpeck/public_html/wp: No such file or directory#012<br/><br/>6. Website "Resource Hunters" (http://resourcehunters.com): Failed to reset cache for the instance #18: WP Toolkit was not able to finish running an operation on this site in 60 seconds, so the operation was terminated. This could mean that your WordPress installation might be infected with malware. Check the wp-config.php file of the installation for potential malware code or run an anti-virus scan. If you cannot find any traces of malware, try running the operation again later.<br/><br/>' --output=json Dec 31 02:37:25 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:25 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color cli cache clear Dec 31 02:37:25 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 31 02:37:25 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 31 02:37:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color cli cache clear Dec 31 02:37:25 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 02:37:25 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 02:37:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/backup --no-color cli cache clear Dec 31 02:37:25 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 31 02:37:26 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 31 02:37:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/blog --no-color cli cache clear Dec 31 02:37:26 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 31 02:37:26 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 31 02:37:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color cli cache clear Dec 31 02:37:26 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 02:37:26 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 02:37:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color cli cache clear Dec 31 02:37:26 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:37:26 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:37:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color cli cache clear Dec 31 02:37:26 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:37:26 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:37:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color cli cache clear Dec 31 02:37:26 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:37:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:37:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/boniface/blog --no-color cli cache clear Dec 31 02:37:27 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:37:27 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:37:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color cli cache clear Dec 31 02:37:27 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:37:27 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:37:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color cli cache clear Dec 31 02:37:27 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:37:27 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:37:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/woodpeck/public_html/wp --no-color cli cache clear Dec 31 02:37:27 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 31 02:37:27 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 31 02:37:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color cli cache clear Dec 31 02:37:27 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 31 02:37:27 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 31 02:37:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color cli cache clear Dec 31 02:37:27 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 31 02:37:28 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 31 02:37:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 31 02:37:28 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 31 02:37:28 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 31 02:37:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 31 02:37:28 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 02:37:29 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 02:37:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 31 02:37:29 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 02:37:29 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 02:37:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 31 02:37:30 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:37:30 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:37:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 31 02:37:30 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:37:30 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:37:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 31 02:37:30 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 02:37:31 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 02:37:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 31 02:37:31 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:37:31 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:37:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 31 02:37:31 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 02:37:31 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 02:37:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 31 02:37:31 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 31 02:37:32 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 31 02:37:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Dec 31 02:37:32 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 31 02:37:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c httpd -v Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:33 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/palco123/panlys.com/wp-toolkit.conf Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/palco123/panlys.com/wp-toolkit.conf Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:37:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 02:37:34 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 02:55:23 host sshd[20620]: Invalid user admin from 194.169.175.102 port 51073 Dec 31 02:55:23 host sshd[20620]: input_userauth_request: invalid user admin [preauth] Dec 31 02:55:23 host sshd[20620]: pam_unix(sshd:auth): check pass; user unknown Dec 31 02:55:23 host sshd[20620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 Dec 31 02:55:25 host sshd[20620]: Failed password for invalid user admin from 194.169.175.102 port 51073 ssh2 Dec 31 02:55:26 host sshd[20620]: Received disconnect from 194.169.175.102 port 51073:11: Client disconnecting normally [preauth] Dec 31 02:55:26 host sshd[20620]: Disconnected from 194.169.175.102 port 51073 [preauth] Dec 31 03:00:51 host sshd[21486]: Invalid user user from 103.13.40.2 port 44218 Dec 31 03:00:51 host sshd[21486]: input_userauth_request: invalid user user [preauth] Dec 31 03:00:51 host sshd[21486]: pam_unix(sshd:auth): check pass; user unknown Dec 31 03:00:51 host sshd[21486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 31 03:00:53 host sshd[21486]: Failed password for invalid user user from 103.13.40.2 port 44218 ssh2 Dec 31 03:00:53 host sshd[21486]: Connection closed by 103.13.40.2 port 44218 [preauth] Dec 31 03:08:52 host sshd[22508]: Did not receive identification string from 45.55.64.51 port 60407 Dec 31 03:19:08 host sshd[23940]: Invalid user jose from 107.189.30.59 port 40072 Dec 31 03:19:08 host sshd[23940]: input_userauth_request: invalid user jose [preauth] Dec 31 03:19:08 host sshd[23940]: pam_unix(sshd:auth): check pass; user unknown Dec 31 03:19:08 host sshd[23940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Dec 31 03:19:10 host sshd[23940]: Failed password for invalid user jose from 107.189.30.59 port 40072 ssh2 Dec 31 03:19:11 host sshd[23940]: Connection closed by 107.189.30.59 port 40072 [preauth] Dec 31 03:20:05 host sshd[24047]: Invalid user wzy from 92.46.108.20 port 39912 Dec 31 03:20:05 host sshd[24047]: input_userauth_request: invalid user wzy [preauth] Dec 31 03:20:05 host sshd[24047]: pam_unix(sshd:auth): check pass; user unknown Dec 31 03:20:05 host sshd[24047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 31 03:20:07 host sshd[24047]: Failed password for invalid user wzy from 92.46.108.20 port 39912 ssh2 Dec 31 03:20:08 host sshd[24047]: Connection closed by 92.46.108.20 port 39912 [preauth] Dec 31 03:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 03:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 03:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 03:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 03:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 03:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 03:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 03:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 03:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 03:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 31 03:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 03:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 03:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 31 03:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 03:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 03:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 31 03:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 03:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 03:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 31 03:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 03:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 03:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 31 03:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 03:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 03:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 31 03:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 03:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 03:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 31 03:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 03:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 03:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 31 03:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 03:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 31 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=vfmassets user-2=shalinijames user-3=wwwtestugo user-4=pmcresources user-5=remysagr user-6=disposeat user-7=wwwkmaorg user-8=wwwkapin user-9=woodpeck user-10=palco123 user-11=gifterman user-12=phmetals user-13=kottayamcalldriv user-14=wwwnexidigital user-15=mrsclean user-16=bonifacegroup user-17=wwwevmhonda user-18=straightcurve user-19=wwwletsstalkfood user-20=a2zgroup user-21=dartsimp user-22=laundryboniface user-23=wwwkaretakers user-24=cochintaxi user-25=travelboniface user-26=wwwresourcehunte user-27=keralaholi user-28=wwwrmswll user-29=ugotscom user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 31 03:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 31 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-t7FKfu9gAIqdThFn.~ Dec 31 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-t7FKfu9gAIqdThFn.~' Dec 31 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-t7FKfu9gAIqdThFn.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 03:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 31 03:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 03:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 03:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 31 03:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 03:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 03:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 31 03:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 03:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 03:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 03:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 03:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 31 03:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 31 03:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 31 03:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 31 03:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 03:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 03:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 31 03:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 03:22:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 03:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 31 03:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 03:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 03:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 31 03:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 03:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 03:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 31 03:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 03:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 03:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 31 03:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 03:22:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 03:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 31 03:22:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 03:22:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 03:29:53 host sshd[25753]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Dec 31 03:29:53 host sshd[25753]: input_userauth_request: invalid user root [preauth] Dec 31 03:29:53 host unix_chkpwd[25756]: password check failed for user (root) Dec 31 03:29:53 host sshd[25753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Dec 31 03:29:53 host sshd[25753]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 03:29:56 host sshd[25753]: Failed password for invalid user root from 162.218.126.136 port 57416 ssh2 Dec 31 03:29:56 host sshd[25753]: Connection closed by 162.218.126.136 port 57416 [preauth] Dec 31 03:41:21 host sshd[27364]: Invalid user fj from 45.93.201.90 port 34272 Dec 31 03:41:21 host sshd[27364]: input_userauth_request: invalid user fj [preauth] Dec 31 03:41:21 host sshd[27364]: pam_unix(sshd:auth): check pass; user unknown Dec 31 03:41:21 host sshd[27364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 31 03:41:23 host sshd[27364]: Failed password for invalid user fj from 45.93.201.90 port 34272 ssh2 Dec 31 03:41:26 host sshd[27364]: pam_unix(sshd:auth): check pass; user unknown Dec 31 03:41:28 host sshd[27364]: Failed password for invalid user fj from 45.93.201.90 port 34272 ssh2 Dec 31 03:41:31 host sshd[27364]: pam_unix(sshd:auth): check pass; user unknown Dec 31 03:41:32 host sshd[27364]: Failed password for invalid user fj from 45.93.201.90 port 34272 ssh2 Dec 31 03:41:35 host sshd[27364]: Connection closed by 45.93.201.90 port 34272 [preauth] Dec 31 03:41:35 host sshd[27364]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 31 03:50:00 host sshd[28586]: Invalid user tiago from 41.197.31.178 port 47744 Dec 31 03:50:00 host sshd[28586]: input_userauth_request: invalid user tiago [preauth] Dec 31 03:50:00 host sshd[28586]: pam_unix(sshd:auth): check pass; user unknown Dec 31 03:50:00 host sshd[28586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 31 03:50:02 host sshd[28586]: Failed password for invalid user tiago from 41.197.31.178 port 47744 ssh2 Dec 31 03:50:03 host sshd[28586]: Connection closed by 41.197.31.178 port 47744 [preauth] Dec 31 03:53:51 host sshd[29072]: User root from 106.10.122.53 not allowed because not listed in AllowUsers Dec 31 03:53:51 host sshd[29072]: input_userauth_request: invalid user root [preauth] Dec 31 03:53:51 host unix_chkpwd[29076]: password check failed for user (root) Dec 31 03:53:51 host sshd[29072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 user=root Dec 31 03:53:51 host sshd[29072]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 03:53:53 host sshd[29072]: Failed password for invalid user root from 106.10.122.53 port 47130 ssh2 Dec 31 03:53:53 host sshd[29072]: Connection closed by 106.10.122.53 port 47130 [preauth] Dec 31 03:53:55 host sshd[29081]: Invalid user pi from 80.251.216.10 port 60490 Dec 31 03:53:55 host sshd[29081]: input_userauth_request: invalid user pi [preauth] Dec 31 03:53:55 host sshd[29081]: pam_unix(sshd:auth): check pass; user unknown Dec 31 03:53:55 host sshd[29081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.251.216.10 Dec 31 03:53:58 host sshd[29081]: Failed password for invalid user pi from 80.251.216.10 port 60490 ssh2 Dec 31 03:53:58 host sshd[29081]: Received disconnect from 80.251.216.10 port 60490:11: Bye Bye [preauth] Dec 31 03:53:58 host sshd[29081]: Disconnected from 80.251.216.10 port 60490 [preauth] Dec 31 03:55:33 host sshd[29418]: Invalid user ul from 141.11.250.159 port 40196 Dec 31 03:55:33 host sshd[29418]: input_userauth_request: invalid user ul [preauth] Dec 31 03:55:33 host sshd[29418]: pam_unix(sshd:auth): check pass; user unknown Dec 31 03:55:33 host sshd[29418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.11.250.159 Dec 31 03:55:35 host sshd[29418]: Failed password for invalid user ul from 141.11.250.159 port 40196 ssh2 Dec 31 03:55:35 host sshd[29418]: Received disconnect from 141.11.250.159 port 40196:11: Bye Bye [preauth] Dec 31 03:55:35 host sshd[29418]: Disconnected from 141.11.250.159 port 40196 [preauth] Dec 31 03:55:53 host sshd[29461]: Invalid user gu from 213.6.144.230 port 34590 Dec 31 03:55:53 host sshd[29461]: input_userauth_request: invalid user gu [preauth] Dec 31 03:55:53 host sshd[29461]: pam_unix(sshd:auth): check pass; user unknown Dec 31 03:55:53 host sshd[29461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.6.144.230 Dec 31 03:55:55 host sshd[29461]: Failed password for invalid user gu from 213.6.144.230 port 34590 ssh2 Dec 31 03:55:55 host sshd[29461]: Received disconnect from 213.6.144.230 port 34590:11: Bye Bye [preauth] Dec 31 03:55:55 host sshd[29461]: Disconnected from 213.6.144.230 port 34590 [preauth] Dec 31 03:56:04 host sshd[29485]: Invalid user hr from 188.235.137.135 port 49903 Dec 31 03:56:04 host sshd[29485]: input_userauth_request: invalid user hr [preauth] Dec 31 03:56:04 host sshd[29485]: pam_unix(sshd:auth): check pass; user unknown Dec 31 03:56:04 host sshd[29485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.235.137.135 Dec 31 03:56:06 host sshd[29485]: Failed password for invalid user hr from 188.235.137.135 port 49903 ssh2 Dec 31 03:56:06 host sshd[29485]: Received disconnect from 188.235.137.135 port 49903:11: Bye Bye [preauth] Dec 31 03:56:06 host sshd[29485]: Disconnected from 188.235.137.135 port 49903 [preauth] Dec 31 03:56:13 host sshd[29503]: Invalid user we from 152.228.131.35 port 56696 Dec 31 03:56:13 host sshd[29503]: input_userauth_request: invalid user we [preauth] Dec 31 03:56:13 host sshd[29503]: pam_unix(sshd:auth): check pass; user unknown Dec 31 03:56:13 host sshd[29503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.228.131.35 Dec 31 03:56:16 host sshd[29503]: Failed password for invalid user we from 152.228.131.35 port 56696 ssh2 Dec 31 03:56:16 host sshd[29506]: Invalid user jj from 45.161.176.1 port 47204 Dec 31 03:56:16 host sshd[29506]: input_userauth_request: invalid user jj [preauth] Dec 31 03:56:16 host sshd[29506]: pam_unix(sshd:auth): check pass; user unknown Dec 31 03:56:16 host sshd[29506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.161.176.1 Dec 31 03:56:16 host sshd[29503]: Received disconnect from 152.228.131.35 port 56696:11: Bye Bye [preauth] Dec 31 03:56:16 host sshd[29503]: Disconnected from 152.228.131.35 port 56696 [preauth] Dec 31 03:56:18 host sshd[29506]: Failed password for invalid user jj from 45.161.176.1 port 47204 ssh2 Dec 31 03:56:18 host sshd[29506]: Received disconnect from 45.161.176.1 port 47204:11: Bye Bye [preauth] Dec 31 03:56:18 host sshd[29506]: Disconnected from 45.161.176.1 port 47204 [preauth] Dec 31 03:57:33 host sshd[29639]: Invalid user kx from 159.223.32.202 port 50592 Dec 31 03:57:33 host sshd[29639]: input_userauth_request: invalid user kx [preauth] Dec 31 03:57:33 host sshd[29639]: pam_unix(sshd:auth): check pass; user unknown Dec 31 03:57:33 host sshd[29639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.32.202 Dec 31 03:57:35 host sshd[29639]: Failed password for invalid user kx from 159.223.32.202 port 50592 ssh2 Dec 31 03:57:35 host sshd[29639]: Received disconnect from 159.223.32.202 port 50592:11: Bye Bye [preauth] Dec 31 03:57:35 host sshd[29639]: Disconnected from 159.223.32.202 port 50592 [preauth] Dec 31 03:57:52 host sshd[29656]: Invalid user ue from 157.245.74.106 port 60082 Dec 31 03:57:52 host sshd[29656]: input_userauth_request: invalid user ue [preauth] Dec 31 03:57:52 host sshd[29656]: pam_unix(sshd:auth): check pass; user unknown Dec 31 03:57:52 host sshd[29656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.74.106 Dec 31 03:57:54 host sshd[29656]: Failed password for invalid user ue from 157.245.74.106 port 60082 ssh2 Dec 31 03:57:54 host sshd[29656]: Received disconnect from 157.245.74.106 port 60082:11: Bye Bye [preauth] Dec 31 03:57:54 host sshd[29656]: Disconnected from 157.245.74.106 port 60082 [preauth] Dec 31 03:58:17 host sshd[29710]: Invalid user bc from 192.227.164.69 port 40274 Dec 31 03:58:17 host sshd[29710]: input_userauth_request: invalid user bc [preauth] Dec 31 03:58:17 host sshd[29710]: pam_unix(sshd:auth): check pass; user unknown Dec 31 03:58:17 host sshd[29710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.164.69 Dec 31 03:58:19 host sshd[29710]: Failed password for invalid user bc from 192.227.164.69 port 40274 ssh2 Dec 31 03:58:19 host sshd[29710]: Received disconnect from 192.227.164.69 port 40274:11: Bye Bye [preauth] Dec 31 03:58:19 host sshd[29710]: Disconnected from 192.227.164.69 port 40274 [preauth] Dec 31 03:58:20 host sshd[29714]: Invalid user tz from 20.9.24.136 port 57790 Dec 31 03:58:20 host sshd[29714]: input_userauth_request: invalid user tz [preauth] Dec 31 03:58:20 host sshd[29714]: pam_unix(sshd:auth): check pass; user unknown Dec 31 03:58:20 host sshd[29714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.9.24.136 Dec 31 03:58:22 host sshd[29714]: Failed password for invalid user tz from 20.9.24.136 port 57790 ssh2 Dec 31 03:58:22 host sshd[29714]: Received disconnect from 20.9.24.136 port 57790:11: Bye Bye [preauth] Dec 31 03:58:22 host sshd[29714]: Disconnected from 20.9.24.136 port 57790 [preauth] Dec 31 03:58:53 host sshd[29802]: Invalid user ii from 80.251.216.10 port 57846 Dec 31 03:58:53 host sshd[29802]: input_userauth_request: invalid user ii [preauth] Dec 31 03:58:53 host sshd[29802]: pam_unix(sshd:auth): check pass; user unknown Dec 31 03:58:53 host sshd[29802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.251.216.10 Dec 31 03:58:55 host sshd[29802]: Failed password for invalid user ii from 80.251.216.10 port 57846 ssh2 Dec 31 03:58:55 host sshd[29802]: Received disconnect from 80.251.216.10 port 57846:11: Bye Bye [preauth] Dec 31 03:58:55 host sshd[29802]: Disconnected from 80.251.216.10 port 57846 [preauth] Dec 31 03:58:58 host sshd[29811]: Invalid user ul from 45.55.134.210 port 42810 Dec 31 03:58:58 host sshd[29811]: input_userauth_request: invalid user ul [preauth] Dec 31 03:58:58 host sshd[29811]: pam_unix(sshd:auth): check pass; user unknown Dec 31 03:58:58 host sshd[29811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.134.210 Dec 31 03:59:01 host sshd[29811]: Failed password for invalid user ul from 45.55.134.210 port 42810 ssh2 Dec 31 03:59:01 host sshd[29811]: Received disconnect from 45.55.134.210 port 42810:11: Bye Bye [preauth] Dec 31 03:59:01 host sshd[29811]: Disconnected from 45.55.134.210 port 42810 [preauth] Dec 31 03:59:06 host sshd[29830]: Invalid user ag from 207.249.96.168 port 43698 Dec 31 03:59:06 host sshd[29830]: input_userauth_request: invalid user ag [preauth] Dec 31 03:59:06 host sshd[29830]: pam_unix(sshd:auth): check pass; user unknown Dec 31 03:59:06 host sshd[29830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.249.96.168 Dec 31 03:59:08 host sshd[29833]: Invalid user ql from 102.130.119.134 port 38018 Dec 31 03:59:08 host sshd[29833]: input_userauth_request: invalid user ql [preauth] Dec 31 03:59:08 host sshd[29833]: pam_unix(sshd:auth): check pass; user unknown Dec 31 03:59:08 host sshd[29833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.130.119.134 Dec 31 03:59:08 host sshd[29830]: Failed password for invalid user ag from 207.249.96.168 port 43698 ssh2 Dec 31 03:59:09 host sshd[29830]: Received disconnect from 207.249.96.168 port 43698:11: Bye Bye [preauth] Dec 31 03:59:09 host sshd[29830]: Disconnected from 207.249.96.168 port 43698 [preauth] Dec 31 03:59:10 host sshd[29833]: Failed password for invalid user ql from 102.130.119.134 port 38018 ssh2 Dec 31 03:59:11 host sshd[29833]: Received disconnect from 102.130.119.134 port 38018:11: Bye Bye [preauth] Dec 31 03:59:11 host sshd[29833]: Disconnected from 102.130.119.134 port 38018 [preauth] Dec 31 03:59:37 host sshd[29907]: Invalid user eh from 43.153.24.87 port 56460 Dec 31 03:59:37 host sshd[29907]: input_userauth_request: invalid user eh [preauth] Dec 31 03:59:37 host sshd[29907]: pam_unix(sshd:auth): check pass; user unknown Dec 31 03:59:37 host sshd[29907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.24.87 Dec 31 03:59:39 host sshd[29907]: Failed password for invalid user eh from 43.153.24.87 port 56460 ssh2 Dec 31 03:59:39 host sshd[29907]: Received disconnect from 43.153.24.87 port 56460:11: Bye Bye [preauth] Dec 31 03:59:39 host sshd[29907]: Disconnected from 43.153.24.87 port 56460 [preauth] Dec 31 04:00:05 host sshd[30000]: Invalid user ap from 45.161.176.1 port 36192 Dec 31 04:00:05 host sshd[30000]: input_userauth_request: invalid user ap [preauth] Dec 31 04:00:05 host sshd[30000]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:00:05 host sshd[30000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.161.176.1 Dec 31 04:00:07 host sshd[30000]: Failed password for invalid user ap from 45.161.176.1 port 36192 ssh2 Dec 31 04:00:07 host sshd[30000]: Received disconnect from 45.161.176.1 port 36192:11: Bye Bye [preauth] Dec 31 04:00:07 host sshd[30000]: Disconnected from 45.161.176.1 port 36192 [preauth] Dec 31 04:00:12 host sshd[30011]: Invalid user fp from 80.251.216.10 port 58100 Dec 31 04:00:12 host sshd[30011]: input_userauth_request: invalid user fp [preauth] Dec 31 04:00:12 host sshd[30011]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:00:12 host sshd[30011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.251.216.10 Dec 31 04:00:14 host sshd[30011]: Failed password for invalid user fp from 80.251.216.10 port 58100 ssh2 Dec 31 04:00:14 host sshd[30011]: Received disconnect from 80.251.216.10 port 58100:11: Bye Bye [preauth] Dec 31 04:00:14 host sshd[30011]: Disconnected from 80.251.216.10 port 58100 [preauth] Dec 31 04:00:17 host sshd[30033]: Invalid user sk from 189.57.73.18 port 21633 Dec 31 04:00:17 host sshd[30033]: input_userauth_request: invalid user sk [preauth] Dec 31 04:00:17 host sshd[30033]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:00:17 host sshd[30033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.57.73.18 Dec 31 04:00:19 host sshd[30033]: Failed password for invalid user sk from 189.57.73.18 port 21633 ssh2 Dec 31 04:00:19 host sshd[30118]: Invalid user tj from 141.11.250.159 port 57716 Dec 31 04:00:19 host sshd[30118]: input_userauth_request: invalid user tj [preauth] Dec 31 04:00:19 host sshd[30118]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:00:19 host sshd[30118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.11.250.159 Dec 31 04:00:19 host sshd[30033]: Received disconnect from 189.57.73.18 port 21633:11: Bye Bye [preauth] Dec 31 04:00:19 host sshd[30033]: Disconnected from 189.57.73.18 port 21633 [preauth] Dec 31 04:00:21 host sshd[30118]: Failed password for invalid user tj from 141.11.250.159 port 57716 ssh2 Dec 31 04:00:22 host sshd[30118]: Received disconnect from 141.11.250.159 port 57716:11: Bye Bye [preauth] Dec 31 04:00:22 host sshd[30118]: Disconnected from 141.11.250.159 port 57716 [preauth] Dec 31 04:00:25 host sshd[30195]: Invalid user lg from 45.55.134.210 port 40488 Dec 31 04:00:25 host sshd[30195]: input_userauth_request: invalid user lg [preauth] Dec 31 04:00:26 host sshd[30195]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:00:26 host sshd[30195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.134.210 Dec 31 04:00:28 host sshd[30195]: Failed password for invalid user lg from 45.55.134.210 port 40488 ssh2 Dec 31 04:00:28 host sshd[30195]: Received disconnect from 45.55.134.210 port 40488:11: Bye Bye [preauth] Dec 31 04:00:28 host sshd[30195]: Disconnected from 45.55.134.210 port 40488 [preauth] Dec 31 04:00:44 host sshd[30218]: Invalid user gl from 45.80.181.224 port 48436 Dec 31 04:00:44 host sshd[30218]: input_userauth_request: invalid user gl [preauth] Dec 31 04:00:44 host sshd[30218]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:00:44 host sshd[30218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.181.224 Dec 31 04:00:47 host sshd[30218]: Failed password for invalid user gl from 45.80.181.224 port 48436 ssh2 Dec 31 04:00:47 host sshd[30218]: Received disconnect from 45.80.181.224 port 48436:11: Bye Bye [preauth] Dec 31 04:00:47 host sshd[30218]: Disconnected from 45.80.181.224 port 48436 [preauth] Dec 31 04:00:56 host sshd[30233]: Invalid user oh from 207.249.96.168 port 42020 Dec 31 04:00:56 host sshd[30233]: input_userauth_request: invalid user oh [preauth] Dec 31 04:00:56 host sshd[30233]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:00:56 host sshd[30233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.249.96.168 Dec 31 04:00:59 host sshd[30233]: Failed password for invalid user oh from 207.249.96.168 port 42020 ssh2 Dec 31 04:00:59 host sshd[30233]: Received disconnect from 207.249.96.168 port 42020:11: Bye Bye [preauth] Dec 31 04:00:59 host sshd[30233]: Disconnected from 207.249.96.168 port 42020 [preauth] Dec 31 04:01:25 host sshd[30321]: Invalid user uf from 141.11.250.159 port 51416 Dec 31 04:01:25 host sshd[30321]: input_userauth_request: invalid user uf [preauth] Dec 31 04:01:25 host sshd[30321]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:01:25 host sshd[30321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.11.250.159 Dec 31 04:01:27 host sshd[30321]: Failed password for invalid user uf from 141.11.250.159 port 51416 ssh2 Dec 31 04:01:29 host sshd[30357]: Invalid user kb from 45.55.134.210 port 36090 Dec 31 04:01:29 host sshd[30357]: input_userauth_request: invalid user kb [preauth] Dec 31 04:01:29 host sshd[30357]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:01:29 host sshd[30357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.134.210 Dec 31 04:01:31 host sshd[30357]: Failed password for invalid user kb from 45.55.134.210 port 36090 ssh2 Dec 31 04:01:34 host sshd[30391]: Invalid user uj from 45.7.196.67 port 36656 Dec 31 04:01:34 host sshd[30391]: input_userauth_request: invalid user uj [preauth] Dec 31 04:01:34 host sshd[30391]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:01:34 host sshd[30391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.7.196.67 Dec 31 04:01:35 host sshd[30396]: Invalid user ge from 152.228.131.35 port 53830 Dec 31 04:01:35 host sshd[30396]: input_userauth_request: invalid user ge [preauth] Dec 31 04:01:35 host sshd[30396]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:01:35 host sshd[30396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.228.131.35 Dec 31 04:01:35 host sshd[30391]: Failed password for invalid user uj from 45.7.196.67 port 36656 ssh2 Dec 31 04:01:35 host sshd[30391]: Received disconnect from 45.7.196.67 port 36656:11: Bye Bye [preauth] Dec 31 04:01:35 host sshd[30391]: Disconnected from 45.7.196.67 port 36656 [preauth] Dec 31 04:01:36 host sshd[30398]: Invalid user xy from 45.161.176.1 port 37060 Dec 31 04:01:36 host sshd[30398]: input_userauth_request: invalid user xy [preauth] Dec 31 04:01:36 host sshd[30398]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:01:36 host sshd[30398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.161.176.1 Dec 31 04:01:37 host sshd[30396]: Failed password for invalid user ge from 152.228.131.35 port 53830 ssh2 Dec 31 04:01:37 host sshd[30396]: Received disconnect from 152.228.131.35 port 53830:11: Bye Bye [preauth] Dec 31 04:01:37 host sshd[30396]: Disconnected from 152.228.131.35 port 53830 [preauth] Dec 31 04:01:38 host sshd[30398]: Failed password for invalid user xy from 45.161.176.1 port 37060 ssh2 Dec 31 04:01:38 host sshd[30398]: Received disconnect from 45.161.176.1 port 37060:11: Bye Bye [preauth] Dec 31 04:01:38 host sshd[30398]: Disconnected from 45.161.176.1 port 37060 [preauth] Dec 31 04:01:49 host sshd[30454]: Invalid user ct from 188.235.137.135 port 48749 Dec 31 04:01:49 host sshd[30454]: input_userauth_request: invalid user ct [preauth] Dec 31 04:01:49 host sshd[30454]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:01:49 host sshd[30454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.235.137.135 Dec 31 04:01:51 host sshd[30454]: Failed password for invalid user ct from 188.235.137.135 port 48749 ssh2 Dec 31 04:01:51 host sshd[30454]: Received disconnect from 188.235.137.135 port 48749:11: Bye Bye [preauth] Dec 31 04:01:51 host sshd[30454]: Disconnected from 188.235.137.135 port 48749 [preauth] Dec 31 04:01:55 host sshd[30464]: Invalid user gx from 157.245.74.106 port 55994 Dec 31 04:01:55 host sshd[30464]: input_userauth_request: invalid user gx [preauth] Dec 31 04:01:55 host sshd[30464]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:01:55 host sshd[30464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.74.106 Dec 31 04:01:57 host sshd[30464]: Failed password for invalid user gx from 157.245.74.106 port 55994 ssh2 Dec 31 04:01:57 host sshd[30464]: Received disconnect from 157.245.74.106 port 55994:11: Bye Bye [preauth] Dec 31 04:01:57 host sshd[30464]: Disconnected from 157.245.74.106 port 55994 [preauth] Dec 31 04:02:06 host sshd[30487]: Invalid user kt from 213.6.144.230 port 35251 Dec 31 04:02:06 host sshd[30487]: input_userauth_request: invalid user kt [preauth] Dec 31 04:02:06 host sshd[30487]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:02:06 host sshd[30487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.6.144.230 Dec 31 04:02:07 host sshd[30494]: Invalid user gc from 207.249.96.168 port 38382 Dec 31 04:02:07 host sshd[30494]: input_userauth_request: invalid user gc [preauth] Dec 31 04:02:07 host sshd[30494]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:02:07 host sshd[30494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.249.96.168 Dec 31 04:02:08 host sshd[30487]: Failed password for invalid user kt from 213.6.144.230 port 35251 ssh2 Dec 31 04:02:08 host sshd[30487]: Received disconnect from 213.6.144.230 port 35251:11: Bye Bye [preauth] Dec 31 04:02:08 host sshd[30487]: Disconnected from 213.6.144.230 port 35251 [preauth] Dec 31 04:02:09 host sshd[30494]: Failed password for invalid user gc from 207.249.96.168 port 38382 ssh2 Dec 31 04:02:10 host sshd[30494]: Received disconnect from 207.249.96.168 port 38382:11: Bye Bye [preauth] Dec 31 04:02:10 host sshd[30494]: Disconnected from 207.249.96.168 port 38382 [preauth] Dec 31 04:02:36 host sshd[30592]: Invalid user pv from 192.227.164.69 port 44062 Dec 31 04:02:36 host sshd[30592]: input_userauth_request: invalid user pv [preauth] Dec 31 04:02:36 host sshd[30592]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:02:36 host sshd[30592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.164.69 Dec 31 04:02:37 host sshd[30592]: Failed password for invalid user pv from 192.227.164.69 port 44062 ssh2 Dec 31 04:02:38 host sshd[30592]: Received disconnect from 192.227.164.69 port 44062:11: Bye Bye [preauth] Dec 31 04:02:38 host sshd[30592]: Disconnected from 192.227.164.69 port 44062 [preauth] Dec 31 04:02:56 host sshd[30614]: Invalid user su from 152.228.131.35 port 44814 Dec 31 04:02:56 host sshd[30614]: input_userauth_request: invalid user su [preauth] Dec 31 04:02:56 host sshd[30614]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:02:56 host sshd[30614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.228.131.35 Dec 31 04:02:58 host sshd[30614]: Failed password for invalid user su from 152.228.131.35 port 44814 ssh2 Dec 31 04:02:58 host sshd[30614]: Received disconnect from 152.228.131.35 port 44814:11: Bye Bye [preauth] Dec 31 04:02:58 host sshd[30614]: Disconnected from 152.228.131.35 port 44814 [preauth] Dec 31 04:03:10 host sshd[30670]: Invalid user su from 157.245.74.106 port 53920 Dec 31 04:03:10 host sshd[30670]: input_userauth_request: invalid user su [preauth] Dec 31 04:03:10 host sshd[30670]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:03:10 host sshd[30670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.74.106 Dec 31 04:03:13 host sshd[30670]: Failed password for invalid user su from 157.245.74.106 port 53920 ssh2 Dec 31 04:03:15 host sshd[30714]: Invalid user ls from 188.235.137.135 port 46735 Dec 31 04:03:15 host sshd[30714]: input_userauth_request: invalid user ls [preauth] Dec 31 04:03:15 host sshd[30714]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:03:15 host sshd[30714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.235.137.135 Dec 31 04:03:17 host sshd[30714]: Failed password for invalid user ls from 188.235.137.135 port 46735 ssh2 Dec 31 04:03:19 host sshd[30755]: Invalid user ra from 45.7.196.67 port 38734 Dec 31 04:03:19 host sshd[30755]: input_userauth_request: invalid user ra [preauth] Dec 31 04:03:19 host sshd[30755]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:03:19 host sshd[30755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.7.196.67 Dec 31 04:03:22 host sshd[30755]: Failed password for invalid user ra from 45.7.196.67 port 38734 ssh2 Dec 31 04:03:22 host sshd[30755]: Received disconnect from 45.7.196.67 port 38734:11: Bye Bye [preauth] Dec 31 04:03:22 host sshd[30755]: Disconnected from 45.7.196.67 port 38734 [preauth] Dec 31 04:03:24 host sshd[30782]: Invalid user hy from 20.9.24.136 port 41130 Dec 31 04:03:24 host sshd[30782]: input_userauth_request: invalid user hy [preauth] Dec 31 04:03:24 host sshd[30782]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:03:24 host sshd[30782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.9.24.136 Dec 31 04:03:27 host sshd[30782]: Failed password for invalid user hy from 20.9.24.136 port 41130 ssh2 Dec 31 04:03:27 host sshd[30782]: Received disconnect from 20.9.24.136 port 41130:11: Bye Bye [preauth] Dec 31 04:03:27 host sshd[30782]: Disconnected from 20.9.24.136 port 41130 [preauth] Dec 31 04:03:31 host sshd[30793]: Invalid user qf from 213.6.144.230 port 49407 Dec 31 04:03:31 host sshd[30793]: input_userauth_request: invalid user qf [preauth] Dec 31 04:03:31 host sshd[30793]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:03:31 host sshd[30793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.6.144.230 Dec 31 04:03:32 host sshd[30796]: Invalid user ec from 102.130.119.134 port 43052 Dec 31 04:03:32 host sshd[30796]: input_userauth_request: invalid user ec [preauth] Dec 31 04:03:32 host sshd[30796]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:03:32 host sshd[30796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.130.119.134 Dec 31 04:03:33 host sshd[30793]: Failed password for invalid user qf from 213.6.144.230 port 49407 ssh2 Dec 31 04:03:34 host sshd[30796]: Failed password for invalid user ec from 102.130.119.134 port 43052 ssh2 Dec 31 04:03:35 host sshd[30796]: Received disconnect from 102.130.119.134 port 43052:11: Bye Bye [preauth] Dec 31 04:03:35 host sshd[30796]: Disconnected from 102.130.119.134 port 43052 [preauth] Dec 31 04:03:40 host sshd[30838]: Invalid user tn from 192.227.164.69 port 48568 Dec 31 04:03:40 host sshd[30838]: input_userauth_request: invalid user tn [preauth] Dec 31 04:03:40 host sshd[30838]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:03:40 host sshd[30838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.164.69 Dec 31 04:03:42 host sshd[30838]: Failed password for invalid user tn from 192.227.164.69 port 48568 ssh2 Dec 31 04:03:42 host sshd[30854]: Invalid user ra from 159.223.32.202 port 59682 Dec 31 04:03:42 host sshd[30854]: input_userauth_request: invalid user ra [preauth] Dec 31 04:03:42 host sshd[30854]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:03:42 host sshd[30854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.32.202 Dec 31 04:03:43 host sshd[30852]: Invalid user rq from 45.80.181.224 port 57994 Dec 31 04:03:43 host sshd[30852]: input_userauth_request: invalid user rq [preauth] Dec 31 04:03:43 host sshd[30852]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:03:43 host sshd[30852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.181.224 Dec 31 04:03:44 host sshd[30854]: Failed password for invalid user ra from 159.223.32.202 port 59682 ssh2 Dec 31 04:03:44 host sshd[30854]: Received disconnect from 159.223.32.202 port 59682:11: Bye Bye [preauth] Dec 31 04:03:44 host sshd[30854]: Disconnected from 159.223.32.202 port 59682 [preauth] Dec 31 04:03:45 host sshd[30852]: Failed password for invalid user rq from 45.80.181.224 port 57994 ssh2 Dec 31 04:03:45 host sshd[30852]: Received disconnect from 45.80.181.224 port 57994:11: Bye Bye [preauth] Dec 31 04:03:45 host sshd[30852]: Disconnected from 45.80.181.224 port 57994 [preauth] Dec 31 04:03:55 host sshd[30895]: Invalid user rp from 189.57.73.18 port 4737 Dec 31 04:03:55 host sshd[30895]: input_userauth_request: invalid user rp [preauth] Dec 31 04:03:55 host sshd[30895]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:03:55 host sshd[30895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.57.73.18 Dec 31 04:03:57 host sshd[30895]: Failed password for invalid user rp from 189.57.73.18 port 4737 ssh2 Dec 31 04:03:58 host sshd[30895]: Received disconnect from 189.57.73.18 port 4737:11: Bye Bye [preauth] Dec 31 04:03:58 host sshd[30895]: Disconnected from 189.57.73.18 port 4737 [preauth] Dec 31 04:04:22 host sshd[30944]: Invalid user xg from 35.184.167.157 port 50312 Dec 31 04:04:22 host sshd[30944]: input_userauth_request: invalid user xg [preauth] Dec 31 04:04:22 host sshd[30944]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:04:22 host sshd[30944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.184.167.157 Dec 31 04:04:24 host sshd[30944]: Failed password for invalid user xg from 35.184.167.157 port 50312 ssh2 Dec 31 04:04:24 host sshd[30944]: Received disconnect from 35.184.167.157 port 50312:11: Bye Bye [preauth] Dec 31 04:04:24 host sshd[30944]: Disconnected from 35.184.167.157 port 50312 [preauth] Dec 31 04:04:39 host sshd[30994]: Invalid user om from 20.9.24.136 port 47340 Dec 31 04:04:39 host sshd[30994]: input_userauth_request: invalid user om [preauth] Dec 31 04:04:39 host sshd[30994]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:04:39 host sshd[30994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.9.24.136 Dec 31 04:04:41 host sshd[30994]: Failed password for invalid user om from 20.9.24.136 port 47340 ssh2 Dec 31 04:04:41 host sshd[30994]: Received disconnect from 20.9.24.136 port 47340:11: Bye Bye [preauth] Dec 31 04:04:41 host sshd[30994]: Disconnected from 20.9.24.136 port 47340 [preauth] Dec 31 04:04:49 host sshd[31038]: Invalid user yo from 45.7.196.67 port 39180 Dec 31 04:04:49 host sshd[31038]: input_userauth_request: invalid user yo [preauth] Dec 31 04:04:49 host sshd[31038]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:04:49 host sshd[31038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.7.196.67 Dec 31 04:04:51 host sshd[31038]: Failed password for invalid user yo from 45.7.196.67 port 39180 ssh2 Dec 31 04:04:51 host sshd[31038]: Received disconnect from 45.7.196.67 port 39180:11: Bye Bye [preauth] Dec 31 04:04:51 host sshd[31038]: Disconnected from 45.7.196.67 port 39180 [preauth] Dec 31 04:05:05 host sshd[31117]: Invalid user sg from 102.130.119.134 port 50216 Dec 31 04:05:05 host sshd[31117]: input_userauth_request: invalid user sg [preauth] Dec 31 04:05:05 host sshd[31117]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:05:05 host sshd[31117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.130.119.134 Dec 31 04:05:07 host sshd[31117]: Failed password for invalid user sg from 102.130.119.134 port 50216 ssh2 Dec 31 04:05:11 host sshd[31163]: Invalid user mw from 159.223.32.202 port 53758 Dec 31 04:05:11 host sshd[31163]: input_userauth_request: invalid user mw [preauth] Dec 31 04:05:11 host sshd[31163]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:05:11 host sshd[31163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.32.202 Dec 31 04:05:13 host sshd[31163]: Failed password for invalid user mw from 159.223.32.202 port 53758 ssh2 Dec 31 04:05:23 host sshd[31223]: Invalid user ci from 189.57.73.18 port 11073 Dec 31 04:05:23 host sshd[31223]: input_userauth_request: invalid user ci [preauth] Dec 31 04:05:23 host sshd[31223]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:05:23 host sshd[31223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.57.73.18 Dec 31 04:05:25 host sshd[31223]: Failed password for invalid user ci from 189.57.73.18 port 11073 ssh2 Dec 31 04:05:25 host sshd[31253]: Invalid user ku from 45.80.181.224 port 34346 Dec 31 04:05:25 host sshd[31253]: input_userauth_request: invalid user ku [preauth] Dec 31 04:05:25 host sshd[31253]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:05:25 host sshd[31253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.181.224 Dec 31 04:05:26 host sshd[31223]: Received disconnect from 189.57.73.18 port 11073:11: Bye Bye [preauth] Dec 31 04:05:26 host sshd[31223]: Disconnected from 189.57.73.18 port 11073 [preauth] Dec 31 04:05:27 host sshd[31253]: Failed password for invalid user ku from 45.80.181.224 port 34346 ssh2 Dec 31 04:06:25 host sshd[31582]: Invalid user ki from 177.185.141.100 port 59940 Dec 31 04:06:25 host sshd[31582]: input_userauth_request: invalid user ki [preauth] Dec 31 04:06:25 host sshd[31582]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:06:25 host sshd[31582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.185.141.100 Dec 31 04:06:27 host sshd[31582]: Failed password for invalid user ki from 177.185.141.100 port 59940 ssh2 Dec 31 04:06:27 host sshd[31582]: Received disconnect from 177.185.141.100 port 59940:11: Bye Bye [preauth] Dec 31 04:06:27 host sshd[31582]: Disconnected from 177.185.141.100 port 59940 [preauth] Dec 31 04:06:57 host sshd[31655]: Invalid user cq from 43.153.24.87 port 46256 Dec 31 04:06:57 host sshd[31655]: input_userauth_request: invalid user cq [preauth] Dec 31 04:06:57 host sshd[31655]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:06:57 host sshd[31655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.24.87 Dec 31 04:06:59 host sshd[31655]: Failed password for invalid user cq from 43.153.24.87 port 46256 ssh2 Dec 31 04:06:59 host sshd[31655]: Received disconnect from 43.153.24.87 port 46256:11: Bye Bye [preauth] Dec 31 04:06:59 host sshd[31655]: Disconnected from 43.153.24.87 port 46256 [preauth] Dec 31 04:08:22 host sshd[31839]: Invalid user vx from 43.153.24.87 port 47002 Dec 31 04:08:22 host sshd[31839]: input_userauth_request: invalid user vx [preauth] Dec 31 04:08:22 host sshd[31839]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:08:22 host sshd[31839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.24.87 Dec 31 04:08:24 host sshd[31839]: Failed password for invalid user vx from 43.153.24.87 port 47002 ssh2 Dec 31 04:08:24 host sshd[31839]: Received disconnect from 43.153.24.87 port 47002:11: Bye Bye [preauth] Dec 31 04:08:24 host sshd[31839]: Disconnected from 43.153.24.87 port 47002 [preauth] Dec 31 04:09:25 host sshd[32060]: Invalid user zc from 35.184.167.157 port 46930 Dec 31 04:09:25 host sshd[32060]: input_userauth_request: invalid user zc [preauth] Dec 31 04:09:25 host sshd[32060]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:09:25 host sshd[32060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.184.167.157 Dec 31 04:09:27 host sshd[32060]: Failed password for invalid user zc from 35.184.167.157 port 46930 ssh2 Dec 31 04:09:27 host sshd[32060]: Received disconnect from 35.184.167.157 port 46930:11: Bye Bye [preauth] Dec 31 04:09:27 host sshd[32060]: Disconnected from 35.184.167.157 port 46930 [preauth] Dec 31 04:10:25 host sshd[32236]: Invalid user dy from 177.185.141.100 port 44440 Dec 31 04:10:25 host sshd[32236]: input_userauth_request: invalid user dy [preauth] Dec 31 04:10:25 host sshd[32236]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:10:25 host sshd[32236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.185.141.100 Dec 31 04:10:27 host sshd[32236]: Failed password for invalid user dy from 177.185.141.100 port 44440 ssh2 Dec 31 04:10:27 host sshd[32236]: Received disconnect from 177.185.141.100 port 44440:11: Bye Bye [preauth] Dec 31 04:10:27 host sshd[32236]: Disconnected from 177.185.141.100 port 44440 [preauth] Dec 31 04:10:30 host sshd[32246]: Invalid user pm from 35.184.167.157 port 37622 Dec 31 04:10:30 host sshd[32246]: input_userauth_request: invalid user pm [preauth] Dec 31 04:10:30 host sshd[32246]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:10:30 host sshd[32246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.184.167.157 Dec 31 04:10:32 host sshd[32246]: Failed password for invalid user pm from 35.184.167.157 port 37622 ssh2 Dec 31 04:11:49 host sshd[32539]: Invalid user rd from 177.185.141.100 port 40254 Dec 31 04:11:49 host sshd[32539]: input_userauth_request: invalid user rd [preauth] Dec 31 04:11:49 host sshd[32539]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:11:49 host sshd[32539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.185.141.100 Dec 31 04:11:51 host sshd[32539]: Failed password for invalid user rd from 177.185.141.100 port 40254 ssh2 Dec 31 04:11:51 host sshd[32539]: Received disconnect from 177.185.141.100 port 40254:11: Bye Bye [preauth] Dec 31 04:11:51 host sshd[32539]: Disconnected from 177.185.141.100 port 40254 [preauth] Dec 31 04:13:06 host sshd[32727]: Invalid user hi from 102.134.140.130 port 41580 Dec 31 04:13:06 host sshd[32727]: input_userauth_request: invalid user hi [preauth] Dec 31 04:13:06 host sshd[32727]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:13:06 host sshd[32727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.134.140.130 Dec 31 04:13:09 host sshd[32727]: Failed password for invalid user hi from 102.134.140.130 port 41580 ssh2 Dec 31 04:13:09 host sshd[32727]: Received disconnect from 102.134.140.130 port 41580:11: Bye Bye [preauth] Dec 31 04:13:09 host sshd[32727]: Disconnected from 102.134.140.130 port 41580 [preauth] Dec 31 04:15:48 host sshd[966]: Invalid user hx from 45.240.88.142 port 53772 Dec 31 04:15:48 host sshd[966]: input_userauth_request: invalid user hx [preauth] Dec 31 04:15:48 host sshd[966]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:15:48 host sshd[966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.240.88.142 Dec 31 04:15:50 host sshd[966]: Failed password for invalid user hx from 45.240.88.142 port 53772 ssh2 Dec 31 04:15:50 host sshd[966]: Received disconnect from 45.240.88.142 port 53772:11: Bye Bye [preauth] Dec 31 04:15:50 host sshd[966]: Disconnected from 45.240.88.142 port 53772 [preauth] Dec 31 04:19:18 host sshd[1410]: Invalid user hd from 102.134.140.130 port 34854 Dec 31 04:19:18 host sshd[1410]: input_userauth_request: invalid user hd [preauth] Dec 31 04:19:18 host sshd[1410]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:19:18 host sshd[1410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.134.140.130 Dec 31 04:19:20 host sshd[1410]: Failed password for invalid user hd from 102.134.140.130 port 34854 ssh2 Dec 31 04:19:20 host sshd[1410]: Received disconnect from 102.134.140.130 port 34854:11: Bye Bye [preauth] Dec 31 04:19:20 host sshd[1410]: Disconnected from 102.134.140.130 port 34854 [preauth] Dec 31 04:19:24 host sshd[1442]: Invalid user tb from 45.240.88.142 port 56038 Dec 31 04:19:24 host sshd[1442]: input_userauth_request: invalid user tb [preauth] Dec 31 04:19:24 host sshd[1442]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:19:24 host sshd[1442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.240.88.142 Dec 31 04:19:26 host sshd[1442]: Failed password for invalid user tb from 45.240.88.142 port 56038 ssh2 Dec 31 04:19:26 host sshd[1442]: Received disconnect from 45.240.88.142 port 56038:11: Bye Bye [preauth] Dec 31 04:19:26 host sshd[1442]: Disconnected from 45.240.88.142 port 56038 [preauth] Dec 31 04:20:35 host sshd[1635]: Invalid user dm from 45.240.88.142 port 60110 Dec 31 04:20:35 host sshd[1635]: input_userauth_request: invalid user dm [preauth] Dec 31 04:20:35 host sshd[1635]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:20:35 host sshd[1635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.240.88.142 Dec 31 04:20:37 host sshd[1635]: Failed password for invalid user dm from 45.240.88.142 port 60110 ssh2 Dec 31 04:20:55 host sshd[1803]: Invalid user wx from 102.134.140.130 port 38600 Dec 31 04:20:55 host sshd[1803]: input_userauth_request: invalid user wx [preauth] Dec 31 04:20:55 host sshd[1803]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:20:55 host sshd[1803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.134.140.130 Dec 31 04:20:56 host sshd[1803]: Failed password for invalid user wx from 102.134.140.130 port 38600 ssh2 Dec 31 04:20:57 host sshd[1803]: Received disconnect from 102.134.140.130 port 38600:11: Bye Bye [preauth] Dec 31 04:20:57 host sshd[1803]: Disconnected from 102.134.140.130 port 38600 [preauth] Dec 31 04:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 04:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 04:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 04:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 04:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 04:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 04:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 04:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 04:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 04:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 31 04:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 04:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 04:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 31 04:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 04:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 04:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 31 04:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 04:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 04:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 31 04:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 04:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 04:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 31 04:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 04:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 04:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 31 04:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 04:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 04:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 31 04:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 04:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 04:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 31 04:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 04:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 31 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 04:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=ugotscom user-4=wwwresourcehunte user-5=keralaholi user-6=wwwrmswll user-7=wwwkaretakers user-8=cochintaxi user-9=a2zgroup user-10=dartsimp user-11=laundryboniface user-12=wwwevmhonda user-13=bonifacegroup user-14=wwwletsstalkfood user-15=straightcurve user-16=phmetals user-17=kottayamcalldriv user-18=palco123 user-19=gifterman user-20=mrsclean user-21=wwwnexidigital user-22=disposeat user-23=wwwkmaorg user-24=remysagr user-25=woodpeck user-26=wwwkapin user-27=shalinijames user-28=wwwtestugo user-29=vfmassets user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 31 04:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 31 04:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 04:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 04:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 04:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 04:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 04:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PMkiMNHyhLxwHTOS.~ Dec 31 04:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 04:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 04:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PMkiMNHyhLxwHTOS.~' Dec 31 04:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 04:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 04:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PMkiMNHyhLxwHTOS.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 04:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 04:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 04:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 31 04:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 04:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 04:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 31 04:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 04:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 04:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 04:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 04:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 04:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 04:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 04:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 04:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 31 04:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 04:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 04:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 04:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 04:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 31 04:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 31 04:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 31 04:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 31 04:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 04:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 31 04:22:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 04:22:05 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 04:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 31 04:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 04:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 04:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 31 04:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 04:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 04:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 31 04:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 04:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 04:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 31 04:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 04:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 04:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 31 04:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 04:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 04:25:35 host sshd[2675]: Invalid user user from 103.13.40.2 port 51098 Dec 31 04:25:35 host sshd[2675]: input_userauth_request: invalid user user [preauth] Dec 31 04:25:35 host sshd[2675]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:25:35 host sshd[2675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 31 04:25:37 host sshd[2675]: Failed password for invalid user user from 103.13.40.2 port 51098 ssh2 Dec 31 04:25:37 host sshd[2675]: Connection closed by 103.13.40.2 port 51098 [preauth] Dec 31 04:36:47 host sshd[4575]: Invalid user user from 162.218.126.136 port 52520 Dec 31 04:36:47 host sshd[4575]: input_userauth_request: invalid user user [preauth] Dec 31 04:36:47 host sshd[4575]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:36:47 host sshd[4575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 31 04:36:49 host sshd[4575]: Failed password for invalid user user from 162.218.126.136 port 52520 ssh2 Dec 31 04:36:49 host sshd[4575]: Connection closed by 162.218.126.136 port 52520 [preauth] Dec 31 04:42:48 host sshd[5689]: User root from 61.102.42.5 not allowed because not listed in AllowUsers Dec 31 04:42:48 host sshd[5689]: input_userauth_request: invalid user root [preauth] Dec 31 04:42:48 host unix_chkpwd[5691]: password check failed for user (root) Dec 31 04:42:48 host sshd[5689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.102.42.5 user=root Dec 31 04:42:48 host sshd[5689]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 04:42:50 host sshd[5689]: Failed password for invalid user root from 61.102.42.5 port 39741 ssh2 Dec 31 04:42:50 host sshd[5689]: Received disconnect from 61.102.42.5 port 39741:11: Bye Bye [preauth] Dec 31 04:42:50 host sshd[5689]: Disconnected from 61.102.42.5 port 39741 [preauth] Dec 31 04:43:46 host sshd[5846]: User root from 45.119.9.158 not allowed because not listed in AllowUsers Dec 31 04:43:46 host sshd[5846]: input_userauth_request: invalid user root [preauth] Dec 31 04:43:46 host unix_chkpwd[5848]: password check failed for user (root) Dec 31 04:43:46 host sshd[5846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.9.158 user=root Dec 31 04:43:46 host sshd[5846]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 04:43:48 host sshd[5846]: Failed password for invalid user root from 45.119.9.158 port 51442 ssh2 Dec 31 04:43:48 host sshd[5846]: Received disconnect from 45.119.9.158 port 51442:11: Bye Bye [preauth] Dec 31 04:43:48 host sshd[5846]: Disconnected from 45.119.9.158 port 51442 [preauth] Dec 31 04:45:14 host sshd[6045]: Invalid user pi from 58.34.189.28 port 33255 Dec 31 04:45:14 host sshd[6045]: input_userauth_request: invalid user pi [preauth] Dec 31 04:45:14 host sshd[6046]: Invalid user pi from 58.34.189.28 port 33257 Dec 31 04:45:14 host sshd[6046]: input_userauth_request: invalid user pi [preauth] Dec 31 04:45:14 host sshd[6045]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:45:14 host sshd[6045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.34.189.28 Dec 31 04:45:14 host sshd[6046]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:45:14 host sshd[6046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.34.189.28 Dec 31 04:45:17 host sshd[6045]: Failed password for invalid user pi from 58.34.189.28 port 33255 ssh2 Dec 31 04:45:17 host sshd[6046]: Failed password for invalid user pi from 58.34.189.28 port 33257 ssh2 Dec 31 04:45:17 host sshd[6045]: Connection closed by 58.34.189.28 port 33255 [preauth] Dec 31 04:45:17 host sshd[6046]: Connection closed by 58.34.189.28 port 33257 [preauth] Dec 31 04:46:07 host sshd[6193]: User root from 45.119.9.158 not allowed because not listed in AllowUsers Dec 31 04:46:07 host sshd[6193]: input_userauth_request: invalid user root [preauth] Dec 31 04:46:07 host unix_chkpwd[6195]: password check failed for user (root) Dec 31 04:46:07 host sshd[6193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.9.158 user=root Dec 31 04:46:07 host sshd[6193]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 04:46:09 host sshd[6193]: Failed password for invalid user root from 45.119.9.158 port 60454 ssh2 Dec 31 04:47:24 host sshd[6522]: Invalid user evangeline from 61.102.42.5 port 36702 Dec 31 04:47:24 host sshd[6522]: input_userauth_request: invalid user evangeline [preauth] Dec 31 04:47:24 host sshd[6522]: pam_unix(sshd:auth): check pass; user unknown Dec 31 04:47:24 host sshd[6522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.102.42.5 Dec 31 04:47:26 host sshd[6522]: Failed password for invalid user evangeline from 61.102.42.5 port 36702 ssh2 Dec 31 04:47:26 host sshd[6522]: Received disconnect from 61.102.42.5 port 36702:11: Bye Bye [preauth] Dec 31 04:47:26 host sshd[6522]: Disconnected from 61.102.42.5 port 36702 [preauth] Dec 31 05:18:28 host sshd[11362]: Invalid user webapp from 106.10.122.53 port 48862 Dec 31 05:18:28 host sshd[11362]: input_userauth_request: invalid user webapp [preauth] Dec 31 05:18:28 host sshd[11362]: pam_unix(sshd:auth): check pass; user unknown Dec 31 05:18:28 host sshd[11362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 31 05:18:30 host sshd[11362]: Failed password for invalid user webapp from 106.10.122.53 port 48862 ssh2 Dec 31 05:18:30 host sshd[11362]: Connection closed by 106.10.122.53 port 48862 [preauth] Dec 31 05:19:38 host sshd[11537]: User root from 103.138.176.138 not allowed because not listed in AllowUsers Dec 31 05:19:38 host sshd[11537]: input_userauth_request: invalid user root [preauth] Dec 31 05:19:39 host unix_chkpwd[11540]: password check failed for user (root) Dec 31 05:19:39 host sshd[11537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.138.176.138 user=root Dec 31 05:19:39 host sshd[11537]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 05:19:40 host sshd[11537]: Failed password for invalid user root from 103.138.176.138 port 9733 ssh2 Dec 31 05:19:40 host sshd[11537]: Connection closed by 103.138.176.138 port 9733 [preauth] Dec 31 05:19:41 host sshd[11544]: User root from 103.138.176.138 not allowed because not listed in AllowUsers Dec 31 05:19:41 host sshd[11544]: input_userauth_request: invalid user root [preauth] Dec 31 05:19:42 host unix_chkpwd[11547]: password check failed for user (root) Dec 31 05:19:42 host sshd[11544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.138.176.138 user=root Dec 31 05:19:42 host sshd[11544]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 05:19:44 host sshd[11544]: Failed password for invalid user root from 103.138.176.138 port 65226 ssh2 Dec 31 05:19:44 host sshd[11544]: Connection closed by 103.138.176.138 port 65226 [preauth] Dec 31 05:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 05:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 05:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 05:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 31 05:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 31 05:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 31 05:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 31 05:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 31 05:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 31 05:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 31 05:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 31 05:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 31 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=dartsimp user-4=a2zgroup user-5=laundryboniface user-6=wwwpmcresource user-7=travelboniface user-8=wwwrmswll user-9=keralaholi user-10=wwwresourcehunte user-11=ugotscom user-12=wwwkmaorg user-13=disposeat user-14=remysagr user-15=woodpeck user-16=wwwkapin user-17=vfmassets user-18=wwwtestugo user-19=shalinijames user-20=pmcresources user-21=bonifacegroup user-22=wwwevmhonda user-23=wwwletsstalkfood user-24=straightcurve user-25=gifterman user-26=palco123 user-27=kottayamcalldriv user-28=phmetals user-29=wwwnexidigital user-30=mrsclean feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 31 05:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 31 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 31 05:21:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 05:21:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=evmhonda.com --output=json Dec 31 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/test -e /home/wwwevmhonda/wordpress-backups Dec 31 05:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 31 05:21:49 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 31 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && find -H /home/wwwevmhonda/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 31 05:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 31 05:21:49 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 31 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=letsstalkfood.com --output=json Dec 31 05:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/wordpress-backups Dec 31 05:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 05:21:49 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 05:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && find -H /home/wwwletsstalkfood/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 31 05:21:49 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=mrsclean.co.in --output=json Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 31 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 31 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 31 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 31 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=shalinijames.com --output=json Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/wordpress-backups Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && find -H /home/shalinijames/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=testugo.in --output=json Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=ugotechnologies.com --output=json Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 05:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 05:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=woodpeckerindia.com --output=json Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/wordpress-backups Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 31 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && find -H /home/woodpeck/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 31 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=panlys.com --output=json Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/wordpress-backups Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 31 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && find -H /home/palco123/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 31 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=resourcehunters.com --output=json Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/wordpress-backups Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 31 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && find -H /home/wwwresourcehunte/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 31 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /var/cpanel/licenseid_credentials.json Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkaretakers ; COMMAND=/bin/cat /home/wwwkaretakers/.wp-toolkit-identifier Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwkaretakers by (uid=0) Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session closed for user wwwkaretakers Dec 31 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=cochintaxi ; COMMAND=/bin/cat /home/cochintaxi/.wp-toolkit-identifier Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session opened for user cochintaxi by (uid=0) Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session closed for user cochintaxi Dec 31 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=dartsimp ; COMMAND=/bin/cat /home/dartsimp/.wp-toolkit-identifier Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session opened for user dartsimp by (uid=0) Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session closed for user dartsimp Dec 31 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=a2zgroup ; COMMAND=/bin/cat /home/a2zgroup/.wp-toolkit-identifier Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session opened for user a2zgroup by (uid=0) Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session closed for user a2zgroup Dec 31 05:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=laundryboniface ; COMMAND=/bin/cat /home/laundryboniface/.wp-toolkit-identifier Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session opened for user laundryboniface by (uid=0) Dec 31 05:21:51 host sudo: pam_unix(sudo:session): session closed for user laundryboniface Dec 31 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwpmcresource ; COMMAND=/bin/cat /home/wwwpmcresource/.wp-toolkit-identifier Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwpmcresource by (uid=0) Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwpmcresource Dec 31 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=travelboniface ; COMMAND=/bin/cat /home/travelboniface/.wp-toolkit-identifier Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session opened for user travelboniface by (uid=0) Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session closed for user travelboniface Dec 31 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwrmswll ; COMMAND=/bin/cat /home/wwwrmswll/.wp-toolkit-identifier Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwrmswll by (uid=0) Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwrmswll Dec 31 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 31 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 31 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-BkbYjUWDRVRVhAMC.wp-toolkit-identifier Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 31 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-BkbYjUWDRVRVhAMC.wp-toolkit-identifier Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 31 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/cat /home/wwwresourcehunte/.wp-toolkit-identifier Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Dec 31 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkmaorg ; COMMAND=/bin/cat /home/wwwkmaorg/.wp-toolkit-identifier Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwkmaorg by (uid=0) Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwkmaorg Dec 31 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=disposeat ; COMMAND=/bin/cat /home/disposeat/.wp-toolkit-identifier Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session opened for user disposeat by (uid=0) Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session closed for user disposeat Dec 31 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=remysagr ; COMMAND=/bin/cat /home/remysagr/.wp-toolkit-identifier Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session opened for user remysagr by (uid=0) Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session closed for user remysagr Dec 31 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/cat /home/woodpeck/.wp-toolkit-identifier Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session closed for user woodpeck Dec 31 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkapin ; COMMAND=/bin/cat /home/wwwkapin/.wp-toolkit-identifier Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwkapin by (uid=0) Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwkapin Dec 31 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=vfmassets ; COMMAND=/bin/cat /home/vfmassets/.wp-toolkit-identifier Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session opened for user vfmassets by (uid=0) Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session closed for user vfmassets Dec 31 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/cat /home/wwwtestugo/.wp-toolkit-identifier Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/cat /home/shalinijames/.wp-toolkit-identifier Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=pmcresources ; COMMAND=/bin/cat /home/pmcresources/.wp-toolkit-identifier Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session opened for user pmcresources by (uid=0) Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session closed for user pmcresources Dec 31 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=bonifacegroup ; COMMAND=/bin/cat /home/bonifacegroup/.wp-toolkit-identifier Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session opened for user bonifacegroup by (uid=0) Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session closed for user bonifacegroup Dec 31 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/cat /home/wwwevmhonda/.wp-toolkit-identifier Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 31 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/cat /home/wwwletsstalkfood/.wp-toolkit-identifier Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=straightcurve ; COMMAND=/bin/cat /home/straightcurve/.wp-toolkit-identifier Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session opened for user straightcurve by (uid=0) Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session closed for user straightcurve Dec 31 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=gifterman ; COMMAND=/bin/cat /home/gifterman/.wp-toolkit-identifier Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session opened for user gifterman by (uid=0) Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session closed for user gifterman Dec 31 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/cat /home/palco123/.wp-toolkit-identifier Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Dec 31 05:21:52 host sudo: pam_unix(sudo:session): session closed for user palco123 Dec 31 05:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=kottayamcalldriv ; COMMAND=/bin/cat /home/kottayamcalldriv/.wp-toolkit-identifier Dec 31 05:21:53 host sudo: pam_unix(sudo:session): session opened for user kottayamcalldriv by (uid=0) Dec 31 05:21:53 host sudo: pam_unix(sudo:session): session closed for user kottayamcalldriv Dec 31 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=phmetals ; COMMAND=/bin/cat /home/phmetals/.wp-toolkit-identifier Dec 31 05:21:53 host sudo: pam_unix(sudo:session): session opened for user phmetals by (uid=0) Dec 31 05:21:53 host sudo: pam_unix(sudo:session): session closed for user phmetals Dec 31 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwnexidigital ; COMMAND=/bin/cat /home/wwwnexidigital/.wp-toolkit-identifier Dec 31 05:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwnexidigital by (uid=0) Dec 31 05:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwnexidigital Dec 31 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/.wp-toolkit-identifier Dec 31 05:21:53 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Dec 31 05:21:53 host sudo: pam_unix(sudo:session): session closed for user mrsclean Dec 31 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Dec 31 05:21:53 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 31 05:21:53 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 31 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Dec 31 05:21:53 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 31 05:21:53 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 31 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-XLTRG4okSrG5Ibz6.wp-toolkit-identifier Dec 31 05:21:53 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 31 05:21:53 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 31 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-XLTRG4okSrG5Ibz6.wp-toolkit-identifier Dec 31 05:21:53 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Dec 31 05:21:53 host sudo: pam_unix(sudo:session): session closed for user keralaholi Dec 31 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_shared_ip --output=json Dec 31 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_public_ip ip=167.71.234.10 --output=json Dec 31 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ZI20GeG0t5pg8fjt.~ Dec 31 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ZI20GeG0t5pg8fjt.~' Dec 31 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ZI20GeG0t5pg8fjt.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 31 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 31 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 31 05:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 31 05:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 31 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 31 05:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 05:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 31 05:22:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 05:22:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 31 05:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 05:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 31 05:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 05:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 31 05:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 05:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 05:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 31 05:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 05:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 05:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 31 05:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 05:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 05:25:07 host sshd[13125]: Invalid user fk from 45.93.201.90 port 59522 Dec 31 05:25:07 host sshd[13125]: input_userauth_request: invalid user fk [preauth] Dec 31 05:25:07 host sshd[13125]: pam_unix(sshd:auth): check pass; user unknown Dec 31 05:25:07 host sshd[13125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 31 05:25:09 host sshd[13125]: Failed password for invalid user fk from 45.93.201.90 port 59522 ssh2 Dec 31 05:25:12 host sshd[13125]: pam_unix(sshd:auth): check pass; user unknown Dec 31 05:25:14 host sshd[13125]: Failed password for invalid user fk from 45.93.201.90 port 59522 ssh2 Dec 31 05:25:17 host sshd[13125]: pam_unix(sshd:auth): check pass; user unknown Dec 31 05:25:19 host sshd[13125]: Failed password for invalid user fk from 45.93.201.90 port 59522 ssh2 Dec 31 05:25:22 host sshd[13125]: Connection closed by 45.93.201.90 port 59522 [preauth] Dec 31 05:25:22 host sshd[13125]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 31 05:33:19 host sshd[14260]: Invalid user ta from 46.101.5.100 port 38900 Dec 31 05:33:19 host sshd[14260]: input_userauth_request: invalid user ta [preauth] Dec 31 05:33:20 host sshd[14260]: pam_unix(sshd:auth): check pass; user unknown Dec 31 05:33:20 host sshd[14260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.5.100 Dec 31 05:33:21 host sshd[14260]: Failed password for invalid user ta from 46.101.5.100 port 38900 ssh2 Dec 31 05:33:21 host sshd[14260]: Received disconnect from 46.101.5.100 port 38900:11: Bye Bye [preauth] Dec 31 05:33:21 host sshd[14260]: Disconnected from 46.101.5.100 port 38900 [preauth] Dec 31 05:33:35 host sshd[14388]: Invalid user user1 from 41.197.31.178 port 35240 Dec 31 05:33:35 host sshd[14388]: input_userauth_request: invalid user user1 [preauth] Dec 31 05:33:35 host sshd[14388]: pam_unix(sshd:auth): check pass; user unknown Dec 31 05:33:35 host sshd[14388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 31 05:33:38 host sshd[14388]: Failed password for invalid user user1 from 41.197.31.178 port 35240 ssh2 Dec 31 05:33:38 host sshd[14388]: Connection closed by 41.197.31.178 port 35240 [preauth] Dec 31 05:34:29 host sshd[14484]: Invalid user ex from 190.145.25.163 port 47480 Dec 31 05:34:29 host sshd[14484]: input_userauth_request: invalid user ex [preauth] Dec 31 05:34:29 host sshd[14484]: pam_unix(sshd:auth): check pass; user unknown Dec 31 05:34:29 host sshd[14484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.25.163 Dec 31 05:34:31 host sshd[14484]: Failed password for invalid user ex from 190.145.25.163 port 47480 ssh2 Dec 31 05:34:31 host sshd[14484]: Received disconnect from 190.145.25.163 port 47480:11: Bye Bye [preauth] Dec 31 05:34:31 host sshd[14484]: Disconnected from 190.145.25.163 port 47480 [preauth] Dec 31 05:36:21 host sshd[14769]: Did not receive identification string from 154.89.5.104 port 57268 Dec 31 05:36:36 host sshd[14773]: Connection closed by 154.89.5.104 port 57324 [preauth] Dec 31 05:37:41 host sshd[14956]: Invalid user et from 46.101.5.100 port 56158 Dec 31 05:37:41 host sshd[14956]: input_userauth_request: invalid user et [preauth] Dec 31 05:37:41 host sshd[14956]: pam_unix(sshd:auth): check pass; user unknown Dec 31 05:37:41 host sshd[14956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.5.100 Dec 31 05:37:43 host sshd[14956]: Failed password for invalid user et from 46.101.5.100 port 56158 ssh2 Dec 31 05:37:44 host sshd[14956]: Received disconnect from 46.101.5.100 port 56158:11: Bye Bye [preauth] Dec 31 05:37:44 host sshd[14956]: Disconnected from 46.101.5.100 port 56158 [preauth] Dec 31 05:38:42 host sshd[15192]: Invalid user ma from 190.145.25.163 port 38941 Dec 31 05:38:42 host sshd[15192]: input_userauth_request: invalid user ma [preauth] Dec 31 05:38:42 host sshd[15192]: pam_unix(sshd:auth): check pass; user unknown Dec 31 05:38:42 host sshd[15192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.25.163 Dec 31 05:38:44 host sshd[15192]: Failed password for invalid user ma from 190.145.25.163 port 38941 ssh2 Dec 31 05:38:44 host sshd[15192]: Received disconnect from 190.145.25.163 port 38941:11: Bye Bye [preauth] Dec 31 05:38:44 host sshd[15192]: Disconnected from 190.145.25.163 port 38941 [preauth] Dec 31 05:38:47 host sshd[15208]: Invalid user ol from 46.101.5.100 port 51554 Dec 31 05:38:47 host sshd[15208]: input_userauth_request: invalid user ol [preauth] Dec 31 05:38:47 host sshd[15208]: pam_unix(sshd:auth): check pass; user unknown Dec 31 05:38:47 host sshd[15208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.5.100 Dec 31 05:38:50 host sshd[15208]: Failed password for invalid user ol from 46.101.5.100 port 51554 ssh2 Dec 31 05:38:50 host sshd[15208]: Received disconnect from 46.101.5.100 port 51554:11: Bye Bye [preauth] Dec 31 05:38:50 host sshd[15208]: Disconnected from 46.101.5.100 port 51554 [preauth] Dec 31 05:40:05 host sshd[15403]: Invalid user kj from 190.145.25.163 port 10936 Dec 31 05:40:05 host sshd[15403]: input_userauth_request: invalid user kj [preauth] Dec 31 05:40:05 host sshd[15403]: pam_unix(sshd:auth): check pass; user unknown Dec 31 05:40:05 host sshd[15403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.25.163 Dec 31 05:40:07 host sshd[15403]: Failed password for invalid user kj from 190.145.25.163 port 10936 ssh2 Dec 31 05:40:07 host sshd[15403]: Received disconnect from 190.145.25.163 port 10936:11: Bye Bye [preauth] Dec 31 05:40:07 host sshd[15403]: Disconnected from 190.145.25.163 port 10936 [preauth] Dec 31 05:46:34 host sshd[16436]: Invalid user lsy from 92.46.108.20 port 54720 Dec 31 05:46:34 host sshd[16436]: input_userauth_request: invalid user lsy [preauth] Dec 31 05:46:35 host sshd[16436]: pam_unix(sshd:auth): check pass; user unknown Dec 31 05:46:35 host sshd[16436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 31 05:46:37 host sshd[16436]: Failed password for invalid user lsy from 92.46.108.20 port 54720 ssh2 Dec 31 05:46:37 host sshd[16436]: Connection closed by 92.46.108.20 port 54720 [preauth] Dec 31 05:46:48 host sshd[16452]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Dec 31 05:46:48 host sshd[16452]: input_userauth_request: invalid user root [preauth] Dec 31 05:46:49 host unix_chkpwd[16455]: password check failed for user (root) Dec 31 05:46:49 host sshd[16452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Dec 31 05:46:49 host sshd[16452]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 05:46:51 host sshd[16452]: Failed password for invalid user root from 162.218.126.136 port 45882 ssh2 Dec 31 05:46:51 host sshd[16452]: Connection closed by 162.218.126.136 port 45882 [preauth] Dec 31 05:49:37 host sshd[16835]: Invalid user user from 103.13.40.2 port 41924 Dec 31 05:49:37 host sshd[16835]: input_userauth_request: invalid user user [preauth] Dec 31 05:49:37 host sshd[16835]: pam_unix(sshd:auth): check pass; user unknown Dec 31 05:49:37 host sshd[16835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 31 05:49:39 host sshd[16835]: Failed password for invalid user user from 103.13.40.2 port 41924 ssh2 Dec 31 05:49:39 host sshd[16835]: Connection closed by 103.13.40.2 port 41924 [preauth] Dec 31 05:55:41 host sshd[17798]: Did not receive identification string from 120.132.122.54 port 23944 Dec 31 05:55:43 host sshd[17799]: Invalid user elastic from 120.132.122.54 port 35211 Dec 31 05:55:43 host sshd[17799]: input_userauth_request: invalid user elastic [preauth] Dec 31 05:55:43 host sshd[17802]: Invalid user git from 120.132.122.54 port 35203 Dec 31 05:55:43 host sshd[17802]: input_userauth_request: invalid user git [preauth] Dec 31 05:55:43 host sshd[17804]: Invalid user guest from 120.132.122.54 port 35155 Dec 31 05:55:43 host sshd[17804]: input_userauth_request: invalid user guest [preauth] Dec 31 05:55:43 host sshd[17811]: Invalid user steam from 120.132.122.54 port 35136 Dec 31 05:55:43 host sshd[17811]: input_userauth_request: invalid user steam [preauth] Dec 31 05:55:43 host sshd[17814]: Invalid user a from 120.132.122.54 port 35140 Dec 31 05:55:43 host sshd[17814]: input_userauth_request: invalid user a [preauth] Dec 31 05:55:43 host sshd[17821]: Invalid user bot from 120.132.122.54 port 35146 Dec 31 05:55:43 host sshd[17821]: input_userauth_request: invalid user bot [preauth] Dec 31 05:55:44 host sshd[17799]: pam_unix(sshd:auth): check pass; user unknown Dec 31 05:55:44 host sshd[17799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.122.54 Dec 31 05:55:44 host sshd[17802]: pam_unix(sshd:auth): check pass; user unknown Dec 31 05:55:44 host sshd[17802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.122.54 Dec 31 05:55:44 host sshd[17804]: pam_unix(sshd:auth): check pass; user unknown Dec 31 05:55:44 host sshd[17804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.122.54 Dec 31 05:55:44 host sshd[17811]: pam_unix(sshd:auth): check pass; user unknown Dec 31 05:55:44 host sshd[17811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.122.54 Dec 31 05:55:44 host sshd[17821]: pam_unix(sshd:auth): check pass; user unknown Dec 31 05:55:44 host sshd[17821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.122.54 Dec 31 05:55:44 host sshd[17800]: Invalid user deploy from 120.132.122.54 port 35148 Dec 31 05:55:44 host sshd[17800]: input_userauth_request: invalid user deploy [preauth] Dec 31 05:55:44 host sshd[17801]: Invalid user oracle from 120.132.122.54 port 35144 Dec 31 05:55:44 host sshd[17801]: input_userauth_request: invalid user oracle [preauth] Dec 31 05:55:44 host sshd[17803]: User ftp from 120.132.122.54 not allowed because not listed in AllowUsers Dec 31 05:55:44 host sshd[17803]: input_userauth_request: invalid user ftp [preauth] Dec 31 05:55:44 host sshd[17813]: Invalid user ec2-user from 120.132.122.54 port 35134 Dec 31 05:55:44 host sshd[17813]: input_userauth_request: invalid user ec2-user [preauth] Dec 31 05:55:44 host sshd[17806]: Invalid user devops from 120.132.122.54 port 35192 Dec 31 05:55:44 host sshd[17806]: input_userauth_request: invalid user devops [preauth] Dec 31 05:55:44 host sshd[17809]: Invalid user elastic from 120.132.122.54 port 35142 Dec 31 05:55:44 host sshd[17809]: input_userauth_request: invalid user elastic [preauth] Dec 31 05:55:45 host sshd[17800]: pam_unix(sshd:auth): check pass; user unknown Dec 31 05:55:45 host sshd[17800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.122.54 Dec 31 05:55:45 host sshd[17801]: pam_unix(sshd:auth): check pass; user unknown Dec 31 05:55:45 host sshd[17801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.122.54 Dec 31 05:55:45 host unix_chkpwd[17827]: password check failed for user (ftp) Dec 31 05:55:45 host sshd[17803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.122.54 user=ftp Dec 31 05:55:45 host sshd[17803]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Dec 31 05:55:45 host sshd[17813]: pam_unix(sshd:auth): check pass; user unknown Dec 31 05:55:45 host sshd[17813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.122.54 Dec 31 05:55:45 host sshd[17806]: pam_unix(sshd:auth): check pass; user unknown Dec 31 05:55:45 host sshd[17806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.122.54 Dec 31 05:55:45 host sshd[17809]: pam_unix(sshd:auth): check pass; user unknown Dec 31 05:55:45 host sshd[17809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.122.54 Dec 31 05:55:46 host sshd[17799]: Failed password for invalid user elastic from 120.132.122.54 port 35211 ssh2 Dec 31 05:55:46 host sshd[17802]: Failed password for invalid user git from 120.132.122.54 port 35203 ssh2 Dec 31 05:55:46 host sshd[17804]: Failed password for invalid user guest from 120.132.122.54 port 35155 ssh2 Dec 31 05:55:46 host sshd[17811]: Failed password for invalid user steam from 120.132.122.54 port 35136 ssh2 Dec 31 05:55:46 host sshd[17821]: Failed password for invalid user bot from 120.132.122.54 port 35146 ssh2 Dec 31 05:55:47 host sshd[17800]: Failed password for invalid user deploy from 120.132.122.54 port 35148 ssh2 Dec 31 05:55:47 host sshd[17801]: Failed password for invalid user oracle from 120.132.122.54 port 35144 ssh2 Dec 31 05:55:47 host sshd[17803]: Failed password for invalid user ftp from 120.132.122.54 port 35187 ssh2 Dec 31 05:55:47 host sshd[17813]: Failed password for invalid user ec2-user from 120.132.122.54 port 35134 ssh2 Dec 31 05:55:47 host sshd[17806]: Failed password for invalid user devops from 120.132.122.54 port 35192 ssh2 Dec 31 05:55:47 host sshd[17809]: Failed password for invalid user elastic from 120.132.122.54 port 35142 ssh2 Dec 31 06:06:17 host sshd[19616]: Invalid user tt from 102.244.212.46 port 33344 Dec 31 06:06:17 host sshd[19616]: input_userauth_request: invalid user tt [preauth] Dec 31 06:06:17 host sshd[19616]: pam_unix(sshd:auth): check pass; user unknown Dec 31 06:06:17 host sshd[19616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.244.212.46 Dec 31 06:06:19 host sshd[19616]: Failed password for invalid user tt from 102.244.212.46 port 33344 ssh2 Dec 31 06:06:19 host sshd[19616]: Received disconnect from 102.244.212.46 port 33344:11: Bye Bye [preauth] Dec 31 06:06:19 host sshd[19616]: Disconnected from 102.244.212.46 port 33344 [preauth] Dec 31 06:08:10 host sshd[19844]: Invalid user ez from 72.165.240.194 port 46882 Dec 31 06:08:10 host sshd[19844]: input_userauth_request: invalid user ez [preauth] Dec 31 06:08:10 host sshd[19844]: pam_unix(sshd:auth): check pass; user unknown Dec 31 06:08:10 host sshd[19844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.165.240.194 Dec 31 06:08:12 host sshd[19844]: Failed password for invalid user ez from 72.165.240.194 port 46882 ssh2 Dec 31 06:08:12 host sshd[19844]: Received disconnect from 72.165.240.194 port 46882:11: Bye Bye [preauth] Dec 31 06:08:12 host sshd[19844]: Disconnected from 72.165.240.194 port 46882 [preauth] Dec 31 06:11:00 host sshd[20334]: Invalid user lj from 72.165.240.194 port 47744 Dec 31 06:11:00 host sshd[20334]: input_userauth_request: invalid user lj [preauth] Dec 31 06:11:00 host sshd[20334]: pam_unix(sshd:auth): check pass; user unknown Dec 31 06:11:00 host sshd[20334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.165.240.194 Dec 31 06:11:02 host sshd[20334]: Failed password for invalid user lj from 72.165.240.194 port 47744 ssh2 Dec 31 06:11:02 host sshd[20334]: Received disconnect from 72.165.240.194 port 47744:11: Bye Bye [preauth] Dec 31 06:11:02 host sshd[20334]: Disconnected from 72.165.240.194 port 47744 [preauth] Dec 31 06:12:23 host sshd[20510]: Invalid user wy from 102.244.212.46 port 54870 Dec 31 06:12:23 host sshd[20510]: input_userauth_request: invalid user wy [preauth] Dec 31 06:12:23 host sshd[20510]: pam_unix(sshd:auth): check pass; user unknown Dec 31 06:12:23 host sshd[20510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.244.212.46 Dec 31 06:12:25 host sshd[20510]: Failed password for invalid user wy from 102.244.212.46 port 54870 ssh2 Dec 31 06:12:25 host sshd[20510]: Received disconnect from 102.244.212.46 port 54870:11: Bye Bye [preauth] Dec 31 06:12:25 host sshd[20510]: Disconnected from 102.244.212.46 port 54870 [preauth] Dec 31 06:14:46 host sshd[20850]: Invalid user jb from 72.165.240.194 port 37660 Dec 31 06:14:46 host sshd[20850]: input_userauth_request: invalid user jb [preauth] Dec 31 06:14:46 host sshd[20850]: pam_unix(sshd:auth): check pass; user unknown Dec 31 06:14:46 host sshd[20850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.165.240.194 Dec 31 06:14:47 host sshd[20850]: Failed password for invalid user jb from 72.165.240.194 port 37660 ssh2 Dec 31 06:14:47 host sshd[20850]: Received disconnect from 72.165.240.194 port 37660:11: Bye Bye [preauth] Dec 31 06:14:47 host sshd[20850]: Disconnected from 72.165.240.194 port 37660 [preauth] Dec 31 06:14:54 host sshd[20890]: Invalid user tx from 102.244.212.46 port 53186 Dec 31 06:14:54 host sshd[20890]: input_userauth_request: invalid user tx [preauth] Dec 31 06:14:54 host sshd[20890]: pam_unix(sshd:auth): check pass; user unknown Dec 31 06:14:54 host sshd[20890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.244.212.46 Dec 31 06:14:56 host sshd[20890]: Failed password for invalid user tx from 102.244.212.46 port 53186 ssh2 Dec 31 06:14:56 host sshd[20890]: Received disconnect from 102.244.212.46 port 53186:11: Bye Bye [preauth] Dec 31 06:14:56 host sshd[20890]: Disconnected from 102.244.212.46 port 53186 [preauth] Dec 31 06:17:00 host sshd[21299]: Did not receive identification string from 172.105.128.11 port 49826 Dec 31 06:17:02 host sshd[21301]: Did not receive identification string from 172.105.128.11 port 47308 Dec 31 06:17:03 host sshd[21315]: Did not receive identification string from 172.105.128.11 port 47310 Dec 31 06:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 06:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 06:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 06:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 06:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 06:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 06:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 06:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 06:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 06:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 31 06:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 06:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 06:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 31 06:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 06:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 06:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 31 06:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 06:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 06:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 31 06:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 06:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 06:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 31 06:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 06:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 31 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 31 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 06:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 31 06:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 06:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 06:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 06:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 06:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 06:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 31 06:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 06:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 06:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=ugotscom user-2=wwwrmswll user-3=wwwresourcehunte user-4=keralaholi user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=dartsimp user-9=a2zgroup user-10=wwwkaretakers user-11=cochintaxi user-12=mrsclean user-13=wwwnexidigital user-14=kottayamcalldriv user-15=phmetals user-16=gifterman user-17=palco123 user-18=wwwletsstalkfood user-19=straightcurve user-20=wwwevmhonda user-21=bonifacegroup user-22=pmcresources user-23=wwwtestugo user-24=shalinijames user-25=vfmassets user-26=woodpeck user-27=wwwkapin user-28=wwwkmaorg user-29=disposeat user-30=remysagr feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 31 06:21:50 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 31 06:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 06:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 06:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 06:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 06:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 06:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-5DgKsc1whpdo2Jbl.~ Dec 31 06:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 06:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 06:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-5DgKsc1whpdo2Jbl.~' Dec 31 06:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 06:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 06:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-5DgKsc1whpdo2Jbl.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 06:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 06:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 06:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 31 06:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 06:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 06:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 31 06:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 06:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 06:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 31 06:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 06:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 06:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 06:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 31 06:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 31 06:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 31 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 31 06:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 06:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 31 06:21:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 06:21:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 31 06:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 06:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 06:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 31 06:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 06:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 06:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 31 06:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 06:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 06:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 31 06:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 06:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 06:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 31 06:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 06:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 06:43:10 host sshd[26132]: Invalid user kafka from 106.10.122.53 port 43032 Dec 31 06:43:10 host sshd[26132]: input_userauth_request: invalid user kafka [preauth] Dec 31 06:43:10 host sshd[26132]: pam_unix(sshd:auth): check pass; user unknown Dec 31 06:43:10 host sshd[26132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 31 06:43:12 host sshd[26132]: Failed password for invalid user kafka from 106.10.122.53 port 43032 ssh2 Dec 31 06:43:12 host sshd[26132]: Connection closed by 106.10.122.53 port 43032 [preauth] Dec 31 06:49:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 06:49:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 06:49:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 06:49:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 06:49:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 06:49:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 06:49:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 06:49:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 06:49:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 06:49:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 31 06:49:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 06:49:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 06:49:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 31 06:49:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 06:49:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 06:49:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 31 06:49:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 06:49:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 06:49:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 31 06:49:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 06:49:01 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 07:04:09 host sshd[29151]: Invalid user user1 from 162.218.126.136 port 43766 Dec 31 07:04:09 host sshd[29151]: input_userauth_request: invalid user user1 [preauth] Dec 31 07:04:09 host sshd[29151]: pam_unix(sshd:auth): check pass; user unknown Dec 31 07:04:09 host sshd[29151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 31 07:04:11 host sshd[29151]: Failed password for invalid user user1 from 162.218.126.136 port 43766 ssh2 Dec 31 07:04:11 host sshd[29151]: Connection closed by 162.218.126.136 port 43766 [preauth] Dec 31 07:07:39 host sshd[29589]: Invalid user steven from 209.141.56.48 port 37058 Dec 31 07:07:39 host sshd[29589]: input_userauth_request: invalid user steven [preauth] Dec 31 07:07:39 host sshd[29589]: pam_unix(sshd:auth): check pass; user unknown Dec 31 07:07:39 host sshd[29589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Dec 31 07:07:40 host sshd[29589]: Failed password for invalid user steven from 209.141.56.48 port 37058 ssh2 Dec 31 07:07:41 host sshd[29589]: Connection closed by 209.141.56.48 port 37058 [preauth] Dec 31 07:09:21 host sshd[29876]: Invalid user fl from 45.93.201.90 port 32990 Dec 31 07:09:21 host sshd[29876]: input_userauth_request: invalid user fl [preauth] Dec 31 07:09:21 host sshd[29876]: pam_unix(sshd:auth): check pass; user unknown Dec 31 07:09:21 host sshd[29876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 31 07:09:23 host sshd[29876]: Failed password for invalid user fl from 45.93.201.90 port 32990 ssh2 Dec 31 07:09:26 host sshd[29876]: pam_unix(sshd:auth): check pass; user unknown Dec 31 07:09:28 host sshd[29876]: Failed password for invalid user fl from 45.93.201.90 port 32990 ssh2 Dec 31 07:09:31 host sshd[29876]: pam_unix(sshd:auth): check pass; user unknown Dec 31 07:09:33 host sshd[29876]: Failed password for invalid user fl from 45.93.201.90 port 32990 ssh2 Dec 31 07:09:37 host sshd[29876]: Connection closed by 45.93.201.90 port 32990 [preauth] Dec 31 07:09:37 host sshd[29876]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 31 07:11:40 host sshd[30202]: Invalid user steven from 209.141.56.48 port 50616 Dec 31 07:11:40 host sshd[30202]: input_userauth_request: invalid user steven [preauth] Dec 31 07:11:40 host sshd[30202]: pam_unix(sshd:auth): check pass; user unknown Dec 31 07:11:40 host sshd[30202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Dec 31 07:11:42 host sshd[30202]: Failed password for invalid user steven from 209.141.56.48 port 50616 ssh2 Dec 31 07:11:42 host sshd[30202]: Connection closed by 209.141.56.48 port 50616 [preauth] Dec 31 07:13:33 host sshd[30589]: Invalid user user1 from 103.13.40.2 port 42784 Dec 31 07:13:33 host sshd[30589]: input_userauth_request: invalid user user1 [preauth] Dec 31 07:13:33 host sshd[30589]: pam_unix(sshd:auth): check pass; user unknown Dec 31 07:13:33 host sshd[30589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 31 07:13:34 host sshd[30589]: Failed password for invalid user user1 from 103.13.40.2 port 42784 ssh2 Dec 31 07:13:34 host sshd[30589]: Connection closed by 103.13.40.2 port 42784 [preauth] Dec 31 07:17:15 host sshd[31071]: Invalid user user1 from 41.197.31.178 port 60120 Dec 31 07:17:15 host sshd[31071]: input_userauth_request: invalid user user1 [preauth] Dec 31 07:17:15 host sshd[31071]: pam_unix(sshd:auth): check pass; user unknown Dec 31 07:17:15 host sshd[31071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 31 07:17:17 host sshd[31071]: Failed password for invalid user user1 from 41.197.31.178 port 60120 ssh2 Dec 31 07:17:17 host sshd[31071]: Connection closed by 41.197.31.178 port 60120 [preauth] Dec 31 07:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 07:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 07:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 07:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 07:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 07:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 07:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 07:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 07:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 07:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 31 07:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 07:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 07:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 31 07:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 07:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 07:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 31 07:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 07:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 07:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 31 07:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 07:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 07:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 31 07:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 07:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 07:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 31 07:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 07:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 07:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 31 07:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 07:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 07:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 31 07:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 07:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 31 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=shalinijames user-3=wwwtestugo user-4=vfmassets user-5=wwwkapin user-6=woodpeck user-7=remysagr user-8=disposeat user-9=wwwkmaorg user-10=mrsclean user-11=wwwnexidigital user-12=phmetals user-13=kottayamcalldriv user-14=palco123 user-15=gifterman user-16=wwwletsstalkfood user-17=straightcurve user-18=wwwevmhonda user-19=bonifacegroup user-20=laundryboniface user-21=a2zgroup user-22=dartsimp user-23=cochintaxi user-24=wwwkaretakers user-25=ugotscom user-26=wwwresourcehunte user-27=keralaholi user-28=wwwrmswll user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 31 07:21:50 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 31 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-MObIF28mcQvaKonq.~ Dec 31 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-MObIF28mcQvaKonq.~' Dec 31 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-MObIF28mcQvaKonq.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 07:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 31 07:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 07:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 07:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 31 07:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 07:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 07:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 07:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 07:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 07:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 07:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 07:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 07:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 31 07:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 07:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 31 07:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 31 07:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 31 07:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 31 07:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 07:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 07:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 31 07:21:59 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 07:22:00 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 31 07:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 07:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 07:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 31 07:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 07:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 07:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 31 07:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 07:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 07:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 31 07:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 07:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 07:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 31 07:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 07:22:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 07:41:40 host sshd[2258]: Invalid user steven from 209.141.56.48 port 55450 Dec 31 07:41:40 host sshd[2258]: input_userauth_request: invalid user steven [preauth] Dec 31 07:41:40 host sshd[2258]: pam_unix(sshd:auth): check pass; user unknown Dec 31 07:41:40 host sshd[2258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Dec 31 07:41:42 host sshd[2258]: Failed password for invalid user steven from 209.141.56.48 port 55450 ssh2 Dec 31 07:41:42 host sshd[2258]: Connection closed by 209.141.56.48 port 55450 [preauth] Dec 31 08:05:29 host sshd[5877]: Invalid user to from 190.144.51.254 port 58856 Dec 31 08:05:29 host sshd[5877]: input_userauth_request: invalid user to [preauth] Dec 31 08:05:29 host sshd[5877]: pam_unix(sshd:auth): check pass; user unknown Dec 31 08:05:29 host sshd[5877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.144.51.254 Dec 31 08:05:31 host sshd[5877]: Failed password for invalid user to from 190.144.51.254 port 58856 ssh2 Dec 31 08:05:31 host sshd[5877]: Received disconnect from 190.144.51.254 port 58856:11: Bye Bye [preauth] Dec 31 08:05:31 host sshd[5877]: Disconnected from 190.144.51.254 port 58856 [preauth] Dec 31 08:07:41 host sshd[6136]: Invalid user hadoop from 106.10.122.53 port 58318 Dec 31 08:07:41 host sshd[6136]: input_userauth_request: invalid user hadoop [preauth] Dec 31 08:07:41 host sshd[6136]: pam_unix(sshd:auth): check pass; user unknown Dec 31 08:07:41 host sshd[6136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 31 08:07:43 host sshd[6136]: Failed password for invalid user hadoop from 106.10.122.53 port 58318 ssh2 Dec 31 08:07:44 host sshd[6136]: Connection closed by 106.10.122.53 port 58318 [preauth] Dec 31 08:09:45 host sshd[6556]: Invalid user du from 43.163.223.190 port 42616 Dec 31 08:09:45 host sshd[6556]: input_userauth_request: invalid user du [preauth] Dec 31 08:09:45 host sshd[6556]: pam_unix(sshd:auth): check pass; user unknown Dec 31 08:09:45 host sshd[6556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.163.223.190 Dec 31 08:09:47 host sshd[6556]: Failed password for invalid user du from 43.163.223.190 port 42616 ssh2 Dec 31 08:09:47 host sshd[6556]: Received disconnect from 43.163.223.190 port 42616:11: Bye Bye [preauth] Dec 31 08:09:47 host sshd[6556]: Disconnected from 43.163.223.190 port 42616 [preauth] Dec 31 08:10:52 host sshd[6694]: Invalid user zv from 190.128.117.5 port 43512 Dec 31 08:10:52 host sshd[6694]: input_userauth_request: invalid user zv [preauth] Dec 31 08:10:52 host sshd[6694]: pam_unix(sshd:auth): check pass; user unknown Dec 31 08:10:52 host sshd[6694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.117.5 Dec 31 08:10:54 host sshd[6694]: Failed password for invalid user zv from 190.128.117.5 port 43512 ssh2 Dec 31 08:10:54 host sshd[6694]: Received disconnect from 190.128.117.5 port 43512:11: Bye Bye [preauth] Dec 31 08:10:54 host sshd[6694]: Disconnected from 190.128.117.5 port 43512 [preauth] Dec 31 08:11:40 host sshd[6780]: Invalid user dw from 43.163.223.190 port 45798 Dec 31 08:11:40 host sshd[6780]: input_userauth_request: invalid user dw [preauth] Dec 31 08:11:40 host sshd[6780]: pam_unix(sshd:auth): check pass; user unknown Dec 31 08:11:40 host sshd[6780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.163.223.190 Dec 31 08:11:41 host sshd[6780]: Failed password for invalid user dw from 43.163.223.190 port 45798 ssh2 Dec 31 08:11:41 host sshd[6780]: Received disconnect from 43.163.223.190 port 45798:11: Bye Bye [preauth] Dec 31 08:11:41 host sshd[6780]: Disconnected from 43.163.223.190 port 45798 [preauth] Dec 31 08:11:49 host sshd[6789]: Invalid user larry from 107.189.30.59 port 54764 Dec 31 08:11:49 host sshd[6789]: input_userauth_request: invalid user larry [preauth] Dec 31 08:11:49 host sshd[6789]: pam_unix(sshd:auth): check pass; user unknown Dec 31 08:11:49 host sshd[6789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Dec 31 08:11:52 host sshd[6789]: Failed password for invalid user larry from 107.189.30.59 port 54764 ssh2 Dec 31 08:11:52 host sshd[6789]: Connection closed by 107.189.30.59 port 54764 [preauth] Dec 31 08:12:22 host sshd[6842]: Invalid user yx from 190.128.117.5 port 41618 Dec 31 08:12:22 host sshd[6842]: input_userauth_request: invalid user yx [preauth] Dec 31 08:12:22 host sshd[6842]: pam_unix(sshd:auth): check pass; user unknown Dec 31 08:12:22 host sshd[6842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.117.5 Dec 31 08:12:23 host sshd[6842]: Failed password for invalid user yx from 190.128.117.5 port 41618 ssh2 Dec 31 08:12:24 host sshd[6842]: Received disconnect from 190.128.117.5 port 41618:11: Bye Bye [preauth] Dec 31 08:12:24 host sshd[6842]: Disconnected from 190.128.117.5 port 41618 [preauth] Dec 31 08:13:17 host sshd[6968]: Invalid user rl from 43.163.223.190 port 46746 Dec 31 08:13:17 host sshd[6968]: input_userauth_request: invalid user rl [preauth] Dec 31 08:13:17 host sshd[6968]: pam_unix(sshd:auth): check pass; user unknown Dec 31 08:13:17 host sshd[6968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.163.223.190 Dec 31 08:13:19 host sshd[6968]: Failed password for invalid user rl from 43.163.223.190 port 46746 ssh2 Dec 31 08:13:19 host sshd[6968]: Received disconnect from 43.163.223.190 port 46746:11: Bye Bye [preauth] Dec 31 08:13:19 host sshd[6968]: Disconnected from 43.163.223.190 port 46746 [preauth] Dec 31 08:13:51 host sshd[7100]: Invalid user cb from 190.128.117.5 port 37468 Dec 31 08:13:51 host sshd[7100]: input_userauth_request: invalid user cb [preauth] Dec 31 08:13:51 host sshd[7100]: pam_unix(sshd:auth): check pass; user unknown Dec 31 08:13:51 host sshd[7100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.117.5 Dec 31 08:13:54 host sshd[7100]: Failed password for invalid user cb from 190.128.117.5 port 37468 ssh2 Dec 31 08:13:54 host sshd[7100]: Received disconnect from 190.128.117.5 port 37468:11: Bye Bye [preauth] Dec 31 08:13:54 host sshd[7100]: Disconnected from 190.128.117.5 port 37468 [preauth] Dec 31 08:14:05 host sshd[7269]: Invalid user impala from 162.218.126.136 port 56606 Dec 31 08:14:05 host sshd[7269]: input_userauth_request: invalid user impala [preauth] Dec 31 08:14:05 host sshd[7269]: pam_unix(sshd:auth): check pass; user unknown Dec 31 08:14:05 host sshd[7269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 31 08:14:07 host sshd[7269]: Failed password for invalid user impala from 162.218.126.136 port 56606 ssh2 Dec 31 08:14:07 host sshd[7269]: Connection closed by 162.218.126.136 port 56606 [preauth] Dec 31 08:18:15 host sshd[7835]: Invalid user r00t from 92.46.108.20 port 44190 Dec 31 08:18:15 host sshd[7835]: input_userauth_request: invalid user r00t [preauth] Dec 31 08:18:16 host sshd[7835]: pam_unix(sshd:auth): check pass; user unknown Dec 31 08:18:16 host sshd[7835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 31 08:18:17 host sshd[7835]: Failed password for invalid user r00t from 92.46.108.20 port 44190 ssh2 Dec 31 08:18:18 host sshd[7835]: Connection closed by 92.46.108.20 port 44190 [preauth] Dec 31 08:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 08:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 08:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 08:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 08:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 08:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 08:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 08:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 08:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 08:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 31 08:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 08:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 08:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 31 08:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 08:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 08:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 31 08:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 08:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 08:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 31 08:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 08:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 08:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 31 08:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 08:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 08:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 31 08:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 08:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 08:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 31 08:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 08:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 08:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 31 08:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 08:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 08:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 08:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 08:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 08:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 31 08:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 08:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 08:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=shalinijames user-2=wwwtestugo user-3=vfmassets user-4=pmcresources user-5=disposeat user-6=wwwkmaorg user-7=remysagr user-8=woodpeck user-9=wwwkapin user-10=phmetals user-11=kottayamcalldriv user-12=palco123 user-13=gifterman user-14=mrsclean user-15=wwwnexidigital user-16=wwwevmhonda user-17=bonifacegroup user-18=wwwletsstalkfood user-19=straightcurve user-20=a2zgroup user-21=dartsimp user-22=laundryboniface user-23=wwwkaretakers user-24=cochintaxi user-25=travelboniface user-26=ugotscom user-27=keralaholi user-28=wwwresourcehunte user-29=wwwrmswll user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 31 08:21:50 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 31 08:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 08:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 08:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 08:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 08:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 08:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-58txnoas2qRHfQyb.~ Dec 31 08:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 08:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 08:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-58txnoas2qRHfQyb.~' Dec 31 08:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 08:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 08:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-58txnoas2qRHfQyb.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 08:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 08:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 08:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 31 08:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 08:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 08:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 31 08:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 08:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 08:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 31 08:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 08:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 08:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 08:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 08:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 31 08:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 31 08:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 31 08:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 31 08:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 08:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 31 08:21:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 08:21:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 08:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 31 08:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 08:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 31 08:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 08:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 08:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 31 08:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 08:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 08:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 31 08:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 08:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 08:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 31 08:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 08:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 08:37:31 host sshd[11463]: User root from 103.13.40.2 not allowed because not listed in AllowUsers Dec 31 08:37:31 host sshd[11463]: input_userauth_request: invalid user root [preauth] Dec 31 08:37:31 host unix_chkpwd[11465]: password check failed for user (root) Dec 31 08:37:31 host sshd[11463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 user=root Dec 31 08:37:31 host sshd[11463]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 08:37:33 host sshd[11463]: Failed password for invalid user root from 103.13.40.2 port 49312 ssh2 Dec 31 08:37:33 host sshd[11463]: Connection closed by 103.13.40.2 port 49312 [preauth] Dec 31 08:54:24 host sshd[14098]: Invalid user fm from 45.93.201.90 port 58230 Dec 31 08:54:24 host sshd[14098]: input_userauth_request: invalid user fm [preauth] Dec 31 08:54:24 host sshd[14098]: pam_unix(sshd:auth): check pass; user unknown Dec 31 08:54:24 host sshd[14098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 31 08:54:26 host sshd[14098]: Failed password for invalid user fm from 45.93.201.90 port 58230 ssh2 Dec 31 08:54:30 host sshd[14098]: pam_unix(sshd:auth): check pass; user unknown Dec 31 08:54:31 host sshd[14098]: Failed password for invalid user fm from 45.93.201.90 port 58230 ssh2 Dec 31 08:54:34 host sshd[14098]: pam_unix(sshd:auth): check pass; user unknown Dec 31 08:54:36 host sshd[14098]: Failed password for invalid user fm from 45.93.201.90 port 58230 ssh2 Dec 31 08:54:39 host sshd[14098]: Connection closed by 45.93.201.90 port 58230 [preauth] Dec 31 08:54:39 host sshd[14098]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 31 09:01:24 host sshd[15256]: Invalid user jiayu from 41.197.31.178 port 52318 Dec 31 09:01:24 host sshd[15256]: input_userauth_request: invalid user jiayu [preauth] Dec 31 09:01:25 host sshd[15256]: pam_unix(sshd:auth): check pass; user unknown Dec 31 09:01:25 host sshd[15256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 31 09:01:26 host sshd[15256]: Failed password for invalid user jiayu from 41.197.31.178 port 52318 ssh2 Dec 31 09:01:27 host sshd[15256]: Connection closed by 41.197.31.178 port 52318 [preauth] Dec 31 09:20:09 host sshd[18020]: Invalid user user1 from 162.218.126.136 port 46530 Dec 31 09:20:09 host sshd[18020]: input_userauth_request: invalid user user1 [preauth] Dec 31 09:20:09 host sshd[18020]: pam_unix(sshd:auth): check pass; user unknown Dec 31 09:20:09 host sshd[18020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 31 09:20:10 host sshd[18020]: Failed password for invalid user user1 from 162.218.126.136 port 46530 ssh2 Dec 31 09:20:11 host sshd[18020]: Connection closed by 162.218.126.136 port 46530 [preauth] Dec 31 09:21:34 host sshd[18241]: ssh_dispatch_run_fatal: Connection from 207.229.167.36 port 48252: Connection corrupted [preauth] Dec 31 09:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 09:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 09:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 09:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 09:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 09:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 09:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 09:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 09:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 09:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 31 09:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 09:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 09:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 31 09:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 09:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 09:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 31 09:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 09:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 09:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 31 09:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 09:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 09:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 31 09:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 09:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 09:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 31 09:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 09:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 09:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 31 09:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 09:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 09:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 31 09:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 09:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 31 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=a2zgroup user-4=dartsimp user-5=laundryboniface user-6=wwwpmcresource user-7=travelboniface user-8=ugotscom user-9=keralaholi user-10=wwwresourcehunte user-11=wwwrmswll user-12=disposeat user-13=wwwkmaorg user-14=remysagr user-15=woodpeck user-16=wwwkapin user-17=shalinijames user-18=wwwtestugo user-19=vfmassets user-20=pmcresources user-21=wwwevmhonda user-22=bonifacegroup user-23=wwwletsstalkfood user-24=straightcurve user-25=phmetals user-26=kottayamcalldriv user-27=palco123 user-28=gifterman user-29=mrsclean user-30=wwwnexidigital feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 31 09:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 31 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-e1wcLqVAmpg8VUxO.~ Dec 31 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-e1wcLqVAmpg8VUxO.~' Dec 31 09:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 09:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 09:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-e1wcLqVAmpg8VUxO.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 09:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 09:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 09:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 31 09:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 09:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 09:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 31 09:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 09:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 09:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 09:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 09:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 09:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 09:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 09:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 09:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 09:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 09:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 09:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 31 09:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 09:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 09:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 09:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 09:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 09:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 31 09:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 31 09:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 31 09:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 31 09:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 09:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 31 09:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 09:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 09:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 31 09:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 09:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 09:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 31 09:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 09:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 31 09:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 09:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 09:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 31 09:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 09:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 09:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 31 09:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 09:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 09:31:48 host sshd[19850]: Invalid user user from 106.10.122.53 port 51544 Dec 31 09:31:48 host sshd[19850]: input_userauth_request: invalid user user [preauth] Dec 31 09:31:49 host sshd[19850]: pam_unix(sshd:auth): check pass; user unknown Dec 31 09:31:49 host sshd[19850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 31 09:31:51 host sshd[19850]: Failed password for invalid user user from 106.10.122.53 port 51544 ssh2 Dec 31 09:31:51 host sshd[19850]: Connection closed by 106.10.122.53 port 51544 [preauth] Dec 31 09:42:08 host sshd[21193]: Did not receive identification string from 147.135.252.17 port 56058 Dec 31 09:42:08 host sshd[21195]: Invalid user admin from 147.135.252.17 port 56100 Dec 31 09:42:08 host sshd[21194]: Invalid user zjw from 147.135.252.17 port 56082 Dec 31 09:42:08 host sshd[21194]: input_userauth_request: invalid user zjw [preauth] Dec 31 09:42:08 host sshd[21195]: input_userauth_request: invalid user admin [preauth] Dec 31 09:42:09 host sshd[21196]: Invalid user user from 147.135.252.17 port 56124 Dec 31 09:42:09 host sshd[21196]: input_userauth_request: invalid user user [preauth] Dec 31 09:42:09 host sshd[21205]: Invalid user dmdba from 147.135.252.17 port 56076 Dec 31 09:42:09 host sshd[21205]: input_userauth_request: invalid user dmdba [preauth] Dec 31 09:42:09 host sshd[21198]: Invalid user postgres from 147.135.252.17 port 56136 Dec 31 09:42:09 host sshd[21198]: input_userauth_request: invalid user postgres [preauth] Dec 31 09:42:09 host sshd[21197]: Invalid user emqx from 147.135.252.17 port 56102 Dec 31 09:42:09 host sshd[21197]: input_userauth_request: invalid user emqx [preauth] Dec 31 09:42:09 host sshd[21199]: Invalid user guest from 147.135.252.17 port 56132 Dec 31 09:42:09 host sshd[21199]: input_userauth_request: invalid user guest [preauth] Dec 31 09:42:09 host sshd[21206]: Invalid user testuser from 147.135.252.17 port 56130 Dec 31 09:42:09 host sshd[21206]: input_userauth_request: invalid user testuser [preauth] Dec 31 09:42:09 host sshd[21207]: Invalid user steam from 147.135.252.17 port 56156 Dec 31 09:42:09 host sshd[21207]: input_userauth_request: invalid user steam [preauth] Dec 31 09:42:09 host sshd[21202]: User mysql from 147.135.252.17 not allowed because not listed in AllowUsers Dec 31 09:42:09 host sshd[21202]: input_userauth_request: invalid user mysql [preauth] Dec 31 09:42:09 host sshd[21203]: User centos from 147.135.252.17 not allowed because not listed in AllowUsers Dec 31 09:42:09 host sshd[21201]: Invalid user admin from 147.135.252.17 port 56092 Dec 31 09:42:09 host sshd[21201]: input_userauth_request: invalid user admin [preauth] Dec 31 09:42:09 host sshd[21203]: input_userauth_request: invalid user centos [preauth] Dec 31 09:42:09 host sshd[21204]: Invalid user www from 147.135.252.17 port 56140 Dec 31 09:42:09 host sshd[21200]: Invalid user esuser from 147.135.252.17 port 56118 Dec 31 09:42:09 host sshd[21204]: input_userauth_request: invalid user www [preauth] Dec 31 09:42:09 host sshd[21200]: input_userauth_request: invalid user esuser [preauth] Dec 31 09:42:09 host sshd[21208]: Invalid user steam from 147.135.252.17 port 56074 Dec 31 09:42:09 host sshd[21208]: input_userauth_request: invalid user steam [preauth] Dec 31 09:42:09 host sshd[21209]: Invalid user steam from 147.135.252.17 port 56134 Dec 31 09:42:09 host sshd[21209]: input_userauth_request: invalid user steam [preauth] Dec 31 09:42:09 host sshd[21210]: Invalid user discord from 147.135.252.17 port 56146 Dec 31 09:42:09 host sshd[21210]: input_userauth_request: invalid user discord [preauth] Dec 31 09:42:09 host sshd[21211]: Invalid user oracle from 147.135.252.17 port 56128 Dec 31 09:42:09 host sshd[21211]: input_userauth_request: invalid user oracle [preauth] Dec 31 09:42:09 host sshd[21195]: pam_unix(sshd:auth): check pass; user unknown Dec 31 09:42:09 host sshd[21194]: pam_unix(sshd:auth): check pass; user unknown Dec 31 09:42:09 host sshd[21195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.252.17 Dec 31 09:42:09 host sshd[21194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.252.17 Dec 31 09:42:09 host sshd[21196]: pam_unix(sshd:auth): check pass; user unknown Dec 31 09:42:09 host sshd[21196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.252.17 Dec 31 09:42:09 host sshd[21199]: pam_unix(sshd:auth): check pass; user unknown Dec 31 09:42:09 host sshd[21199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.252.17 Dec 31 09:42:09 host sshd[21197]: pam_unix(sshd:auth): check pass; user unknown Dec 31 09:42:09 host sshd[21198]: pam_unix(sshd:auth): check pass; user unknown Dec 31 09:42:09 host sshd[21197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.252.17 Dec 31 09:42:09 host sshd[21198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.252.17 Dec 31 09:42:09 host sshd[21205]: pam_unix(sshd:auth): check pass; user unknown Dec 31 09:42:09 host sshd[21205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.252.17 Dec 31 09:42:09 host sshd[21206]: pam_unix(sshd:auth): check pass; user unknown Dec 31 09:42:09 host sshd[21206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.252.17 Dec 31 09:42:09 host sshd[21201]: pam_unix(sshd:auth): check pass; user unknown Dec 31 09:42:09 host sshd[21201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.252.17 Dec 31 09:42:09 host sshd[21207]: pam_unix(sshd:auth): check pass; user unknown Dec 31 09:42:09 host sshd[21207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.252.17 Dec 31 09:42:09 host unix_chkpwd[21231]: password check failed for user (mysql) Dec 31 09:42:09 host sshd[21202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.252.17 user=mysql Dec 31 09:42:09 host sshd[21202]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql" Dec 31 09:42:09 host sshd[21204]: pam_unix(sshd:auth): check pass; user unknown Dec 31 09:42:09 host sshd[21200]: pam_unix(sshd:auth): check pass; user unknown Dec 31 09:42:09 host sshd[21204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.252.17 Dec 31 09:42:09 host sshd[21200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.252.17 Dec 31 09:42:09 host sshd[21208]: pam_unix(sshd:auth): check pass; user unknown Dec 31 09:42:09 host sshd[21208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.252.17 Dec 31 09:42:09 host unix_chkpwd[21232]: password check failed for user (centos) Dec 31 09:42:09 host sshd[21203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.252.17 user=centos Dec 31 09:42:09 host sshd[21209]: pam_unix(sshd:auth): check pass; user unknown Dec 31 09:42:09 host sshd[21209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.252.17 Dec 31 09:42:09 host sshd[21210]: pam_unix(sshd:auth): check pass; user unknown Dec 31 09:42:09 host sshd[21210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.252.17 Dec 31 09:42:09 host sshd[21211]: pam_unix(sshd:auth): check pass; user unknown Dec 31 09:42:09 host sshd[21211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.252.17 Dec 31 09:42:11 host sshd[21195]: Failed password for invalid user admin from 147.135.252.17 port 56100 ssh2 Dec 31 09:42:11 host sshd[21194]: Failed password for invalid user zjw from 147.135.252.17 port 56082 ssh2 Dec 31 09:42:11 host sshd[21196]: Failed password for invalid user user from 147.135.252.17 port 56124 ssh2 Dec 31 09:42:11 host sshd[21199]: Failed password for invalid user guest from 147.135.252.17 port 56132 ssh2 Dec 31 09:42:11 host sshd[21197]: Failed password for invalid user emqx from 147.135.252.17 port 56102 ssh2 Dec 31 09:42:11 host sshd[21198]: Failed password for invalid user postgres from 147.135.252.17 port 56136 ssh2 Dec 31 09:42:11 host sshd[21205]: Failed password for invalid user dmdba from 147.135.252.17 port 56076 ssh2 Dec 31 09:42:11 host sshd[21206]: Failed password for invalid user testuser from 147.135.252.17 port 56130 ssh2 Dec 31 09:42:11 host sshd[21207]: Failed password for invalid user steam from 147.135.252.17 port 56156 ssh2 Dec 31 09:42:11 host sshd[21201]: Failed password for invalid user admin from 147.135.252.17 port 56092 ssh2 Dec 31 09:42:11 host sshd[21202]: Failed password for invalid user mysql from 147.135.252.17 port 56104 ssh2 Dec 31 09:42:11 host sshd[21204]: Failed password for invalid user www from 147.135.252.17 port 56140 ssh2 Dec 31 09:42:11 host sshd[21200]: Failed password for invalid user esuser from 147.135.252.17 port 56118 ssh2 Dec 31 09:42:11 host sshd[21208]: Failed password for invalid user steam from 147.135.252.17 port 56074 ssh2 Dec 31 09:42:11 host sshd[21203]: Failed password for invalid user centos from 147.135.252.17 port 56138 ssh2 Dec 31 09:42:11 host sshd[21199]: Connection closed by 147.135.252.17 port 56132 [preauth] Dec 31 09:42:11 host sshd[21198]: Connection closed by 147.135.252.17 port 56136 [preauth] Dec 31 09:42:11 host sshd[21197]: Connection closed by 147.135.252.17 port 56102 [preauth] Dec 31 09:42:11 host sshd[21194]: Connection closed by 147.135.252.17 port 56082 [preauth] Dec 31 09:42:11 host sshd[21205]: Connection closed by 147.135.252.17 port 56076 [preauth] Dec 31 09:42:11 host sshd[21207]: Connection closed by 147.135.252.17 port 56156 [preauth] Dec 31 09:42:11 host sshd[21201]: Connection closed by 147.135.252.17 port 56092 [preauth] Dec 31 09:42:11 host sshd[21196]: Connection closed by 147.135.252.17 port 56124 [preauth] Dec 31 09:42:11 host sshd[21195]: Connection closed by 147.135.252.17 port 56100 [preauth] Dec 31 09:42:11 host sshd[21206]: Connection closed by 147.135.252.17 port 56130 [preauth] Dec 31 09:42:11 host sshd[21202]: Connection closed by 147.135.252.17 port 56104 [preauth] Dec 31 09:42:11 host sshd[21209]: Failed password for invalid user steam from 147.135.252.17 port 56134 ssh2 Dec 31 09:42:11 host sshd[21211]: Failed password for invalid user oracle from 147.135.252.17 port 56128 ssh2 Dec 31 09:42:11 host sshd[21210]: Failed password for invalid user discord from 147.135.252.17 port 56146 ssh2 Dec 31 09:42:11 host sshd[21200]: Connection closed by 147.135.252.17 port 56118 [preauth] Dec 31 09:42:11 host sshd[21204]: Connection closed by 147.135.252.17 port 56140 [preauth] Dec 31 09:42:11 host sshd[21208]: Connection closed by 147.135.252.17 port 56074 [preauth] Dec 31 09:42:11 host sshd[21203]: Connection closed by 147.135.252.17 port 56138 [preauth] Dec 31 09:42:11 host sshd[21209]: Connection closed by 147.135.252.17 port 56134 [preauth] Dec 31 09:42:11 host sshd[21210]: Connection closed by 147.135.252.17 port 56146 [preauth] Dec 31 09:42:11 host sshd[21211]: Connection closed by 147.135.252.17 port 56128 [preauth] Dec 31 09:42:12 host sshd[21235]: Invalid user test from 147.135.252.17 port 56086 Dec 31 09:42:12 host sshd[21235]: input_userauth_request: invalid user test [preauth] Dec 31 09:42:12 host sshd[21235]: pam_unix(sshd:auth): check pass; user unknown Dec 31 09:42:12 host sshd[21235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.252.17 Dec 31 09:42:14 host sshd[21235]: Failed password for invalid user test from 147.135.252.17 port 56086 ssh2 Dec 31 09:49:44 host sshd[22511]: Invalid user admin from 210.146.173.28 port 59237 Dec 31 09:49:44 host sshd[22511]: input_userauth_request: invalid user admin [preauth] Dec 31 09:49:44 host sshd[22511]: pam_unix(sshd:auth): check pass; user unknown Dec 31 09:49:44 host sshd[22511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.146.173.28 Dec 31 09:49:45 host sshd[22511]: Failed password for invalid user admin from 210.146.173.28 port 59237 ssh2 Dec 31 09:49:46 host sshd[22511]: Connection closed by 210.146.173.28 port 59237 [preauth] Dec 31 10:01:29 host sshd[23986]: Invalid user lsy from 103.13.40.2 port 57722 Dec 31 10:01:29 host sshd[23986]: input_userauth_request: invalid user lsy [preauth] Dec 31 10:01:29 host sshd[23986]: pam_unix(sshd:auth): check pass; user unknown Dec 31 10:01:29 host sshd[23986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 31 10:01:31 host sshd[23986]: Failed password for invalid user lsy from 103.13.40.2 port 57722 ssh2 Dec 31 10:01:31 host sshd[23986]: Connection closed by 103.13.40.2 port 57722 [preauth] Dec 31 10:04:14 host sshd[24255]: Invalid user sw from 20.230.80.47 port 55944 Dec 31 10:04:14 host sshd[24255]: input_userauth_request: invalid user sw [preauth] Dec 31 10:04:14 host sshd[24255]: pam_unix(sshd:auth): check pass; user unknown Dec 31 10:04:14 host sshd[24255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.230.80.47 Dec 31 10:04:16 host sshd[24255]: Failed password for invalid user sw from 20.230.80.47 port 55944 ssh2 Dec 31 10:04:16 host sshd[24255]: Received disconnect from 20.230.80.47 port 55944:11: Bye Bye [preauth] Dec 31 10:04:16 host sshd[24255]: Disconnected from 20.230.80.47 port 55944 [preauth] Dec 31 10:04:45 host sshd[24315]: Invalid user ty from 45.162.216.76 port 40044 Dec 31 10:04:45 host sshd[24315]: input_userauth_request: invalid user ty [preauth] Dec 31 10:04:45 host sshd[24315]: pam_unix(sshd:auth): check pass; user unknown Dec 31 10:04:45 host sshd[24315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.162.216.76 Dec 31 10:04:47 host sshd[24315]: Failed password for invalid user ty from 45.162.216.76 port 40044 ssh2 Dec 31 10:04:47 host sshd[24315]: Received disconnect from 45.162.216.76 port 40044:11: Bye Bye [preauth] Dec 31 10:04:47 host sshd[24315]: Disconnected from 45.162.216.76 port 40044 [preauth] Dec 31 10:05:30 host sshd[24531]: Invalid user rm from 119.31.123.140 port 60248 Dec 31 10:05:30 host sshd[24531]: input_userauth_request: invalid user rm [preauth] Dec 31 10:05:30 host sshd[24531]: pam_unix(sshd:auth): check pass; user unknown Dec 31 10:05:30 host sshd[24531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.31.123.140 Dec 31 10:05:31 host sshd[24531]: Failed password for invalid user rm from 119.31.123.140 port 60248 ssh2 Dec 31 10:05:31 host sshd[24531]: Received disconnect from 119.31.123.140 port 60248:11: Bye Bye [preauth] Dec 31 10:05:31 host sshd[24531]: Disconnected from 119.31.123.140 port 60248 [preauth] Dec 31 10:06:03 host sshd[24583]: Invalid user px from 96.227.85.22 port 49604 Dec 31 10:06:03 host sshd[24583]: input_userauth_request: invalid user px [preauth] Dec 31 10:06:03 host sshd[24583]: pam_unix(sshd:auth): check pass; user unknown Dec 31 10:06:03 host sshd[24583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.227.85.22 Dec 31 10:06:05 host sshd[24583]: Failed password for invalid user px from 96.227.85.22 port 49604 ssh2 Dec 31 10:06:05 host sshd[24583]: Received disconnect from 96.227.85.22 port 49604:11: Bye Bye [preauth] Dec 31 10:06:05 host sshd[24583]: Disconnected from 96.227.85.22 port 49604 [preauth] Dec 31 10:07:40 host sshd[24763]: Invalid user ju from 96.227.85.22 port 43136 Dec 31 10:07:40 host sshd[24763]: input_userauth_request: invalid user ju [preauth] Dec 31 10:07:40 host sshd[24763]: pam_unix(sshd:auth): check pass; user unknown Dec 31 10:07:40 host sshd[24763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.227.85.22 Dec 31 10:07:41 host sshd[24763]: Failed password for invalid user ju from 96.227.85.22 port 43136 ssh2 Dec 31 10:07:42 host sshd[24763]: Received disconnect from 96.227.85.22 port 43136:11: Bye Bye [preauth] Dec 31 10:07:42 host sshd[24763]: Disconnected from 96.227.85.22 port 43136 [preauth] Dec 31 10:07:44 host sshd[24781]: Invalid user ri from 210.212.99.168 port 52070 Dec 31 10:07:44 host sshd[24781]: input_userauth_request: invalid user ri [preauth] Dec 31 10:07:44 host sshd[24781]: pam_unix(sshd:auth): check pass; user unknown Dec 31 10:07:44 host sshd[24781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.212.99.168 Dec 31 10:07:46 host sshd[24781]: Failed password for invalid user ri from 210.212.99.168 port 52070 ssh2 Dec 31 10:07:47 host sshd[24781]: Received disconnect from 210.212.99.168 port 52070:11: Bye Bye [preauth] Dec 31 10:07:47 host sshd[24781]: Disconnected from 210.212.99.168 port 52070 [preauth] Dec 31 10:08:15 host sshd[24828]: Invalid user hm from 45.162.216.76 port 54072 Dec 31 10:08:15 host sshd[24828]: input_userauth_request: invalid user hm [preauth] Dec 31 10:08:15 host sshd[24828]: pam_unix(sshd:auth): check pass; user unknown Dec 31 10:08:15 host sshd[24828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.162.216.76 Dec 31 10:08:17 host sshd[24828]: Failed password for invalid user hm from 45.162.216.76 port 54072 ssh2 Dec 31 10:08:18 host sshd[24828]: Received disconnect from 45.162.216.76 port 54072:11: Bye Bye [preauth] Dec 31 10:08:18 host sshd[24828]: Disconnected from 45.162.216.76 port 54072 [preauth] Dec 31 10:08:49 host sshd[24891]: Invalid user jk from 96.227.85.22 port 60142 Dec 31 10:08:49 host sshd[24891]: input_userauth_request: invalid user jk [preauth] Dec 31 10:08:49 host sshd[24891]: pam_unix(sshd:auth): check pass; user unknown Dec 31 10:08:49 host sshd[24891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.227.85.22 Dec 31 10:08:51 host sshd[24891]: Failed password for invalid user jk from 96.227.85.22 port 60142 ssh2 Dec 31 10:08:52 host sshd[24891]: Received disconnect from 96.227.85.22 port 60142:11: Bye Bye [preauth] Dec 31 10:08:52 host sshd[24891]: Disconnected from 96.227.85.22 port 60142 [preauth] Dec 31 10:09:40 host sshd[25034]: Invalid user mg from 45.162.216.76 port 54116 Dec 31 10:09:40 host sshd[25034]: input_userauth_request: invalid user mg [preauth] Dec 31 10:09:40 host sshd[25034]: pam_unix(sshd:auth): check pass; user unknown Dec 31 10:09:40 host sshd[25034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.162.216.76 Dec 31 10:09:42 host sshd[25034]: Failed password for invalid user mg from 45.162.216.76 port 54116 ssh2 Dec 31 10:09:42 host sshd[25034]: Received disconnect from 45.162.216.76 port 54116:11: Bye Bye [preauth] Dec 31 10:09:42 host sshd[25034]: Disconnected from 45.162.216.76 port 54116 [preauth] Dec 31 10:09:54 host sshd[25084]: Invalid user gc from 43.153.179.44 port 42688 Dec 31 10:09:54 host sshd[25084]: input_userauth_request: invalid user gc [preauth] Dec 31 10:09:54 host sshd[25084]: pam_unix(sshd:auth): check pass; user unknown Dec 31 10:09:54 host sshd[25084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.179.44 Dec 31 10:09:57 host sshd[25084]: Failed password for invalid user gc from 43.153.179.44 port 42688 ssh2 Dec 31 10:09:57 host sshd[25084]: Received disconnect from 43.153.179.44 port 42688:11: Bye Bye [preauth] Dec 31 10:09:57 host sshd[25084]: Disconnected from 43.153.179.44 port 42688 [preauth] Dec 31 10:09:58 host sshd[25088]: Invalid user ve from 20.230.80.47 port 50170 Dec 31 10:09:58 host sshd[25088]: input_userauth_request: invalid user ve [preauth] Dec 31 10:09:58 host sshd[25088]: pam_unix(sshd:auth): check pass; user unknown Dec 31 10:09:58 host sshd[25088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.230.80.47 Dec 31 10:10:00 host sshd[25088]: Failed password for invalid user ve from 20.230.80.47 port 50170 ssh2 Dec 31 10:10:00 host sshd[25088]: Received disconnect from 20.230.80.47 port 50170:11: Bye Bye [preauth] Dec 31 10:10:00 host sshd[25088]: Disconnected from 20.230.80.47 port 50170 [preauth] Dec 31 10:10:21 host sshd[25145]: Invalid user ba from 119.31.123.140 port 50540 Dec 31 10:10:21 host sshd[25145]: input_userauth_request: invalid user ba [preauth] Dec 31 10:10:21 host sshd[25145]: pam_unix(sshd:auth): check pass; user unknown Dec 31 10:10:21 host sshd[25145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.31.123.140 Dec 31 10:10:23 host sshd[25145]: Failed password for invalid user ba from 119.31.123.140 port 50540 ssh2 Dec 31 10:10:23 host sshd[25145]: Received disconnect from 119.31.123.140 port 50540:11: Bye Bye [preauth] Dec 31 10:10:23 host sshd[25145]: Disconnected from 119.31.123.140 port 50540 [preauth] Dec 31 10:11:10 host sshd[25340]: Invalid user ui from 20.230.80.47 port 57646 Dec 31 10:11:10 host sshd[25340]: input_userauth_request: invalid user ui [preauth] Dec 31 10:11:10 host sshd[25340]: pam_unix(sshd:auth): check pass; user unknown Dec 31 10:11:10 host sshd[25340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.230.80.47 Dec 31 10:11:11 host sshd[25340]: Failed password for invalid user ui from 20.230.80.47 port 57646 ssh2 Dec 31 10:11:12 host sshd[25340]: Received disconnect from 20.230.80.47 port 57646:11: Bye Bye [preauth] Dec 31 10:11:12 host sshd[25340]: Disconnected from 20.230.80.47 port 57646 [preauth] Dec 31 10:11:38 host sshd[25429]: Invalid user vd from 43.153.179.44 port 39452 Dec 31 10:11:38 host sshd[25429]: input_userauth_request: invalid user vd [preauth] Dec 31 10:11:38 host sshd[25429]: pam_unix(sshd:auth): check pass; user unknown Dec 31 10:11:38 host sshd[25429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.179.44 Dec 31 10:11:41 host sshd[25429]: Failed password for invalid user vd from 43.153.179.44 port 39452 ssh2 Dec 31 10:11:41 host sshd[25429]: Received disconnect from 43.153.179.44 port 39452:11: Bye Bye [preauth] Dec 31 10:11:41 host sshd[25429]: Disconnected from 43.153.179.44 port 39452 [preauth] Dec 31 10:12:08 host sshd[25491]: Invalid user km from 210.212.99.168 port 39553 Dec 31 10:12:08 host sshd[25491]: input_userauth_request: invalid user km [preauth] Dec 31 10:12:08 host sshd[25491]: pam_unix(sshd:auth): check pass; user unknown Dec 31 10:12:08 host sshd[25491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.212.99.168 Dec 31 10:12:11 host sshd[25491]: Failed password for invalid user km from 210.212.99.168 port 39553 ssh2 Dec 31 10:12:11 host sshd[25491]: Received disconnect from 210.212.99.168 port 39553:11: Bye Bye [preauth] Dec 31 10:12:11 host sshd[25491]: Disconnected from 210.212.99.168 port 39553 [preauth] Dec 31 10:12:42 host sshd[25560]: Invalid user rr from 119.31.123.140 port 51526 Dec 31 10:12:42 host sshd[25560]: input_userauth_request: invalid user rr [preauth] Dec 31 10:12:42 host sshd[25560]: pam_unix(sshd:auth): check pass; user unknown Dec 31 10:12:42 host sshd[25560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.31.123.140 Dec 31 10:12:43 host sshd[25560]: Failed password for invalid user rr from 119.31.123.140 port 51526 ssh2 Dec 31 10:12:44 host sshd[25560]: Received disconnect from 119.31.123.140 port 51526:11: Bye Bye [preauth] Dec 31 10:12:44 host sshd[25560]: Disconnected from 119.31.123.140 port 51526 [preauth] Dec 31 10:13:14 host sshd[25679]: Invalid user bk from 43.153.179.44 port 35116 Dec 31 10:13:14 host sshd[25679]: input_userauth_request: invalid user bk [preauth] Dec 31 10:13:14 host sshd[25679]: pam_unix(sshd:auth): check pass; user unknown Dec 31 10:13:14 host sshd[25679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.179.44 Dec 31 10:13:16 host sshd[25679]: Failed password for invalid user bk from 43.153.179.44 port 35116 ssh2 Dec 31 10:13:16 host sshd[25679]: Received disconnect from 43.153.179.44 port 35116:11: Bye Bye [preauth] Dec 31 10:13:16 host sshd[25679]: Disconnected from 43.153.179.44 port 35116 [preauth] Dec 31 10:14:34 host sshd[25914]: Invalid user ho from 210.212.99.168 port 38618 Dec 31 10:14:34 host sshd[25914]: input_userauth_request: invalid user ho [preauth] Dec 31 10:14:34 host sshd[25914]: pam_unix(sshd:auth): check pass; user unknown Dec 31 10:14:34 host sshd[25914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.212.99.168 Dec 31 10:14:36 host sshd[25914]: Failed password for invalid user ho from 210.212.99.168 port 38618 ssh2 Dec 31 10:14:37 host sshd[25914]: Received disconnect from 210.212.99.168 port 38618:11: Bye Bye [preauth] Dec 31 10:14:37 host sshd[25914]: Disconnected from 210.212.99.168 port 38618 [preauth] Dec 31 10:20:39 host sshd[26750]: Invalid user cn from 41.65.19.86 port 56320 Dec 31 10:20:39 host sshd[26750]: input_userauth_request: invalid user cn [preauth] Dec 31 10:20:39 host sshd[26750]: pam_unix(sshd:auth): check pass; user unknown Dec 31 10:20:39 host sshd[26750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.65.19.86 Dec 31 10:20:41 host sshd[26750]: Failed password for invalid user cn from 41.65.19.86 port 56320 ssh2 Dec 31 10:20:41 host sshd[26750]: Received disconnect from 41.65.19.86 port 56320:11: Bye Bye [preauth] Dec 31 10:20:41 host sshd[26750]: Disconnected from 41.65.19.86 port 56320 [preauth] Dec 31 10:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 10:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 10:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 10:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 10:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 10:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 10:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 10:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 10:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 31 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 31 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 31 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 31 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 31 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 31 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 31 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 10:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 31 10:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 10:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 31 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=dartsimp user-3=a2zgroup user-4=wwwkaretakers user-5=cochintaxi user-6=ugotscom user-7=wwwrmswll user-8=wwwresourcehunte user-9=keralaholi user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=wwwtestugo user-14=shalinijames user-15=vfmassets user-16=woodpeck user-17=wwwkapin user-18=wwwkmaorg user-19=disposeat user-20=remysagr user-21=mrsclean user-22=wwwnexidigital user-23=kottayamcalldriv user-24=phmetals user-25=gifterman user-26=palco123 user-27=wwwletsstalkfood user-28=straightcurve user-29=wwwevmhonda user-30=bonifacegroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 31 10:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 31 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 10:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 10:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 10:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 10:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-JnjbBHp0cYKfYFsw.~ Dec 31 10:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 10:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 10:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-JnjbBHp0cYKfYFsw.~' Dec 31 10:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 10:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 10:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-JnjbBHp0cYKfYFsw.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 10:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 10:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 10:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 31 10:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 10:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 10:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 31 10:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 10:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 10:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 10:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 10:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 10:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 10:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 10:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 10:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 10:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 10:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 10:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 31 10:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 10:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 10:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 10:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 10:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 31 10:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 31 10:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 31 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 31 10:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 10:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 31 10:21:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 10:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 31 10:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 10:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 31 10:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 10:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 31 10:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 10:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 10:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 31 10:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 10:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 10:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 31 10:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 10:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 10:25:30 host sshd[27755]: Invalid user wy from 41.65.19.86 port 56544 Dec 31 10:25:30 host sshd[27755]: input_userauth_request: invalid user wy [preauth] Dec 31 10:25:30 host sshd[27755]: pam_unix(sshd:auth): check pass; user unknown Dec 31 10:25:30 host sshd[27755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.65.19.86 Dec 31 10:25:32 host sshd[27755]: Failed password for invalid user wy from 41.65.19.86 port 56544 ssh2 Dec 31 10:25:32 host sshd[27755]: Received disconnect from 41.65.19.86 port 56544:11: Bye Bye [preauth] Dec 31 10:25:32 host sshd[27755]: Disconnected from 41.65.19.86 port 56544 [preauth] Dec 31 10:25:54 host sshd[27789]: Invalid user git from 162.218.126.136 port 51770 Dec 31 10:25:54 host sshd[27789]: input_userauth_request: invalid user git [preauth] Dec 31 10:25:54 host sshd[27789]: pam_unix(sshd:auth): check pass; user unknown Dec 31 10:25:54 host sshd[27789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 31 10:25:56 host sshd[27789]: Failed password for invalid user git from 162.218.126.136 port 51770 ssh2 Dec 31 10:25:56 host sshd[27789]: Connection closed by 162.218.126.136 port 51770 [preauth] Dec 31 10:26:43 host sshd[27912]: Invalid user vq from 41.65.19.86 port 56616 Dec 31 10:26:43 host sshd[27912]: input_userauth_request: invalid user vq [preauth] Dec 31 10:26:43 host sshd[27912]: pam_unix(sshd:auth): check pass; user unknown Dec 31 10:26:43 host sshd[27912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.65.19.86 Dec 31 10:26:45 host sshd[27912]: Failed password for invalid user vq from 41.65.19.86 port 56616 ssh2 Dec 31 10:37:55 host sshd[30078]: Invalid user fn from 45.93.201.90 port 60602 Dec 31 10:37:55 host sshd[30078]: input_userauth_request: invalid user fn [preauth] Dec 31 10:37:55 host sshd[30078]: pam_unix(sshd:auth): check pass; user unknown Dec 31 10:37:55 host sshd[30078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 31 10:37:57 host sshd[30078]: Failed password for invalid user fn from 45.93.201.90 port 60602 ssh2 Dec 31 10:38:00 host sshd[30078]: pam_unix(sshd:auth): check pass; user unknown Dec 31 10:38:02 host sshd[30078]: Failed password for invalid user fn from 45.93.201.90 port 60602 ssh2 Dec 31 10:38:06 host sshd[30078]: pam_unix(sshd:auth): check pass; user unknown Dec 31 10:38:08 host sshd[30078]: Failed password for invalid user fn from 45.93.201.90 port 60602 ssh2 Dec 31 10:38:11 host sshd[30078]: Connection closed by 45.93.201.90 port 60602 [preauth] Dec 31 10:38:11 host sshd[30078]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 31 10:39:36 host sshd[30498]: User root from 41.223.6.198 not allowed because not listed in AllowUsers Dec 31 10:39:36 host sshd[30498]: input_userauth_request: invalid user root [preauth] Dec 31 10:39:36 host unix_chkpwd[30510]: password check failed for user (root) Dec 31 10:39:36 host sshd[30498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.223.6.198 user=root Dec 31 10:39:36 host sshd[30498]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 10:39:38 host sshd[30498]: Failed password for invalid user root from 41.223.6.198 port 42884 ssh2 Dec 31 10:39:38 host sshd[30498]: Received disconnect from 41.223.6.198 port 42884:11: Bye Bye [preauth] Dec 31 10:39:38 host sshd[30498]: Disconnected from 41.223.6.198 port 42884 [preauth] Dec 31 10:42:30 host sshd[31146]: Invalid user temp from 51.91.99.201 port 47004 Dec 31 10:42:30 host sshd[31146]: input_userauth_request: invalid user temp [preauth] Dec 31 10:42:30 host sshd[31146]: pam_unix(sshd:auth): check pass; user unknown Dec 31 10:42:30 host sshd[31146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.99.201 Dec 31 10:42:32 host sshd[31146]: Failed password for invalid user temp from 51.91.99.201 port 47004 ssh2 Dec 31 10:42:32 host sshd[31146]: Received disconnect from 51.91.99.201 port 47004:11: Bye Bye [preauth] Dec 31 10:42:32 host sshd[31146]: Disconnected from 51.91.99.201 port 47004 [preauth] Dec 31 10:43:46 host sshd[31367]: User root from 185.167.99.101 not allowed because not listed in AllowUsers Dec 31 10:43:46 host sshd[31367]: input_userauth_request: invalid user root [preauth] Dec 31 10:43:46 host unix_chkpwd[31373]: password check failed for user (root) Dec 31 10:43:46 host sshd[31367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.167.99.101 user=root Dec 31 10:43:46 host sshd[31367]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 10:43:47 host sshd[31367]: Failed password for invalid user root from 185.167.99.101 port 29042 ssh2 Dec 31 10:43:48 host sshd[31367]: Received disconnect from 185.167.99.101 port 29042:11: Bye Bye [preauth] Dec 31 10:43:48 host sshd[31367]: Disconnected from 185.167.99.101 port 29042 [preauth] Dec 31 10:44:06 host sshd[31439]: Invalid user robert from 51.91.99.201 port 42734 Dec 31 10:44:06 host sshd[31439]: input_userauth_request: invalid user robert [preauth] Dec 31 10:44:06 host sshd[31439]: pam_unix(sshd:auth): check pass; user unknown Dec 31 10:44:06 host sshd[31439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.99.201 Dec 31 10:44:09 host sshd[31439]: Failed password for invalid user robert from 51.91.99.201 port 42734 ssh2 Dec 31 10:44:09 host sshd[31439]: Received disconnect from 51.91.99.201 port 42734:11: Bye Bye [preauth] Dec 31 10:44:09 host sshd[31439]: Disconnected from 51.91.99.201 port 42734 [preauth] Dec 31 10:44:19 host sshd[31475]: Invalid user sergio from 41.223.6.198 port 57652 Dec 31 10:44:19 host sshd[31475]: input_userauth_request: invalid user sergio [preauth] Dec 31 10:44:20 host sshd[31475]: pam_unix(sshd:auth): check pass; user unknown Dec 31 10:44:20 host sshd[31475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.223.6.198 Dec 31 10:44:21 host sshd[31475]: Failed password for invalid user sergio from 41.223.6.198 port 57652 ssh2 Dec 31 10:44:22 host sshd[31475]: Received disconnect from 41.223.6.198 port 57652:11: Bye Bye [preauth] Dec 31 10:44:22 host sshd[31475]: Disconnected from 41.223.6.198 port 57652 [preauth] Dec 31 10:45:34 host sshd[31886]: User root from 51.91.99.201 not allowed because not listed in AllowUsers Dec 31 10:45:34 host sshd[31886]: input_userauth_request: invalid user root [preauth] Dec 31 10:45:34 host unix_chkpwd[31890]: password check failed for user (root) Dec 31 10:45:34 host sshd[31886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.99.201 user=root Dec 31 10:45:34 host sshd[31886]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 10:45:35 host sshd[31886]: Failed password for invalid user root from 51.91.99.201 port 59294 ssh2 Dec 31 10:45:49 host sshd[31950]: User root from 185.167.99.101 not allowed because not listed in AllowUsers Dec 31 10:45:49 host sshd[31950]: input_userauth_request: invalid user root [preauth] Dec 31 10:45:49 host unix_chkpwd[31955]: password check failed for user (root) Dec 31 10:45:49 host sshd[31950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.167.99.101 user=root Dec 31 10:45:49 host sshd[31950]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 10:45:51 host sshd[31950]: Failed password for invalid user root from 185.167.99.101 port 50518 ssh2 Dec 31 10:46:10 host sshd[32044]: User root from 41.197.31.178 not allowed because not listed in AllowUsers Dec 31 10:46:10 host sshd[32044]: input_userauth_request: invalid user root [preauth] Dec 31 10:46:10 host unix_chkpwd[32050]: password check failed for user (root) Dec 31 10:46:10 host sshd[32044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 user=root Dec 31 10:46:10 host sshd[32044]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 10:46:13 host sshd[32044]: Failed password for invalid user root from 41.197.31.178 port 52772 ssh2 Dec 31 10:46:13 host sshd[32044]: Connection closed by 41.197.31.178 port 52772 [preauth] Dec 31 10:48:21 host sshd[32447]: Invalid user lx from 92.46.108.20 port 45754 Dec 31 10:48:21 host sshd[32447]: input_userauth_request: invalid user lx [preauth] Dec 31 10:48:22 host sshd[32447]: pam_unix(sshd:auth): check pass; user unknown Dec 31 10:48:22 host sshd[32447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 31 10:48:23 host sshd[32447]: Failed password for invalid user lx from 92.46.108.20 port 45754 ssh2 Dec 31 10:48:24 host sshd[32447]: Connection closed by 92.46.108.20 port 45754 [preauth] Dec 31 10:52:41 host sshd[1010]: Invalid user user from 131.0.0.11 port 60174 Dec 31 10:52:41 host sshd[1010]: input_userauth_request: invalid user user [preauth] Dec 31 10:52:41 host sshd[1010]: pam_unix(sshd:auth): check pass; user unknown Dec 31 10:52:41 host sshd[1010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.0.0.11 Dec 31 10:52:43 host sshd[1010]: Failed password for invalid user user from 131.0.0.11 port 60174 ssh2 Dec 31 10:52:44 host sshd[1010]: Connection closed by 131.0.0.11 port 60174 [preauth] Dec 31 10:56:24 host sshd[1614]: User root from 106.10.122.53 not allowed because not listed in AllowUsers Dec 31 10:56:24 host sshd[1614]: input_userauth_request: invalid user root [preauth] Dec 31 10:56:24 host unix_chkpwd[1617]: password check failed for user (root) Dec 31 10:56:24 host sshd[1614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 user=root Dec 31 10:56:24 host sshd[1614]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 10:56:26 host sshd[1614]: Failed password for invalid user root from 106.10.122.53 port 55244 ssh2 Dec 31 10:56:26 host sshd[1614]: Connection closed by 106.10.122.53 port 55244 [preauth] Dec 31 11:02:01 host sshd[2400]: User root from 103.127.67.194 not allowed because not listed in AllowUsers Dec 31 11:02:01 host sshd[2400]: input_userauth_request: invalid user root [preauth] Dec 31 11:02:01 host unix_chkpwd[2403]: password check failed for user (root) Dec 31 11:02:01 host sshd[2400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.127.67.194 user=root Dec 31 11:02:01 host sshd[2400]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 11:02:03 host sshd[2400]: Failed password for invalid user root from 103.127.67.194 port 42412 ssh2 Dec 31 11:02:03 host sshd[2400]: Received disconnect from 103.127.67.194 port 42412:11: Bye Bye [preauth] Dec 31 11:02:03 host sshd[2400]: Disconnected from 103.127.67.194 port 42412 [preauth] Dec 31 11:02:12 host sshd[2429]: Invalid user magento from 103.20.188.28 port 34382 Dec 31 11:02:12 host sshd[2429]: input_userauth_request: invalid user magento [preauth] Dec 31 11:02:12 host sshd[2429]: pam_unix(sshd:auth): check pass; user unknown Dec 31 11:02:12 host sshd[2429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.20.188.28 Dec 31 11:02:13 host sshd[2429]: Failed password for invalid user magento from 103.20.188.28 port 34382 ssh2 Dec 31 11:02:13 host sshd[2429]: Received disconnect from 103.20.188.28 port 34382:11: Bye Bye [preauth] Dec 31 11:02:13 host sshd[2429]: Disconnected from 103.20.188.28 port 34382 [preauth] Dec 31 11:02:49 host sshd[2495]: User root from 179.106.36.13 not allowed because not listed in AllowUsers Dec 31 11:02:49 host sshd[2495]: input_userauth_request: invalid user root [preauth] Dec 31 11:02:50 host unix_chkpwd[2499]: password check failed for user (root) Dec 31 11:02:50 host sshd[2495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.106.36.13 user=root Dec 31 11:02:50 host sshd[2495]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 11:02:51 host sshd[2495]: Failed password for invalid user root from 179.106.36.13 port 41194 ssh2 Dec 31 11:02:52 host sshd[2495]: Received disconnect from 179.106.36.13 port 41194:11: Bye Bye [preauth] Dec 31 11:02:52 host sshd[2495]: Disconnected from 179.106.36.13 port 41194 [preauth] Dec 31 11:03:09 host sshd[2525]: User root from 173.16.14.182 not allowed because not listed in AllowUsers Dec 31 11:03:09 host sshd[2525]: input_userauth_request: invalid user root [preauth] Dec 31 11:03:09 host unix_chkpwd[2528]: password check failed for user (root) Dec 31 11:03:09 host sshd[2525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.16.14.182 user=root Dec 31 11:03:09 host sshd[2525]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 11:03:11 host sshd[2525]: Failed password for invalid user root from 173.16.14.182 port 48938 ssh2 Dec 31 11:03:11 host sshd[2525]: Received disconnect from 173.16.14.182 port 48938:11: Bye Bye [preauth] Dec 31 11:03:11 host sshd[2525]: Disconnected from 173.16.14.182 port 48938 [preauth] Dec 31 11:03:50 host sshd[2604]: User root from 152.32.229.160 not allowed because not listed in AllowUsers Dec 31 11:03:50 host sshd[2604]: input_userauth_request: invalid user root [preauth] Dec 31 11:03:50 host unix_chkpwd[2607]: password check failed for user (root) Dec 31 11:03:50 host sshd[2604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.229.160 user=root Dec 31 11:03:50 host sshd[2604]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 11:03:52 host sshd[2610]: User root from 93.230.94.115 not allowed because not listed in AllowUsers Dec 31 11:03:52 host sshd[2610]: input_userauth_request: invalid user root [preauth] Dec 31 11:03:52 host unix_chkpwd[2613]: password check failed for user (root) Dec 31 11:03:52 host sshd[2610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.230.94.115 user=root Dec 31 11:03:52 host sshd[2610]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 11:03:52 host sshd[2604]: Failed password for invalid user root from 152.32.229.160 port 48118 ssh2 Dec 31 11:03:53 host sshd[2604]: Received disconnect from 152.32.229.160 port 48118:11: Bye Bye [preauth] Dec 31 11:03:53 host sshd[2604]: Disconnected from 152.32.229.160 port 48118 [preauth] Dec 31 11:03:54 host sshd[2610]: Failed password for invalid user root from 93.230.94.115 port 33464 ssh2 Dec 31 11:03:54 host sshd[2610]: Received disconnect from 93.230.94.115 port 33464:11: Bye Bye [preauth] Dec 31 11:03:54 host sshd[2610]: Disconnected from 93.230.94.115 port 33464 [preauth] Dec 31 11:05:03 host sshd[2768]: User root from 36.248.12.38 not allowed because not listed in AllowUsers Dec 31 11:05:03 host sshd[2768]: input_userauth_request: invalid user root [preauth] Dec 31 11:05:03 host unix_chkpwd[2772]: password check failed for user (root) Dec 31 11:05:03 host sshd[2768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.248.12.38 user=root Dec 31 11:05:03 host sshd[2768]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 11:05:06 host sshd[2768]: Failed password for invalid user root from 36.248.12.38 port 38568 ssh2 Dec 31 11:05:06 host sshd[2768]: Received disconnect from 36.248.12.38 port 38568:11: Bye Bye [preauth] Dec 31 11:05:06 host sshd[2768]: Disconnected from 36.248.12.38 port 38568 [preauth] Dec 31 11:06:28 host sshd[3062]: Invalid user gpadmin from 159.203.11.247 port 53324 Dec 31 11:06:28 host sshd[3062]: input_userauth_request: invalid user gpadmin [preauth] Dec 31 11:06:28 host sshd[3062]: pam_unix(sshd:auth): check pass; user unknown Dec 31 11:06:28 host sshd[3062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.11.247 Dec 31 11:06:31 host sshd[3062]: Failed password for invalid user gpadmin from 159.203.11.247 port 53324 ssh2 Dec 31 11:06:31 host sshd[3062]: Received disconnect from 159.203.11.247 port 53324:11: Bye Bye [preauth] Dec 31 11:06:31 host sshd[3062]: Disconnected from 159.203.11.247 port 53324 [preauth] Dec 31 11:07:23 host sshd[3130]: Invalid user hduser from 93.230.94.115 port 45726 Dec 31 11:07:23 host sshd[3130]: input_userauth_request: invalid user hduser [preauth] Dec 31 11:07:23 host sshd[3130]: pam_unix(sshd:auth): check pass; user unknown Dec 31 11:07:23 host sshd[3130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.230.94.115 Dec 31 11:07:25 host sshd[3130]: Failed password for invalid user hduser from 93.230.94.115 port 45726 ssh2 Dec 31 11:07:25 host sshd[3130]: Received disconnect from 93.230.94.115 port 45726:11: Bye Bye [preauth] Dec 31 11:07:25 host sshd[3130]: Disconnected from 93.230.94.115 port 45726 [preauth] Dec 31 11:08:12 host sshd[3271]: Invalid user user from 159.203.11.247 port 57190 Dec 31 11:08:12 host sshd[3271]: input_userauth_request: invalid user user [preauth] Dec 31 11:08:12 host sshd[3271]: pam_unix(sshd:auth): check pass; user unknown Dec 31 11:08:12 host sshd[3271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.11.247 Dec 31 11:08:14 host sshd[3271]: Failed password for invalid user user from 159.203.11.247 port 57190 ssh2 Dec 31 11:08:14 host sshd[3271]: Received disconnect from 159.203.11.247 port 57190:11: Bye Bye [preauth] Dec 31 11:08:14 host sshd[3271]: Disconnected from 159.203.11.247 port 57190 [preauth] Dec 31 11:08:15 host sshd[3280]: Invalid user ubuntu from 103.127.67.194 port 54628 Dec 31 11:08:15 host sshd[3280]: input_userauth_request: invalid user ubuntu [preauth] Dec 31 11:08:15 host sshd[3280]: pam_unix(sshd:auth): check pass; user unknown Dec 31 11:08:15 host sshd[3280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.127.67.194 Dec 31 11:08:17 host sshd[3280]: Failed password for invalid user ubuntu from 103.127.67.194 port 54628 ssh2 Dec 31 11:08:17 host sshd[3280]: Received disconnect from 103.127.67.194 port 54628:11: Bye Bye [preauth] Dec 31 11:08:17 host sshd[3280]: Disconnected from 103.127.67.194 port 54628 [preauth] Dec 31 11:08:24 host sshd[3291]: Invalid user torrent from 173.16.14.182 port 44242 Dec 31 11:08:24 host sshd[3291]: input_userauth_request: invalid user torrent [preauth] Dec 31 11:08:24 host sshd[3291]: pam_unix(sshd:auth): check pass; user unknown Dec 31 11:08:24 host sshd[3291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.16.14.182 Dec 31 11:08:25 host sshd[3291]: Failed password for invalid user torrent from 173.16.14.182 port 44242 ssh2 Dec 31 11:08:39 host sshd[3404]: User root from 103.20.188.28 not allowed because not listed in AllowUsers Dec 31 11:08:39 host sshd[3404]: input_userauth_request: invalid user root [preauth] Dec 31 11:08:40 host unix_chkpwd[3406]: password check failed for user (root) Dec 31 11:08:40 host sshd[3404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.20.188.28 user=root Dec 31 11:08:40 host sshd[3404]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 11:08:41 host sshd[3404]: Failed password for invalid user root from 103.20.188.28 port 34866 ssh2 Dec 31 11:08:42 host sshd[3404]: Received disconnect from 103.20.188.28 port 34866:11: Bye Bye [preauth] Dec 31 11:08:42 host sshd[3404]: Disconnected from 103.20.188.28 port 34866 [preauth] Dec 31 11:09:03 host sshd[3467]: User root from 152.32.229.160 not allowed because not listed in AllowUsers Dec 31 11:09:03 host sshd[3467]: input_userauth_request: invalid user root [preauth] Dec 31 11:09:03 host unix_chkpwd[3489]: password check failed for user (root) Dec 31 11:09:03 host sshd[3467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.229.160 user=root Dec 31 11:09:03 host sshd[3467]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 11:09:05 host sshd[3467]: Failed password for invalid user root from 152.32.229.160 port 42146 ssh2 Dec 31 11:09:05 host sshd[3467]: Received disconnect from 152.32.229.160 port 42146:11: Bye Bye [preauth] Dec 31 11:09:05 host sshd[3467]: Disconnected from 152.32.229.160 port 42146 [preauth] Dec 31 11:09:11 host sshd[3528]: Invalid user ec2-user from 179.106.36.13 port 36864 Dec 31 11:09:11 host sshd[3528]: input_userauth_request: invalid user ec2-user [preauth] Dec 31 11:09:11 host sshd[3528]: pam_unix(sshd:auth): check pass; user unknown Dec 31 11:09:11 host sshd[3528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.106.36.13 Dec 31 11:09:13 host sshd[3528]: Failed password for invalid user ec2-user from 179.106.36.13 port 36864 ssh2 Dec 31 11:09:14 host sshd[3528]: Received disconnect from 179.106.36.13 port 36864:11: Bye Bye [preauth] Dec 31 11:09:14 host sshd[3528]: Disconnected from 179.106.36.13 port 36864 [preauth] Dec 31 11:09:19 host sshd[3576]: Invalid user fox from 159.203.11.247 port 57038 Dec 31 11:09:19 host sshd[3576]: input_userauth_request: invalid user fox [preauth] Dec 31 11:09:19 host sshd[3576]: pam_unix(sshd:auth): check pass; user unknown Dec 31 11:09:19 host sshd[3576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.11.247 Dec 31 11:09:21 host sshd[3576]: Failed password for invalid user fox from 159.203.11.247 port 57038 ssh2 Dec 31 11:17:49 host sshd[4904]: User root from 36.248.12.38 not allowed because not listed in AllowUsers Dec 31 11:17:49 host sshd[4904]: input_userauth_request: invalid user root [preauth] Dec 31 11:17:49 host unix_chkpwd[4908]: password check failed for user (root) Dec 31 11:17:49 host sshd[4904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.248.12.38 user=root Dec 31 11:17:49 host sshd[4904]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 11:17:52 host sshd[4904]: Failed password for invalid user root from 36.248.12.38 port 44718 ssh2 Dec 31 11:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 11:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 11:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 11:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 11:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 11:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 11:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 11:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 11:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 31 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 31 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 31 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 31 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 31 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 31 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 31 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 11:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 31 11:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 11:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 11:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 11:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 11:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 11:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 31 11:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 11:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 11:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=wwwresourcehunte user-3=keralaholi user-4=wwwrmswll user-5=ugotscom user-6=travelboniface user-7=cochintaxi user-8=wwwkaretakers user-9=laundryboniface user-10=a2zgroup user-11=dartsimp user-12=straightcurve user-13=wwwletsstalkfood user-14=bonifacegroup user-15=wwwevmhonda user-16=mrsclean user-17=wwwnexidigital user-18=palco123 user-19=gifterman user-20=kottayamcalldriv user-21=phmetals user-22=woodpeck user-23=wwwkapin user-24=wwwkmaorg user-25=disposeat user-26=remysagr user-27=pmcresources user-28=vfmassets user-29=shalinijames user-30=wwwtestugo feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 31 11:21:50 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 31 11:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 11:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 11:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 11:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 11:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 11:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-vrPr2I6IzvaAYUIi.~ Dec 31 11:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 11:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 11:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-vrPr2I6IzvaAYUIi.~' Dec 31 11:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 11:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 11:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-vrPr2I6IzvaAYUIi.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 11:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 11:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 11:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 31 11:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 11:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 11:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 31 11:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 11:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 11:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 11:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 11:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 11:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 11:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 11:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 11:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 11:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 11:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 11:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 31 11:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 11:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 11:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 11:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 11:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 31 11:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 31 11:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 31 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 31 11:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 11:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 11:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 31 11:21:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 11:21:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 11:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 31 11:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 11:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 11:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 31 11:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 11:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 11:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 31 11:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 11:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 11:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 31 11:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 11:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 11:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 31 11:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 11:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 11:25:44 host sshd[6337]: Invalid user user1 from 103.13.40.2 port 54138 Dec 31 11:25:44 host sshd[6337]: input_userauth_request: invalid user user1 [preauth] Dec 31 11:25:44 host sshd[6337]: pam_unix(sshd:auth): check pass; user unknown Dec 31 11:25:44 host sshd[6337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 31 11:25:47 host sshd[6337]: Failed password for invalid user user1 from 103.13.40.2 port 54138 ssh2 Dec 31 11:25:47 host sshd[6337]: Connection closed by 103.13.40.2 port 54138 [preauth] Dec 31 11:33:58 host sshd[7481]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Dec 31 11:33:58 host sshd[7481]: input_userauth_request: invalid user root [preauth] Dec 31 11:33:58 host unix_chkpwd[7485]: password check failed for user (root) Dec 31 11:33:58 host sshd[7481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Dec 31 11:33:58 host sshd[7481]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 11:34:00 host sshd[7481]: Failed password for invalid user root from 162.218.126.136 port 60266 ssh2 Dec 31 11:34:00 host sshd[7481]: Connection closed by 162.218.126.136 port 60266 [preauth] Dec 31 11:51:41 host sshd[10057]: Did not receive identification string from 45.164.131.5 port 48724 Dec 31 12:01:56 host sshd[11708]: Invalid user username from 193.169.255.30 port 42334 Dec 31 12:01:56 host sshd[11708]: input_userauth_request: invalid user username [preauth] Dec 31 12:01:56 host sshd[11708]: pam_unix(sshd:auth): check pass; user unknown Dec 31 12:01:56 host sshd[11708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.169.255.30 Dec 31 12:01:58 host sshd[11708]: Failed password for invalid user username from 193.169.255.30 port 42334 ssh2 Dec 31 12:02:01 host sshd[11708]: pam_unix(sshd:auth): check pass; user unknown Dec 31 12:02:04 host sshd[11708]: Failed password for invalid user username from 193.169.255.30 port 42334 ssh2 Dec 31 12:02:07 host sshd[11708]: pam_unix(sshd:auth): check pass; user unknown Dec 31 12:02:09 host sshd[11708]: Failed password for invalid user username from 193.169.255.30 port 42334 ssh2 Dec 31 12:02:12 host sshd[11708]: pam_unix(sshd:auth): check pass; user unknown Dec 31 12:02:15 host sshd[11708]: Failed password for invalid user username from 193.169.255.30 port 42334 ssh2 Dec 31 12:02:18 host sshd[11708]: pam_unix(sshd:auth): check pass; user unknown Dec 31 12:02:20 host sshd[11708]: Failed password for invalid user username from 193.169.255.30 port 42334 ssh2 Dec 31 12:08:42 host sshd[12792]: Connection closed by 45.79.181.251 port 40746 [preauth] Dec 31 12:08:45 host sshd[12796]: Connection closed by 45.79.181.251 port 40762 [preauth] Dec 31 12:08:47 host sshd[12801]: Connection closed by 45.79.181.251 port 40776 [preauth] Dec 31 12:20:40 host sshd[15314]: Invalid user lzw from 106.10.122.53 port 41964 Dec 31 12:20:40 host sshd[15314]: input_userauth_request: invalid user lzw [preauth] Dec 31 12:20:40 host sshd[15314]: pam_unix(sshd:auth): check pass; user unknown Dec 31 12:20:40 host sshd[15314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 31 12:20:43 host sshd[15314]: Failed password for invalid user lzw from 106.10.122.53 port 41964 ssh2 Dec 31 12:20:43 host sshd[15314]: Connection closed by 106.10.122.53 port 41964 [preauth] Dec 31 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 12:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 12:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 12:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 12:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 31 12:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 12:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 12:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 31 12:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 12:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 12:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 31 12:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 12:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 12:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 31 12:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 12:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 12:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 31 12:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 12:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 12:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 31 12:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 12:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 12:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 31 12:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 12:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 12:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 31 12:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 12:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 12:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 12:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 12:22:05 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 12:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 31 12:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 12:22:05 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 12:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=ugotscom user-2=wwwrmswll user-3=keralaholi user-4=wwwresourcehunte user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=dartsimp user-9=a2zgroup user-10=wwwkaretakers user-11=cochintaxi user-12=mrsclean user-13=wwwnexidigital user-14=kottayamcalldriv user-15=phmetals user-16=gifterman user-17=palco123 user-18=straightcurve user-19=wwwletsstalkfood user-20=wwwevmhonda user-21=bonifacegroup user-22=pmcresources user-23=wwwtestugo user-24=shalinijames user-25=vfmassets user-26=wwwkapin user-27=woodpeck user-28=disposeat user-29=remysagr user-30=wwwkmaorg feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 31 12:22:05 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 31 12:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 12:22:06 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 12:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 12:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 12:22:06 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 12:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cmcPYzrtKPaHxJt5.~ Dec 31 12:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 12:22:06 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 12:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cmcPYzrtKPaHxJt5.~' Dec 31 12:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 12:22:06 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 12:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cmcPYzrtKPaHxJt5.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 12:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 12:22:06 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 12:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 31 12:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 12:22:06 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 12:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 31 12:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 12:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 12:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 12:22:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 12:22:07 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 12:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 12:22:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 12:22:07 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 12:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 12:22:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 12:22:07 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 12:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 31 12:22:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 12:22:07 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 12:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 12:22:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 12:22:08 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 12:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 31 12:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 31 12:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 31 12:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 31 12:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 12:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 12:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 31 12:22:15 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 12:22:16 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 12:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 31 12:22:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 12:22:18 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 12:22:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 31 12:22:18 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 12:22:18 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 12:22:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 31 12:22:18 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 12:22:21 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 12:22:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 31 12:22:21 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 12:22:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 12:22:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 31 12:22:22 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 12:22:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 12:26:24 host sshd[16260]: Did not receive identification string from 20.228.192.73 port 47840 Dec 31 12:29:31 host sshd[16598]: Invalid user admin from 103.204.131.124 port 50920 Dec 31 12:29:31 host sshd[16598]: input_userauth_request: invalid user admin [preauth] Dec 31 12:29:31 host sshd[16598]: pam_unix(sshd:auth): check pass; user unknown Dec 31 12:29:31 host sshd[16598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.204.131.124 Dec 31 12:29:33 host sshd[16598]: Failed password for invalid user admin from 103.204.131.124 port 50920 ssh2 Dec 31 12:29:33 host sshd[16598]: Received disconnect from 103.204.131.124 port 50920:11: Bye Bye [preauth] Dec 31 12:29:33 host sshd[16598]: Disconnected from 103.204.131.124 port 50920 [preauth] Dec 31 12:30:30 host sshd[16767]: Invalid user hadoop from 41.197.31.178 port 51972 Dec 31 12:30:30 host sshd[16767]: input_userauth_request: invalid user hadoop [preauth] Dec 31 12:30:31 host sshd[16767]: pam_unix(sshd:auth): check pass; user unknown Dec 31 12:30:31 host sshd[16767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 31 12:30:32 host sshd[16801]: Invalid user amssys from 128.199.95.60 port 57872 Dec 31 12:30:32 host sshd[16801]: input_userauth_request: invalid user amssys [preauth] Dec 31 12:30:32 host sshd[16801]: pam_unix(sshd:auth): check pass; user unknown Dec 31 12:30:32 host sshd[16801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.95.60 Dec 31 12:30:33 host sshd[16767]: Failed password for invalid user hadoop from 41.197.31.178 port 51972 ssh2 Dec 31 12:30:33 host sshd[16767]: Connection closed by 41.197.31.178 port 51972 [preauth] Dec 31 12:30:33 host sshd[16801]: Failed password for invalid user amssys from 128.199.95.60 port 57872 ssh2 Dec 31 12:30:33 host sshd[16801]: Received disconnect from 128.199.95.60 port 57872:11: Bye Bye [preauth] Dec 31 12:30:33 host sshd[16801]: Disconnected from 128.199.95.60 port 57872 [preauth] Dec 31 12:32:42 host sshd[17071]: Invalid user mycat from 103.204.131.124 port 39606 Dec 31 12:32:42 host sshd[17071]: input_userauth_request: invalid user mycat [preauth] Dec 31 12:32:42 host sshd[17071]: pam_unix(sshd:auth): check pass; user unknown Dec 31 12:32:42 host sshd[17071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.204.131.124 Dec 31 12:32:44 host sshd[17071]: Failed password for invalid user mycat from 103.204.131.124 port 39606 ssh2 Dec 31 12:32:44 host sshd[17071]: Received disconnect from 103.204.131.124 port 39606:11: Bye Bye [preauth] Dec 31 12:32:44 host sshd[17071]: Disconnected from 103.204.131.124 port 39606 [preauth] Dec 31 12:33:10 host sshd[17114]: User root from 128.199.95.60 not allowed because not listed in AllowUsers Dec 31 12:33:10 host sshd[17114]: input_userauth_request: invalid user root [preauth] Dec 31 12:33:10 host unix_chkpwd[17116]: password check failed for user (root) Dec 31 12:33:10 host sshd[17114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.95.60 user=root Dec 31 12:33:10 host sshd[17114]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 12:33:12 host sshd[17114]: Failed password for invalid user root from 128.199.95.60 port 37460 ssh2 Dec 31 12:33:12 host sshd[17114]: Received disconnect from 128.199.95.60 port 37460:11: Bye Bye [preauth] Dec 31 12:33:12 host sshd[17114]: Disconnected from 128.199.95.60 port 37460 [preauth] Dec 31 12:34:14 host sshd[17281]: User root from 103.204.131.124 not allowed because not listed in AllowUsers Dec 31 12:34:14 host sshd[17281]: input_userauth_request: invalid user root [preauth] Dec 31 12:34:14 host unix_chkpwd[17284]: password check failed for user (root) Dec 31 12:34:14 host sshd[17281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.204.131.124 user=root Dec 31 12:34:14 host sshd[17281]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 12:34:17 host sshd[17281]: Failed password for invalid user root from 103.204.131.124 port 42772 ssh2 Dec 31 12:34:17 host sshd[17281]: Received disconnect from 103.204.131.124 port 42772:11: Bye Bye [preauth] Dec 31 12:34:17 host sshd[17281]: Disconnected from 103.204.131.124 port 42772 [preauth] Dec 31 12:34:18 host sshd[17286]: Invalid user fo from 45.93.201.90 port 57610 Dec 31 12:34:18 host sshd[17286]: input_userauth_request: invalid user fo [preauth] Dec 31 12:34:18 host sshd[17286]: pam_unix(sshd:auth): check pass; user unknown Dec 31 12:34:18 host sshd[17286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 31 12:34:20 host sshd[17286]: Failed password for invalid user fo from 45.93.201.90 port 57610 ssh2 Dec 31 12:34:23 host sshd[17286]: pam_unix(sshd:auth): check pass; user unknown Dec 31 12:34:25 host sshd[17286]: Failed password for invalid user fo from 45.93.201.90 port 57610 ssh2 Dec 31 12:34:28 host sshd[17286]: pam_unix(sshd:auth): check pass; user unknown Dec 31 12:34:31 host sshd[17286]: Failed password for invalid user fo from 45.93.201.90 port 57610 ssh2 Dec 31 12:34:34 host sshd[17286]: Connection closed by 45.93.201.90 port 57610 [preauth] Dec 31 12:34:34 host sshd[17286]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 31 12:39:35 host sshd[18025]: Invalid user dell from 162.218.126.136 port 46486 Dec 31 12:39:35 host sshd[18025]: input_userauth_request: invalid user dell [preauth] Dec 31 12:39:36 host sshd[18025]: pam_unix(sshd:auth): check pass; user unknown Dec 31 12:39:36 host sshd[18025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 31 12:39:38 host sshd[18025]: Failed password for invalid user dell from 162.218.126.136 port 46486 ssh2 Dec 31 12:39:38 host sshd[18025]: Connection closed by 162.218.126.136 port 46486 [preauth] Dec 31 12:48:24 host sshd[19233]: Invalid user from 64.62.197.58 port 5289 Dec 31 12:48:24 host sshd[19233]: input_userauth_request: invalid user [preauth] Dec 31 12:48:27 host sshd[19233]: Connection closed by 64.62.197.58 port 5289 [preauth] Dec 31 12:54:24 host sshd[20045]: User root from 103.13.40.2 not allowed because not listed in AllowUsers Dec 31 12:54:24 host sshd[20045]: input_userauth_request: invalid user root [preauth] Dec 31 12:54:24 host unix_chkpwd[20048]: password check failed for user (root) Dec 31 12:54:24 host sshd[20045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 user=root Dec 31 12:54:24 host sshd[20045]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 12:54:25 host sshd[20045]: Failed password for invalid user root from 103.13.40.2 port 60922 ssh2 Dec 31 12:54:25 host sshd[20045]: Connection closed by 103.13.40.2 port 60922 [preauth] Dec 31 13:03:31 host sshd[21275]: Invalid user jeffrey from 107.189.30.59 port 41224 Dec 31 13:03:31 host sshd[21275]: input_userauth_request: invalid user jeffrey [preauth] Dec 31 13:03:31 host sshd[21275]: pam_unix(sshd:auth): check pass; user unknown Dec 31 13:03:31 host sshd[21275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Dec 31 13:03:33 host sshd[21275]: Failed password for invalid user jeffrey from 107.189.30.59 port 41224 ssh2 Dec 31 13:03:34 host sshd[21275]: Connection closed by 107.189.30.59 port 41224 [preauth] Dec 31 13:19:13 host sshd[23270]: Invalid user zhangyi from 92.46.108.20 port 39242 Dec 31 13:19:13 host sshd[23270]: input_userauth_request: invalid user zhangyi [preauth] Dec 31 13:19:14 host sshd[23270]: pam_unix(sshd:auth): check pass; user unknown Dec 31 13:19:14 host sshd[23270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 31 13:19:16 host sshd[23270]: Failed password for invalid user zhangyi from 92.46.108.20 port 39242 ssh2 Dec 31 13:19:17 host sshd[23270]: Connection closed by 92.46.108.20 port 39242 [preauth] Dec 31 13:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 13:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 13:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 13:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 13:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 13:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 13:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 13:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 13:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 13:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 31 13:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 13:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 13:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 31 13:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 13:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 13:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 31 13:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 13:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 13:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 31 13:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 13:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 13:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 31 13:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 13:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 13:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 31 13:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 13:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 13:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 31 13:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 13:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 13:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 31 13:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 13:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 31 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 13:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 13:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=travelboniface user-2=ugotscom user-3=wwwrmswll user-4=keralaholi user-5=wwwresourcehunte user-6=wwwpmcresource user-7=dartsimp user-8=a2zgroup user-9=laundryboniface user-10=wwwkaretakers user-11=cochintaxi user-12=phmetals user-13=kottayamcalldriv user-14=gifterman user-15=palco123 user-16=mrsclean user-17=wwwnexidigital user-18=wwwevmhonda user-19=bonifacegroup user-20=wwwletsstalkfood user-21=straightcurve user-22=wwwtestugo user-23=shalinijames user-24=vfmassets user-25=pmcresources user-26=remysagr user-27=disposeat user-28=wwwkmaorg user-29=wwwkapin user-30=woodpeck feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 31 13:21:49 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 31 13:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 13:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 13:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 13:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 13:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 13:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-pd3TMWzvU0Hy9dW7.~ Dec 31 13:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 13:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 13:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-pd3TMWzvU0Hy9dW7.~' Dec 31 13:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 13:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 13:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-pd3TMWzvU0Hy9dW7.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 13:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 13:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 13:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 31 13:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 13:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 13:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 31 13:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 13:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 13:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 13:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 13:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 13:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 13:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 13:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 13:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 13:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 13:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 13:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 31 13:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 13:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 13:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 13:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 13:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 13:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 31 13:21:51 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 31 13:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 31 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 31 13:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 13:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 13:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 31 13:22:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 13:22:01 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 13:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 31 13:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 13:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 13:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 31 13:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 13:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 13:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 31 13:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 13:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 13:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 31 13:22:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 13:22:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 13:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 31 13:22:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 13:22:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 13:38:23 host sshd[25983]: Did not receive identification string from 193.42.33.214 port 37266 Dec 31 13:38:39 host sshd[26024]: User root from 193.42.33.214 not allowed because not listed in AllowUsers Dec 31 13:38:39 host sshd[26024]: input_userauth_request: invalid user root [preauth] Dec 31 13:38:39 host unix_chkpwd[26027]: password check failed for user (root) Dec 31 13:38:39 host sshd[26024]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.42.33.214 user=root Dec 31 13:38:39 host sshd[26024]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 13:38:41 host sshd[26024]: Failed password for invalid user root from 193.42.33.214 port 33902 ssh2 Dec 31 13:38:41 host sshd[26024]: Received disconnect from 193.42.33.214 port 33902:11: Normal Shutdown, Thank you for playing [preauth] Dec 31 13:38:41 host sshd[26024]: Disconnected from 193.42.33.214 port 33902 [preauth] Dec 31 13:38:55 host sshd[26039]: User root from 193.42.33.214 not allowed because not listed in AllowUsers Dec 31 13:38:55 host sshd[26039]: input_userauth_request: invalid user root [preauth] Dec 31 13:38:55 host unix_chkpwd[26042]: password check failed for user (root) Dec 31 13:38:55 host sshd[26039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.42.33.214 user=root Dec 31 13:38:55 host sshd[26039]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 13:38:57 host sshd[26039]: Failed password for invalid user root from 193.42.33.214 port 38310 ssh2 Dec 31 13:45:21 host sshd[26925]: Invalid user user from 106.10.122.53 port 38546 Dec 31 13:45:21 host sshd[26925]: input_userauth_request: invalid user user [preauth] Dec 31 13:45:21 host sshd[26925]: pam_unix(sshd:auth): check pass; user unknown Dec 31 13:45:21 host sshd[26925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 31 13:45:21 host sshd[26923]: Invalid user amax from 162.218.126.136 port 49516 Dec 31 13:45:21 host sshd[26923]: input_userauth_request: invalid user amax [preauth] Dec 31 13:45:21 host sshd[26923]: pam_unix(sshd:auth): check pass; user unknown Dec 31 13:45:21 host sshd[26923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 31 13:45:24 host sshd[26925]: Failed password for invalid user user from 106.10.122.53 port 38546 ssh2 Dec 31 13:45:24 host sshd[26925]: Connection closed by 106.10.122.53 port 38546 [preauth] Dec 31 13:45:24 host sshd[26923]: Failed password for invalid user amax from 162.218.126.136 port 49516 ssh2 Dec 31 13:45:24 host sshd[26923]: Connection closed by 162.218.126.136 port 49516 [preauth] Dec 31 13:50:45 host sshd[27631]: Invalid user admin from 118.194.253.80 port 55944 Dec 31 13:50:45 host sshd[27631]: input_userauth_request: invalid user admin [preauth] Dec 31 13:50:45 host sshd[27631]: pam_unix(sshd:auth): check pass; user unknown Dec 31 13:50:45 host sshd[27631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.194.253.80 Dec 31 13:50:47 host sshd[27631]: Failed password for invalid user admin from 118.194.253.80 port 55944 ssh2 Dec 31 13:50:47 host sshd[27631]: Received disconnect from 118.194.253.80 port 55944:11: Bye Bye [preauth] Dec 31 13:50:47 host sshd[27631]: Disconnected from 118.194.253.80 port 55944 [preauth] Dec 31 13:55:47 host sshd[28261]: Invalid user admin from 210.17.230.213 port 17002 Dec 31 13:55:47 host sshd[28261]: input_userauth_request: invalid user admin [preauth] Dec 31 13:55:47 host sshd[28261]: pam_unix(sshd:auth): check pass; user unknown Dec 31 13:55:47 host sshd[28261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.17.230.213 Dec 31 13:55:50 host sshd[28261]: Failed password for invalid user admin from 210.17.230.213 port 17002 ssh2 Dec 31 13:55:50 host sshd[28261]: Received disconnect from 210.17.230.213 port 17002:11: Bye Bye [preauth] Dec 31 13:55:50 host sshd[28261]: Disconnected from 210.17.230.213 port 17002 [preauth] Dec 31 13:56:58 host sshd[28388]: Invalid user ubuntu from 118.194.253.80 port 57280 Dec 31 13:56:58 host sshd[28388]: input_userauth_request: invalid user ubuntu [preauth] Dec 31 13:56:58 host sshd[28388]: pam_unix(sshd:auth): check pass; user unknown Dec 31 13:56:58 host sshd[28388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.194.253.80 Dec 31 13:57:00 host sshd[28388]: Failed password for invalid user ubuntu from 118.194.253.80 port 57280 ssh2 Dec 31 13:57:00 host sshd[28388]: Received disconnect from 118.194.253.80 port 57280:11: Bye Bye [preauth] Dec 31 13:57:00 host sshd[28388]: Disconnected from 118.194.253.80 port 57280 [preauth] Dec 31 13:58:29 host sshd[28624]: Invalid user ubuntu from 210.17.230.213 port 40456 Dec 31 13:58:29 host sshd[28624]: input_userauth_request: invalid user ubuntu [preauth] Dec 31 13:58:29 host sshd[28624]: pam_unix(sshd:auth): check pass; user unknown Dec 31 13:58:29 host sshd[28624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.17.230.213 Dec 31 13:58:32 host sshd[28624]: Failed password for invalid user ubuntu from 210.17.230.213 port 40456 ssh2 Dec 31 13:58:32 host sshd[28624]: Received disconnect from 210.17.230.213 port 40456:11: Bye Bye [preauth] Dec 31 13:58:32 host sshd[28624]: Disconnected from 210.17.230.213 port 40456 [preauth] Dec 31 13:58:32 host sshd[28635]: User root from 118.194.253.80 not allowed because not listed in AllowUsers Dec 31 13:58:32 host sshd[28635]: input_userauth_request: invalid user root [preauth] Dec 31 13:58:32 host unix_chkpwd[28644]: password check failed for user (root) Dec 31 13:58:32 host sshd[28635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.194.253.80 user=root Dec 31 13:58:32 host sshd[28635]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 13:58:34 host sshd[28635]: Failed password for invalid user root from 118.194.253.80 port 57508 ssh2 Dec 31 13:58:34 host sshd[28635]: Received disconnect from 118.194.253.80 port 57508:11: Bye Bye [preauth] Dec 31 13:58:34 host sshd[28635]: Disconnected from 118.194.253.80 port 57508 [preauth] Dec 31 13:59:57 host sshd[28964]: User root from 210.17.230.213 not allowed because not listed in AllowUsers Dec 31 13:59:57 host sshd[28964]: input_userauth_request: invalid user root [preauth] Dec 31 13:59:57 host unix_chkpwd[28969]: password check failed for user (root) Dec 31 13:59:57 host sshd[28964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.17.230.213 user=root Dec 31 13:59:57 host sshd[28964]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 13:59:59 host sshd[28964]: Failed password for invalid user root from 210.17.230.213 port 19845 ssh2 Dec 31 13:59:59 host sshd[28964]: Received disconnect from 210.17.230.213 port 19845:11: Bye Bye [preauth] Dec 31 13:59:59 host sshd[28964]: Disconnected from 210.17.230.213 port 19845 [preauth] Dec 31 14:14:31 host sshd[30978]: Invalid user user from 41.197.31.178 port 53274 Dec 31 14:14:31 host sshd[30978]: input_userauth_request: invalid user user [preauth] Dec 31 14:14:31 host sshd[30978]: pam_unix(sshd:auth): check pass; user unknown Dec 31 14:14:31 host sshd[30978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 31 14:14:33 host sshd[30978]: Failed password for invalid user user from 41.197.31.178 port 53274 ssh2 Dec 31 14:14:34 host sshd[30978]: Connection closed by 41.197.31.178 port 53274 [preauth] Dec 31 14:20:24 host sshd[31767]: Invalid user user01 from 103.13.40.2 port 43886 Dec 31 14:20:24 host sshd[31767]: input_userauth_request: invalid user user01 [preauth] Dec 31 14:20:24 host sshd[31767]: pam_unix(sshd:auth): check pass; user unknown Dec 31 14:20:24 host sshd[31767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 31 14:20:26 host sshd[31767]: Failed password for invalid user user01 from 103.13.40.2 port 43886 ssh2 Dec 31 14:20:26 host sshd[31767]: Connection closed by 103.13.40.2 port 43886 [preauth] Dec 31 14:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 14:21:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 14:21:47 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 14:21:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 14:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 14:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 14:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 14:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 14:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 14:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 31 14:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 14:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 14:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 31 14:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 14:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 14:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 31 14:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 14:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 14:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 31 14:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 14:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 14:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 31 14:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 14:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 14:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 31 14:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 14:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 14:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 31 14:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 14:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 14:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 31 14:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 14:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 31 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=wwwrmswll user-4=keralaholi user-5=wwwresourcehunte user-6=ugotscom user-7=cochintaxi user-8=wwwkaretakers user-9=dartsimp user-10=a2zgroup user-11=laundryboniface user-12=bonifacegroup user-13=wwwevmhonda user-14=straightcurve user-15=wwwletsstalkfood user-16=gifterman user-17=palco123 user-18=phmetals user-19=kottayamcalldriv user-20=mrsclean user-21=wwwnexidigital user-22=disposeat user-23=remysagr user-24=wwwkmaorg user-25=woodpeck user-26=wwwkapin user-27=vfmassets user-28=wwwtestugo user-29=shalinijames user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 31 14:21:50 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 31 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-UvWScIF2da7Ay1ko.~ Dec 31 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-UvWScIF2da7Ay1ko.~' Dec 31 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-UvWScIF2da7Ay1ko.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 14:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 31 14:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 14:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 14:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 31 14:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 14:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 14:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 31 14:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 14:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 14:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 14:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 31 14:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 31 14:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 31 14:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 31 14:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 14:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 14:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 31 14:21:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 14:22:00 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 14:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 31 14:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 14:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 14:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 31 14:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 14:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 14:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 31 14:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 14:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 14:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 31 14:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 14:22:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 14:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 31 14:22:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 14:22:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 14:43:03 host sshd[2572]: Did not receive identification string from 185.173.145.5 port 53494 Dec 31 14:43:21 host sshd[2588]: User root from 185.173.145.5 not allowed because not listed in AllowUsers Dec 31 14:43:21 host sshd[2588]: input_userauth_request: invalid user root [preauth] Dec 31 14:43:21 host unix_chkpwd[2591]: password check failed for user (root) Dec 31 14:43:21 host sshd[2588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.173.145.5 user=root Dec 31 14:43:21 host sshd[2588]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 14:43:23 host sshd[2588]: Failed password for invalid user root from 185.173.145.5 port 55922 ssh2 Dec 31 14:43:23 host sshd[2588]: Received disconnect from 185.173.145.5 port 55922:11: Normal Shutdown, Thank you for playing [preauth] Dec 31 14:43:23 host sshd[2588]: Disconnected from 185.173.145.5 port 55922 [preauth] Dec 31 14:43:33 host sshd[2625]: User root from 185.173.145.5 not allowed because not listed in AllowUsers Dec 31 14:43:33 host sshd[2625]: input_userauth_request: invalid user root [preauth] Dec 31 14:43:33 host unix_chkpwd[2633]: password check failed for user (root) Dec 31 14:43:33 host sshd[2625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.173.145.5 user=root Dec 31 14:43:33 host sshd[2625]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 14:43:35 host sshd[2625]: Failed password for invalid user root from 185.173.145.5 port 36090 ssh2 Dec 31 14:43:35 host sshd[2625]: Received disconnect from 185.173.145.5 port 36090:11: Normal Shutdown, Thank you for playing [preauth] Dec 31 14:43:35 host sshd[2625]: Disconnected from 185.173.145.5 port 36090 [preauth] Dec 31 14:50:58 host sshd[3852]: Invalid user huawei from 162.218.126.136 port 45580 Dec 31 14:50:58 host sshd[3852]: input_userauth_request: invalid user huawei [preauth] Dec 31 14:50:58 host sshd[3852]: pam_unix(sshd:auth): check pass; user unknown Dec 31 14:50:58 host sshd[3852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 31 14:51:00 host sshd[3852]: Failed password for invalid user huawei from 162.218.126.136 port 45580 ssh2 Dec 31 14:51:00 host sshd[3852]: Connection closed by 162.218.126.136 port 45580 [preauth] Dec 31 14:53:48 host sshd[4237]: Did not receive identification string from 58.72.18.130 port 14475 Dec 31 15:09:49 host sshd[6361]: Invalid user b from 106.10.122.53 port 42972 Dec 31 15:09:49 host sshd[6361]: input_userauth_request: invalid user b [preauth] Dec 31 15:09:49 host sshd[6361]: pam_unix(sshd:auth): check pass; user unknown Dec 31 15:09:49 host sshd[6361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 31 15:09:51 host sshd[6361]: Failed password for invalid user b from 106.10.122.53 port 42972 ssh2 Dec 31 15:09:51 host sshd[6361]: Connection closed by 106.10.122.53 port 42972 [preauth] Dec 31 15:11:04 host sshd[6510]: Invalid user admin from 194.169.175.102 port 64680 Dec 31 15:11:04 host sshd[6510]: input_userauth_request: invalid user admin [preauth] Dec 31 15:11:04 host sshd[6510]: pam_unix(sshd:auth): check pass; user unknown Dec 31 15:11:04 host sshd[6510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 Dec 31 15:11:06 host sshd[6510]: Failed password for invalid user admin from 194.169.175.102 port 64680 ssh2 Dec 31 15:11:06 host sshd[6510]: Received disconnect from 194.169.175.102 port 64680:11: Client disconnecting normally [preauth] Dec 31 15:11:06 host sshd[6510]: Disconnected from 194.169.175.102 port 64680 [preauth] Dec 31 15:13:57 host sshd[6931]: Invalid user ubuntu from 149.89.161.133 port 40964 Dec 31 15:13:57 host sshd[6931]: input_userauth_request: invalid user ubuntu [preauth] Dec 31 15:13:57 host sshd[6931]: pam_unix(sshd:auth): check pass; user unknown Dec 31 15:13:57 host sshd[6931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.89.161.133 Dec 31 15:13:59 host sshd[6931]: Failed password for invalid user ubuntu from 149.89.161.133 port 40964 ssh2 Dec 31 15:13:59 host sshd[6931]: Received disconnect from 149.89.161.133 port 40964:11: Bye Bye [preauth] Dec 31 15:13:59 host sshd[6931]: Disconnected from 149.89.161.133 port 40964 [preauth] Dec 31 15:18:34 host sshd[7570]: Invalid user ei from 149.89.161.133 port 37372 Dec 31 15:18:34 host sshd[7570]: input_userauth_request: invalid user ei [preauth] Dec 31 15:18:34 host sshd[7570]: pam_unix(sshd:auth): check pass; user unknown Dec 31 15:18:34 host sshd[7570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.89.161.133 Dec 31 15:18:36 host sshd[7580]: Invalid user 0aduserPgND2xfL2xEVobFLPr__wasadmin from 45.93.201.90 port 44350 Dec 31 15:18:36 host sshd[7580]: input_userauth_request: invalid user 0aduserPgND2xfL2xEVobFLPr__wasadmin [preauth] Dec 31 15:18:36 host sshd[7580]: Failed none for invalid user 0aduserPgND2xfL2xEVobFLPr__wasadmin from 45.93.201.90 port 44350 ssh2 Dec 31 15:18:36 host sshd[7570]: Failed password for invalid user ei from 149.89.161.133 port 37372 ssh2 Dec 31 15:18:36 host sshd[7570]: Received disconnect from 149.89.161.133 port 37372:11: Bye Bye [preauth] Dec 31 15:18:36 host sshd[7570]: Disconnected from 149.89.161.133 port 37372 [preauth] Dec 31 15:18:39 host sshd[7580]: pam_unix(sshd:auth): check pass; user unknown Dec 31 15:18:39 host sshd[7580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 31 15:18:41 host sshd[7580]: Failed password for invalid user 0aduserPgND2xfL2xEVobFLPr__wasadmin from 45.93.201.90 port 44350 ssh2 Dec 31 15:18:44 host sshd[7580]: pam_unix(sshd:auth): check pass; user unknown Dec 31 15:18:46 host sshd[7580]: Failed password for invalid user 0aduserPgND2xfL2xEVobFLPr__wasadmin from 45.93.201.90 port 44350 ssh2 Dec 31 15:18:49 host sshd[7580]: Connection closed by 45.93.201.90 port 44350 [preauth] Dec 31 15:18:49 host sshd[7580]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 31 15:19:47 host sshd[7703]: Invalid user luisa from 149.89.161.133 port 59312 Dec 31 15:19:47 host sshd[7703]: input_userauth_request: invalid user luisa [preauth] Dec 31 15:19:47 host sshd[7703]: pam_unix(sshd:auth): check pass; user unknown Dec 31 15:19:47 host sshd[7703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.89.161.133 Dec 31 15:19:50 host sshd[7703]: Failed password for invalid user luisa from 149.89.161.133 port 59312 ssh2 Dec 31 15:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 15:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 15:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 15:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 15:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 15:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 15:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 15:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 15:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 15:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 31 15:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 15:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 15:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 31 15:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 15:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 15:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 31 15:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 15:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 15:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 31 15:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 15:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 15:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 31 15:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 15:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 15:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 31 15:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 15:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 15:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 31 15:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 15:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 15:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 31 15:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 15:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 15:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 15:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 31 15:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 15:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=travelboniface user-2=ugotscom user-3=keralaholi user-4=wwwresourcehunte user-5=wwwrmswll user-6=wwwpmcresource user-7=a2zgroup user-8=dartsimp user-9=laundryboniface user-10=cochintaxi user-11=wwwkaretakers user-12=kottayamcalldriv user-13=phmetals user-14=palco123 user-15=gifterman user-16=wwwnexidigital user-17=mrsclean user-18=wwwevmhonda user-19=bonifacegroup user-20=wwwletsstalkfood user-21=straightcurve user-22=shalinijames user-23=wwwtestugo user-24=vfmassets user-25=pmcresources user-26=wwwkmaorg user-27=disposeat user-28=remysagr user-29=woodpeck user-30=wwwkapin feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 31 15:21:50 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 31 15:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 15:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 15:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 15:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-6u675Z4deQWgQobI.~ Dec 31 15:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 15:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-6u675Z4deQWgQobI.~' Dec 31 15:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 15:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-6u675Z4deQWgQobI.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 15:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 15:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 15:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 31 15:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 15:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 31 15:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 15:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 15:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 15:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 15:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 15:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 31 15:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 15:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 15:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 15:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 15:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 31 15:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 31 15:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 31 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 31 15:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 15:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 15:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 31 15:21:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 15:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 15:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 31 15:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 15:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 31 15:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 15:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 31 15:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 15:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 15:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 31 15:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 15:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 15:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 31 15:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 15:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 15:29:11 host sshd[9112]: User root from 209.141.55.27 not allowed because not listed in AllowUsers Dec 31 15:29:11 host sshd[9112]: input_userauth_request: invalid user root [preauth] Dec 31 15:29:11 host unix_chkpwd[9115]: password check failed for user (root) Dec 31 15:29:11 host sshd[9112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.55.27 user=root Dec 31 15:29:11 host sshd[9112]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 15:29:13 host sshd[9112]: Failed password for invalid user root from 209.141.55.27 port 49308 ssh2 Dec 31 15:29:13 host sshd[9112]: Received disconnect from 209.141.55.27 port 49308:11: Normal Shutdown, Thank you for playing [preauth] Dec 31 15:29:13 host sshd[9112]: Disconnected from 209.141.55.27 port 49308 [preauth] Dec 31 15:38:32 host sshd[10666]: User root from 218.92.0.210 not allowed because not listed in AllowUsers Dec 31 15:38:32 host sshd[10666]: input_userauth_request: invalid user root [preauth] Dec 31 15:38:32 host unix_chkpwd[10673]: password check failed for user (root) Dec 31 15:38:32 host sshd[10666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.210 user=root Dec 31 15:38:32 host sshd[10666]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 15:38:34 host sshd[10666]: Failed password for invalid user root from 218.92.0.210 port 37611 ssh2 Dec 31 15:38:35 host unix_chkpwd[10678]: password check failed for user (root) Dec 31 15:38:35 host sshd[10666]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 15:38:36 host sshd[10666]: Failed password for invalid user root from 218.92.0.210 port 37611 ssh2 Dec 31 15:38:37 host unix_chkpwd[10693]: password check failed for user (root) Dec 31 15:38:37 host sshd[10666]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 15:38:39 host sshd[10666]: Failed password for invalid user root from 218.92.0.210 port 37611 ssh2 Dec 31 15:38:39 host sshd[10666]: Received disconnect from 218.92.0.210 port 37611:11: [preauth] Dec 31 15:38:39 host sshd[10666]: Disconnected from 218.92.0.210 port 37611 [preauth] Dec 31 15:38:39 host sshd[10666]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.210 user=root Dec 31 15:44:39 host sshd[11638]: User root from 103.13.40.2 not allowed because not listed in AllowUsers Dec 31 15:44:39 host sshd[11638]: input_userauth_request: invalid user root [preauth] Dec 31 15:44:39 host unix_chkpwd[11640]: password check failed for user (root) Dec 31 15:44:39 host sshd[11638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 user=root Dec 31 15:44:39 host sshd[11638]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 15:44:41 host sshd[11638]: Failed password for invalid user root from 103.13.40.2 port 41116 ssh2 Dec 31 15:44:41 host sshd[11638]: Connection closed by 103.13.40.2 port 41116 [preauth] Dec 31 15:52:10 host sshd[12677]: User root from 92.46.108.20 not allowed because not listed in AllowUsers Dec 31 15:52:10 host sshd[12677]: input_userauth_request: invalid user root [preauth] Dec 31 15:52:11 host unix_chkpwd[12682]: password check failed for user (root) Dec 31 15:52:11 host sshd[12677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 user=root Dec 31 15:52:11 host sshd[12677]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 15:52:14 host sshd[12677]: Failed password for invalid user root from 92.46.108.20 port 48042 ssh2 Dec 31 15:52:14 host sshd[12677]: Connection closed by 92.46.108.20 port 48042 [preauth] Dec 31 15:56:39 host sshd[13172]: Invalid user hy from 162.218.126.136 port 59646 Dec 31 15:56:39 host sshd[13172]: input_userauth_request: invalid user hy [preauth] Dec 31 15:56:39 host sshd[13172]: pam_unix(sshd:auth): check pass; user unknown Dec 31 15:56:39 host sshd[13172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 31 15:56:41 host sshd[13172]: Failed password for invalid user hy from 162.218.126.136 port 59646 ssh2 Dec 31 15:56:41 host sshd[13172]: Connection closed by 162.218.126.136 port 59646 [preauth] Dec 31 15:58:46 host sshd[13558]: Invalid user xwang from 41.197.31.178 port 59002 Dec 31 15:58:46 host sshd[13558]: input_userauth_request: invalid user xwang [preauth] Dec 31 15:58:46 host sshd[13558]: pam_unix(sshd:auth): check pass; user unknown Dec 31 15:58:46 host sshd[13558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 31 15:58:48 host sshd[13558]: Failed password for invalid user xwang from 41.197.31.178 port 59002 ssh2 Dec 31 15:58:49 host sshd[13558]: Connection closed by 41.197.31.178 port 59002 [preauth] Dec 31 16:09:28 host sshd[15288]: Did not receive identification string from 152.32.141.88 port 59312 Dec 31 16:09:29 host sshd[15290]: Connection closed by 152.32.141.88 port 59850 [preauth] Dec 31 16:09:30 host sshd[15293]: invalid public DH value: >= p-1 [preauth] Dec 31 16:09:30 host sshd[15293]: ssh_dispatch_run_fatal: Connection from 152.32.141.88 port 60722: incomplete message [preauth] Dec 31 16:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 16:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 16:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 16:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 16:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 16:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 16:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 16:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 16:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 16:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 31 16:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 16:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 16:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 31 16:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 16:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 16:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 31 16:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 16:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 16:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 31 16:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 16:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 16:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 31 16:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 16:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 16:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 31 16:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 16:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 16:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 31 16:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 16:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 16:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 31 16:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 16:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 16:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 16:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 31 16:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 16:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=a2zgroup user-2=dartsimp user-3=laundryboniface user-4=wwwkaretakers user-5=cochintaxi user-6=travelboniface user-7=keralaholi user-8=wwwresourcehunte user-9=wwwrmswll user-10=ugotscom user-11=wwwpmcresource user-12=vfmassets user-13=shalinijames user-14=wwwtestugo user-15=pmcresources user-16=remysagr user-17=disposeat user-18=wwwkmaorg user-19=woodpeck user-20=wwwkapin user-21=palco123 user-22=gifterman user-23=kottayamcalldriv user-24=phmetals user-25=wwwnexidigital user-26=mrsclean user-27=bonifacegroup user-28=wwwevmhonda user-29=wwwletsstalkfood user-30=straightcurve feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 31 16:21:50 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 31 16:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 16:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 16:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 16:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-MLapG9IBSWNnz9EN.~ Dec 31 16:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 16:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-MLapG9IBSWNnz9EN.~' Dec 31 16:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 16:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-MLapG9IBSWNnz9EN.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 16:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 16:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 16:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 31 16:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 16:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 31 16:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 16:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 16:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 16:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 16:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 16:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 16:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 16:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 16:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 31 16:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 16:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 16:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 16:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 16:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 31 16:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 31 16:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 31 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 31 16:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 16:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 31 16:21:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 16:21:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 16:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 31 16:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 16:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 16:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 31 16:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 16:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 16:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 31 16:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 16:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 16:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 31 16:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 16:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 16:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 31 16:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 16:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 16:33:54 host sshd[19061]: Invalid user user1 from 106.10.122.53 port 46908 Dec 31 16:33:54 host sshd[19061]: input_userauth_request: invalid user user1 [preauth] Dec 31 16:33:54 host sshd[19061]: pam_unix(sshd:auth): check pass; user unknown Dec 31 16:33:54 host sshd[19061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 31 16:33:55 host sshd[19061]: Failed password for invalid user user1 from 106.10.122.53 port 46908 ssh2 Dec 31 16:33:56 host sshd[19061]: Connection closed by 106.10.122.53 port 46908 [preauth] Dec 31 17:02:14 host sshd[23551]: Invalid user admin from 162.218.126.136 port 46296 Dec 31 17:02:14 host sshd[23551]: input_userauth_request: invalid user admin [preauth] Dec 31 17:02:15 host sshd[23551]: pam_unix(sshd:auth): check pass; user unknown Dec 31 17:02:15 host sshd[23551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 31 17:02:17 host sshd[23551]: Failed password for invalid user admin from 162.218.126.136 port 46296 ssh2 Dec 31 17:02:17 host sshd[23551]: Connection closed by 162.218.126.136 port 46296 [preauth] Dec 31 17:07:48 host sshd[24327]: User root from 103.13.40.2 not allowed because not listed in AllowUsers Dec 31 17:07:48 host sshd[24327]: input_userauth_request: invalid user root [preauth] Dec 31 17:07:48 host unix_chkpwd[24329]: password check failed for user (root) Dec 31 17:07:48 host sshd[24327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 user=root Dec 31 17:07:48 host sshd[24327]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:07:50 host sshd[24327]: Failed password for invalid user root from 103.13.40.2 port 55566 ssh2 Dec 31 17:07:50 host sshd[24327]: Connection closed by 103.13.40.2 port 55566 [preauth] Dec 31 17:17:30 host sshd[25674]: User root from 171.25.193.20 not allowed because not listed in AllowUsers Dec 31 17:17:30 host sshd[25674]: input_userauth_request: invalid user root [preauth] Dec 31 17:17:30 host sshd[25674]: Connection closed by 171.25.193.20 port 25583 [preauth] Dec 31 17:17:33 host sshd[25677]: User root from 162.247.74.74 not allowed because not listed in AllowUsers Dec 31 17:17:33 host sshd[25677]: input_userauth_request: invalid user root [preauth] Dec 31 17:17:33 host unix_chkpwd[25682]: password check failed for user (root) Dec 31 17:17:33 host sshd[25677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.74 user=root Dec 31 17:17:33 host sshd[25677]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:17:35 host sshd[25677]: Failed password for invalid user root from 162.247.74.74 port 38420 ssh2 Dec 31 17:17:35 host unix_chkpwd[25685]: password check failed for user (root) Dec 31 17:17:35 host sshd[25677]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:17:37 host sshd[25677]: Failed password for invalid user root from 162.247.74.74 port 38420 ssh2 Dec 31 17:17:38 host unix_chkpwd[25688]: password check failed for user (root) Dec 31 17:17:38 host sshd[25677]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:17:39 host sshd[25677]: Failed password for invalid user root from 162.247.74.74 port 38420 ssh2 Dec 31 17:17:40 host unix_chkpwd[25696]: password check failed for user (root) Dec 31 17:17:40 host sshd[25677]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:17:42 host sshd[25677]: Failed password for invalid user root from 162.247.74.74 port 38420 ssh2 Dec 31 17:17:43 host unix_chkpwd[25702]: password check failed for user (root) Dec 31 17:17:43 host sshd[25677]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:17:45 host sshd[25677]: Failed password for invalid user root from 162.247.74.74 port 38420 ssh2 Dec 31 17:18:14 host sshd[25774]: User root from 162.247.74.202 not allowed because not listed in AllowUsers Dec 31 17:18:14 host sshd[25774]: input_userauth_request: invalid user root [preauth] Dec 31 17:18:14 host unix_chkpwd[25778]: password check failed for user (root) Dec 31 17:18:14 host sshd[25774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.202 user=root Dec 31 17:18:14 host sshd[25774]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:18:16 host sshd[25774]: Failed password for invalid user root from 162.247.74.202 port 60782 ssh2 Dec 31 17:18:17 host unix_chkpwd[25780]: password check failed for user (root) Dec 31 17:18:17 host sshd[25774]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:18:19 host sshd[25774]: Failed password for invalid user root from 162.247.74.202 port 60782 ssh2 Dec 31 17:18:19 host unix_chkpwd[25783]: password check failed for user (root) Dec 31 17:18:19 host sshd[25774]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:18:21 host sshd[25774]: Failed password for invalid user root from 162.247.74.202 port 60782 ssh2 Dec 31 17:18:21 host unix_chkpwd[25788]: password check failed for user (root) Dec 31 17:18:21 host sshd[25774]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:18:23 host sshd[25774]: Failed password for invalid user root from 162.247.74.202 port 60782 ssh2 Dec 31 17:18:24 host unix_chkpwd[25804]: password check failed for user (root) Dec 31 17:18:24 host sshd[25774]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:18:26 host sshd[25774]: Failed password for invalid user root from 162.247.74.202 port 60782 ssh2 Dec 31 17:18:55 host sshd[25893]: User root from 103.251.167.21 not allowed because not listed in AllowUsers Dec 31 17:18:55 host sshd[25893]: input_userauth_request: invalid user root [preauth] Dec 31 17:18:55 host unix_chkpwd[25896]: password check failed for user (root) Dec 31 17:18:55 host sshd[25893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.251.167.21 user=root Dec 31 17:18:55 host sshd[25893]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:18:56 host sshd[25893]: Failed password for invalid user root from 103.251.167.21 port 51786 ssh2 Dec 31 17:18:57 host unix_chkpwd[25898]: password check failed for user (root) Dec 31 17:18:57 host sshd[25893]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:18:58 host sshd[25893]: Failed password for invalid user root from 103.251.167.21 port 51786 ssh2 Dec 31 17:18:59 host unix_chkpwd[25901]: password check failed for user (root) Dec 31 17:18:59 host sshd[25893]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:19:01 host sshd[25893]: Failed password for invalid user root from 103.251.167.21 port 51786 ssh2 Dec 31 17:19:01 host unix_chkpwd[25904]: password check failed for user (root) Dec 31 17:19:01 host sshd[25893]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:19:03 host sshd[25893]: Failed password for invalid user root from 103.251.167.21 port 51786 ssh2 Dec 31 17:19:03 host unix_chkpwd[25926]: password check failed for user (root) Dec 31 17:19:03 host sshd[25893]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:19:06 host sshd[25893]: Failed password for invalid user root from 103.251.167.21 port 51786 ssh2 Dec 31 17:19:35 host sshd[26015]: User root from 185.220.103.9 not allowed because not listed in AllowUsers Dec 31 17:19:35 host sshd[26015]: input_userauth_request: invalid user root [preauth] Dec 31 17:19:35 host unix_chkpwd[26018]: password check failed for user (root) Dec 31 17:19:35 host sshd[26015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.103.9 user=root Dec 31 17:19:35 host sshd[26015]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:19:38 host sshd[26015]: Failed password for invalid user root from 185.220.103.9 port 59504 ssh2 Dec 31 17:19:38 host unix_chkpwd[26027]: password check failed for user (root) Dec 31 17:19:38 host sshd[26015]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:19:40 host sshd[26015]: Failed password for invalid user root from 185.220.103.9 port 59504 ssh2 Dec 31 17:19:41 host unix_chkpwd[26031]: password check failed for user (root) Dec 31 17:19:41 host sshd[26015]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:19:43 host sshd[26015]: Failed password for invalid user root from 185.220.103.9 port 59504 ssh2 Dec 31 17:19:43 host unix_chkpwd[26042]: password check failed for user (root) Dec 31 17:19:43 host sshd[26015]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:19:45 host sshd[26015]: Failed password for invalid user root from 185.220.103.9 port 59504 ssh2 Dec 31 17:20:15 host sshd[26132]: User root from 162.247.73.192 not allowed because not listed in AllowUsers Dec 31 17:20:15 host sshd[26132]: input_userauth_request: invalid user root [preauth] Dec 31 17:20:15 host unix_chkpwd[26136]: password check failed for user (root) Dec 31 17:20:15 host sshd[26132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.73.192 user=root Dec 31 17:20:15 host sshd[26132]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:20:17 host sshd[26132]: Failed password for invalid user root from 162.247.73.192 port 38026 ssh2 Dec 31 17:20:18 host unix_chkpwd[26139]: password check failed for user (root) Dec 31 17:20:18 host sshd[26132]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:20:20 host sshd[26132]: Failed password for invalid user root from 162.247.73.192 port 38026 ssh2 Dec 31 17:20:21 host unix_chkpwd[26144]: password check failed for user (root) Dec 31 17:20:21 host sshd[26132]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:20:23 host sshd[26132]: Failed password for invalid user root from 162.247.73.192 port 38026 ssh2 Dec 31 17:20:24 host unix_chkpwd[26148]: password check failed for user (root) Dec 31 17:20:24 host sshd[26132]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:20:26 host sshd[26132]: Failed password for invalid user root from 162.247.73.192 port 38026 ssh2 Dec 31 17:20:26 host unix_chkpwd[26172]: password check failed for user (root) Dec 31 17:20:26 host sshd[26132]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:20:28 host sshd[26132]: Failed password for invalid user root from 162.247.73.192 port 38026 ssh2 Dec 31 17:20:28 host unix_chkpwd[26180]: password check failed for user (root) Dec 31 17:20:28 host sshd[26132]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:20:31 host sshd[26132]: Failed password for invalid user root from 162.247.73.192 port 38026 ssh2 Dec 31 17:20:31 host sshd[26132]: error: maximum authentication attempts exceeded for invalid user root from 162.247.73.192 port 38026 ssh2 [preauth] Dec 31 17:20:31 host sshd[26132]: Disconnecting: Too many authentication failures [preauth] Dec 31 17:20:31 host sshd[26132]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.73.192 user=root Dec 31 17:20:31 host sshd[26132]: PAM service(sshd) ignoring max retries; 6 > 3 Dec 31 17:21:00 host sshd[26347]: User root from 82.221.128.191 not allowed because not listed in AllowUsers Dec 31 17:21:00 host sshd[26347]: input_userauth_request: invalid user root [preauth] Dec 31 17:21:00 host unix_chkpwd[26357]: password check failed for user (root) Dec 31 17:21:00 host sshd[26347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.221.128.191 user=root Dec 31 17:21:00 host sshd[26347]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:21:02 host sshd[26347]: Failed password for invalid user root from 82.221.128.191 port 38133 ssh2 Dec 31 17:21:03 host unix_chkpwd[26370]: password check failed for user (root) Dec 31 17:21:03 host sshd[26347]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:21:04 host sshd[26243]: User root from 81.12.81.131 not allowed because not listed in AllowUsers Dec 31 17:21:04 host sshd[26243]: input_userauth_request: invalid user root [preauth] Dec 31 17:21:04 host unix_chkpwd[26372]: password check failed for user (root) Dec 31 17:21:04 host sshd[26243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.12.81.131 user=root Dec 31 17:21:04 host sshd[26243]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:21:04 host sshd[26347]: Failed password for invalid user root from 82.221.128.191 port 38133 ssh2 Dec 31 17:21:05 host unix_chkpwd[26374]: password check failed for user (root) Dec 31 17:21:05 host sshd[26347]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:21:06 host sshd[26243]: Failed password for invalid user root from 81.12.81.131 port 57015 ssh2 Dec 31 17:21:07 host unix_chkpwd[26376]: password check failed for user (root) Dec 31 17:21:07 host sshd[26243]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:21:07 host sshd[26347]: Failed password for invalid user root from 82.221.128.191 port 38133 ssh2 Dec 31 17:21:08 host unix_chkpwd[26378]: password check failed for user (root) Dec 31 17:21:08 host sshd[26347]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:21:09 host sshd[26243]: Failed password for invalid user root from 81.12.81.131 port 57015 ssh2 Dec 31 17:21:09 host unix_chkpwd[26401]: password check failed for user (root) Dec 31 17:21:09 host sshd[26243]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:21:10 host sshd[26347]: Failed password for invalid user root from 82.221.128.191 port 38133 ssh2 Dec 31 17:21:11 host sshd[26243]: Failed password for invalid user root from 81.12.81.131 port 57015 ssh2 Dec 31 17:21:11 host unix_chkpwd[26416]: password check failed for user (root) Dec 31 17:21:11 host sshd[26243]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:21:13 host sshd[26243]: Failed password for invalid user root from 81.12.81.131 port 57015 ssh2 Dec 31 17:21:14 host unix_chkpwd[26437]: password check failed for user (root) Dec 31 17:21:14 host sshd[26243]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:21:15 host sshd[26243]: Failed password for invalid user root from 81.12.81.131 port 57015 ssh2 Dec 31 17:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 17:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 17:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 17:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 17:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 17:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 17:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 17:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 17:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 17:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 31 17:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 17:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 17:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 31 17:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 17:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 17:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 31 17:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 17:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 17:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 31 17:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 17:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 17:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 31 17:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 17:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 17:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 31 17:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 17:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 17:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 31 17:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 17:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 17:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 31 17:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 17:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 31 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=disposeat user-2=remysagr user-3=wwwkmaorg user-4=woodpeck user-5=wwwkapin user-6=vfmassets user-7=shalinijames user-8=wwwtestugo user-9=pmcresources user-10=bonifacegroup user-11=wwwevmhonda user-12=straightcurve user-13=wwwletsstalkfood user-14=palco123 user-15=gifterman user-16=kottayamcalldriv user-17=phmetals user-18=mrsclean user-19=wwwnexidigital user-20=cochintaxi user-21=wwwkaretakers user-22=a2zgroup user-23=dartsimp user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=wwwresourcehunte user-28=keralaholi user-29=wwwrmswll user-30=ugotscom feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 31 17:21:50 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 31 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-XFelWofBbFA22sZo.~ Dec 31 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-XFelWofBbFA22sZo.~' Dec 31 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-XFelWofBbFA22sZo.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 17:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 31 17:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 17:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 31 17:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 17:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 17:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 17:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 31 17:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 17:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 17:21:52 host sshd[26594]: User root from 156.146.63.138 not allowed because not listed in AllowUsers Dec 31 17:21:52 host sshd[26594]: input_userauth_request: invalid user root [preauth] Dec 31 17:21:52 host unix_chkpwd[26653]: password check failed for user (root) Dec 31 17:21:52 host sshd[26594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.146.63.138 user=root Dec 31 17:21:52 host sshd[26594]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 17:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 17:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 17:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 31 17:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 31 17:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 31 17:21:54 host sshd[26594]: Failed password for invalid user root from 156.146.63.138 port 46564 ssh2 Dec 31 17:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 31 17:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 17:21:54 host unix_chkpwd[26680]: password check failed for user (root) Dec 31 17:21:54 host sshd[26594]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 31 17:21:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 17:21:56 host sshd[26594]: Failed password for invalid user root from 156.146.63.138 port 46564 ssh2 Dec 31 17:21:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 17:21:57 host unix_chkpwd[26697]: password check failed for user (root) Dec 31 17:21:57 host sshd[26594]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 31 17:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 17:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 31 17:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 17:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 17:21:59 host sshd[26594]: Failed password for invalid user root from 156.146.63.138 port 46564 ssh2 Dec 31 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 31 17:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 17:21:59 host unix_chkpwd[26720]: password check failed for user (root) Dec 31 17:21:59 host sshd[26594]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 17:22:01 host sshd[26594]: Failed password for invalid user root from 156.146.63.138 port 46564 ssh2 Dec 31 17:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 31 17:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 17:22:01 host unix_chkpwd[26747]: password check failed for user (root) Dec 31 17:22:01 host sshd[26594]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 17:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 31 17:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 17:22:03 host sshd[26594]: Failed password for invalid user root from 156.146.63.138 port 46564 ssh2 Dec 31 17:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 17:22:04 host unix_chkpwd[26779]: password check failed for user (root) Dec 31 17:22:04 host sshd[26594]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:22:06 host sshd[26594]: Failed password for invalid user root from 156.146.63.138 port 46564 ssh2 Dec 31 17:22:06 host sshd[26594]: error: maximum authentication attempts exceeded for invalid user root from 156.146.63.138 port 46564 ssh2 [preauth] Dec 31 17:22:06 host sshd[26594]: Disconnecting: Too many authentication failures [preauth] Dec 31 17:22:06 host sshd[26594]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.146.63.138 user=root Dec 31 17:22:06 host sshd[26594]: PAM service(sshd) ignoring max retries; 6 > 3 Dec 31 17:22:36 host sshd[26845]: User root from 91.219.236.239 not allowed because not listed in AllowUsers Dec 31 17:22:36 host sshd[26845]: input_userauth_request: invalid user root [preauth] Dec 31 17:22:36 host unix_chkpwd[26848]: password check failed for user (root) Dec 31 17:22:36 host sshd[26845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.219.236.239 user=root Dec 31 17:22:36 host sshd[26845]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:22:38 host sshd[26845]: Failed password for invalid user root from 91.219.236.239 port 53716 ssh2 Dec 31 17:22:39 host unix_chkpwd[26860]: password check failed for user (root) Dec 31 17:22:39 host sshd[26845]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:22:41 host sshd[26845]: Failed password for invalid user root from 91.219.236.239 port 53716 ssh2 Dec 31 17:22:42 host unix_chkpwd[26863]: password check failed for user (root) Dec 31 17:22:42 host sshd[26845]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:22:44 host sshd[26845]: Failed password for invalid user root from 91.219.236.239 port 53716 ssh2 Dec 31 17:22:45 host unix_chkpwd[26868]: password check failed for user (root) Dec 31 17:22:45 host sshd[26845]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:22:46 host sshd[26845]: Failed password for invalid user root from 91.219.236.239 port 53716 ssh2 Dec 31 17:22:46 host unix_chkpwd[26872]: password check failed for user (root) Dec 31 17:22:46 host sshd[26845]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:22:48 host sshd[26845]: Failed password for invalid user root from 91.219.236.239 port 53716 ssh2 Dec 31 17:22:49 host unix_chkpwd[26885]: password check failed for user (root) Dec 31 17:22:49 host sshd[26845]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:22:51 host sshd[26845]: Failed password for invalid user root from 91.219.236.239 port 53716 ssh2 Dec 31 17:22:51 host sshd[26845]: error: maximum authentication attempts exceeded for invalid user root from 91.219.236.239 port 53716 ssh2 [preauth] Dec 31 17:22:51 host sshd[26845]: Disconnecting: Too many authentication failures [preauth] Dec 31 17:22:51 host sshd[26845]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.219.236.239 user=root Dec 31 17:22:51 host sshd[26845]: PAM service(sshd) ignoring max retries; 6 > 3 Dec 31 17:23:32 host sshd[26987]: User root from 162.247.74.213 not allowed because not listed in AllowUsers Dec 31 17:23:32 host sshd[26987]: input_userauth_request: invalid user root [preauth] Dec 31 17:23:32 host unix_chkpwd[26990]: password check failed for user (root) Dec 31 17:23:32 host sshd[26987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.213 user=root Dec 31 17:23:32 host sshd[26987]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:23:33 host sshd[26987]: Failed password for invalid user root from 162.247.74.213 port 34450 ssh2 Dec 31 17:23:34 host unix_chkpwd[26993]: password check failed for user (root) Dec 31 17:23:34 host sshd[26987]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:23:36 host sshd[26982]: Did not receive identification string from 205.185.116.34 port 25816 Dec 31 17:23:36 host sshd[26987]: Failed password for invalid user root from 162.247.74.213 port 34450 ssh2 Dec 31 17:23:37 host unix_chkpwd[26998]: password check failed for user (root) Dec 31 17:23:37 host sshd[26987]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:23:39 host sshd[26987]: Failed password for invalid user root from 162.247.74.213 port 34450 ssh2 Dec 31 17:23:39 host unix_chkpwd[27006]: password check failed for user (root) Dec 31 17:23:39 host sshd[26987]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:23:41 host sshd[26987]: Failed password for invalid user root from 162.247.74.213 port 34450 ssh2 Dec 31 17:23:41 host unix_chkpwd[27009]: password check failed for user (root) Dec 31 17:23:41 host sshd[26987]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:23:43 host sshd[26987]: Failed password for invalid user root from 162.247.74.213 port 34450 ssh2 Dec 31 17:23:44 host unix_chkpwd[27018]: password check failed for user (root) Dec 31 17:23:44 host sshd[26987]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:23:46 host sshd[26987]: Failed password for invalid user root from 162.247.74.213 port 34450 ssh2 Dec 31 17:23:46 host sshd[26987]: error: maximum authentication attempts exceeded for invalid user root from 162.247.74.213 port 34450 ssh2 [preauth] Dec 31 17:23:46 host sshd[26987]: Disconnecting: Too many authentication failures [preauth] Dec 31 17:23:46 host sshd[26987]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.213 user=root Dec 31 17:23:46 host sshd[26987]: PAM service(sshd) ignoring max retries; 6 > 3 Dec 31 17:24:15 host sshd[27087]: User root from 171.25.193.20 not allowed because not listed in AllowUsers Dec 31 17:24:15 host sshd[27087]: input_userauth_request: invalid user root [preauth] Dec 31 17:24:15 host unix_chkpwd[27091]: password check failed for user (root) Dec 31 17:24:15 host sshd[27087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.25.193.20 user=root Dec 31 17:24:15 host sshd[27087]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:24:17 host sshd[27087]: Failed password for invalid user root from 171.25.193.20 port 12441 ssh2 Dec 31 17:24:17 host unix_chkpwd[27093]: password check failed for user (root) Dec 31 17:24:17 host sshd[27087]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:24:19 host sshd[27087]: Failed password for invalid user root from 171.25.193.20 port 12441 ssh2 Dec 31 17:24:19 host unix_chkpwd[27096]: password check failed for user (root) Dec 31 17:24:19 host sshd[27087]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:24:21 host sshd[27087]: Failed password for invalid user root from 171.25.193.20 port 12441 ssh2 Dec 31 17:24:22 host unix_chkpwd[27099]: password check failed for user (root) Dec 31 17:24:22 host sshd[27087]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:24:24 host sshd[27087]: Failed password for invalid user root from 171.25.193.20 port 12441 ssh2 Dec 31 17:24:24 host unix_chkpwd[27119]: password check failed for user (root) Dec 31 17:24:24 host sshd[27087]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:24:26 host sshd[27087]: Failed password for invalid user root from 171.25.193.20 port 12441 ssh2 Dec 31 17:25:06 host sshd[27216]: User root from 185.220.102.252 not allowed because not listed in AllowUsers Dec 31 17:25:06 host sshd[27216]: input_userauth_request: invalid user root [preauth] Dec 31 17:25:06 host unix_chkpwd[27225]: password check failed for user (root) Dec 31 17:25:06 host sshd[27216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.252 user=root Dec 31 17:25:06 host sshd[27216]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:25:08 host sshd[27216]: Failed password for invalid user root from 185.220.102.252 port 5872 ssh2 Dec 31 17:25:08 host unix_chkpwd[27231]: password check failed for user (root) Dec 31 17:25:08 host sshd[27216]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:25:10 host sshd[27216]: Failed password for invalid user root from 185.220.102.252 port 5872 ssh2 Dec 31 17:25:11 host unix_chkpwd[27234]: password check failed for user (root) Dec 31 17:25:11 host sshd[27216]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:25:13 host sshd[27216]: Failed password for invalid user root from 185.220.102.252 port 5872 ssh2 Dec 31 17:25:13 host unix_chkpwd[27237]: password check failed for user (root) Dec 31 17:25:13 host sshd[27216]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:25:15 host sshd[27216]: Failed password for invalid user root from 185.220.102.252 port 5872 ssh2 Dec 31 17:25:48 host sshd[27332]: User root from 144.172.118.63 not allowed because not listed in AllowUsers Dec 31 17:25:48 host sshd[27332]: input_userauth_request: invalid user root [preauth] Dec 31 17:25:48 host unix_chkpwd[27338]: password check failed for user (root) Dec 31 17:25:48 host sshd[27332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.172.118.63 user=root Dec 31 17:25:48 host sshd[27332]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:25:50 host sshd[27332]: Failed password for invalid user root from 144.172.118.63 port 22344 ssh2 Dec 31 17:25:51 host unix_chkpwd[27342]: password check failed for user (root) Dec 31 17:25:51 host sshd[27332]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:25:54 host sshd[27332]: Failed password for invalid user root from 144.172.118.63 port 22344 ssh2 Dec 31 17:25:55 host unix_chkpwd[27345]: password check failed for user (root) Dec 31 17:25:55 host sshd[27332]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:25:57 host sshd[27332]: Failed password for invalid user root from 144.172.118.63 port 22344 ssh2 Dec 31 17:25:58 host unix_chkpwd[27349]: password check failed for user (root) Dec 31 17:25:58 host sshd[27332]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:26:00 host sshd[27332]: Failed password for invalid user root from 144.172.118.63 port 22344 ssh2 Dec 31 17:26:29 host sshd[27543]: User root from 209.141.51.30 not allowed because not listed in AllowUsers Dec 31 17:26:29 host sshd[27543]: input_userauth_request: invalid user root [preauth] Dec 31 17:26:29 host unix_chkpwd[27548]: password check failed for user (root) Dec 31 17:26:29 host sshd[27543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.51.30 user=root Dec 31 17:26:29 host sshd[27543]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:26:31 host sshd[27543]: Failed password for invalid user root from 209.141.51.30 port 45228 ssh2 Dec 31 17:26:32 host unix_chkpwd[27554]: password check failed for user (root) Dec 31 17:26:32 host sshd[27543]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:26:34 host sshd[27543]: Failed password for invalid user root from 209.141.51.30 port 45228 ssh2 Dec 31 17:26:34 host unix_chkpwd[27561]: password check failed for user (root) Dec 31 17:26:34 host sshd[27543]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:26:37 host sshd[27543]: Failed password for invalid user root from 209.141.51.30 port 45228 ssh2 Dec 31 17:26:37 host unix_chkpwd[27566]: password check failed for user (root) Dec 31 17:26:37 host sshd[27543]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:26:39 host sshd[27543]: Failed password for invalid user root from 209.141.51.30 port 45228 ssh2 Dec 31 17:27:12 host sshd[27651]: User root from 185.129.61.5 not allowed because not listed in AllowUsers Dec 31 17:27:12 host sshd[27651]: input_userauth_request: invalid user root [preauth] Dec 31 17:27:12 host unix_chkpwd[27655]: password check failed for user (root) Dec 31 17:27:12 host sshd[27651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.129.61.5 user=root Dec 31 17:27:12 host sshd[27651]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:27:14 host sshd[27651]: Failed password for invalid user root from 185.129.61.5 port 18835 ssh2 Dec 31 17:27:15 host unix_chkpwd[27660]: password check failed for user (root) Dec 31 17:27:15 host sshd[27651]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:27:17 host sshd[27651]: Failed password for invalid user root from 185.129.61.5 port 18835 ssh2 Dec 31 17:27:17 host unix_chkpwd[27663]: password check failed for user (root) Dec 31 17:27:17 host sshd[27651]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:27:20 host sshd[27651]: Failed password for invalid user root from 185.129.61.5 port 18835 ssh2 Dec 31 17:27:20 host unix_chkpwd[27667]: password check failed for user (root) Dec 31 17:27:20 host sshd[27651]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:27:22 host sshd[27651]: Failed password for invalid user root from 185.129.61.5 port 18835 ssh2 Dec 31 17:27:23 host unix_chkpwd[27670]: password check failed for user (root) Dec 31 17:27:23 host sshd[27651]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:27:26 host sshd[27651]: Failed password for invalid user root from 185.129.61.5 port 18835 ssh2 Dec 31 17:28:05 host sshd[27786]: User root from 162.247.74.200 not allowed because not listed in AllowUsers Dec 31 17:28:05 host sshd[27786]: input_userauth_request: invalid user root [preauth] Dec 31 17:28:05 host unix_chkpwd[27790]: password check failed for user (root) Dec 31 17:28:05 host sshd[27786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.200 user=root Dec 31 17:28:05 host sshd[27786]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:28:08 host sshd[27786]: Failed password for invalid user root from 162.247.74.200 port 54542 ssh2 Dec 31 17:28:08 host unix_chkpwd[27794]: password check failed for user (root) Dec 31 17:28:08 host sshd[27786]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:28:10 host sshd[27786]: Failed password for invalid user root from 162.247.74.200 port 54542 ssh2 Dec 31 17:28:11 host unix_chkpwd[27797]: password check failed for user (root) Dec 31 17:28:11 host sshd[27786]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:28:13 host sshd[27786]: Failed password for invalid user root from 162.247.74.200 port 54542 ssh2 Dec 31 17:28:13 host unix_chkpwd[27800]: password check failed for user (root) Dec 31 17:28:13 host sshd[27786]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:28:15 host sshd[27786]: Failed password for invalid user root from 162.247.74.200 port 54542 ssh2 Dec 31 17:28:46 host sshd[27900]: User root from 162.247.74.216 not allowed because not listed in AllowUsers Dec 31 17:28:46 host sshd[27900]: input_userauth_request: invalid user root [preauth] Dec 31 17:28:46 host unix_chkpwd[27903]: password check failed for user (root) Dec 31 17:28:46 host sshd[27900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.216 user=root Dec 31 17:28:46 host sshd[27900]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:28:47 host sshd[27900]: Failed password for invalid user root from 162.247.74.216 port 50654 ssh2 Dec 31 17:28:48 host unix_chkpwd[27906]: password check failed for user (root) Dec 31 17:28:48 host sshd[27900]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:28:50 host sshd[27900]: Failed password for invalid user root from 162.247.74.216 port 50654 ssh2 Dec 31 17:28:51 host unix_chkpwd[27917]: password check failed for user (root) Dec 31 17:28:51 host sshd[27900]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:28:53 host sshd[27900]: Failed password for invalid user root from 162.247.74.216 port 50654 ssh2 Dec 31 17:28:54 host unix_chkpwd[27930]: password check failed for user (root) Dec 31 17:28:54 host sshd[27900]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:28:56 host sshd[27900]: Failed password for invalid user root from 162.247.74.216 port 50654 ssh2 Dec 31 17:29:45 host sshd[28050]: User root from 45.129.56.207 not allowed because not listed in AllowUsers Dec 31 17:29:45 host sshd[28050]: input_userauth_request: invalid user root [preauth] Dec 31 17:29:45 host unix_chkpwd[28053]: password check failed for user (root) Dec 31 17:29:45 host sshd[28050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.129.56.207 user=root Dec 31 17:29:45 host sshd[28050]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:29:47 host sshd[28050]: Failed password for invalid user root from 45.129.56.207 port 36630 ssh2 Dec 31 17:29:47 host unix_chkpwd[28056]: password check failed for user (root) Dec 31 17:29:47 host sshd[28050]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:29:49 host sshd[28050]: Failed password for invalid user root from 45.129.56.207 port 36630 ssh2 Dec 31 17:29:49 host unix_chkpwd[28058]: password check failed for user (root) Dec 31 17:29:49 host sshd[28050]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:29:52 host sshd[28050]: Failed password for invalid user root from 45.129.56.207 port 36630 ssh2 Dec 31 17:29:52 host unix_chkpwd[28062]: password check failed for user (root) Dec 31 17:29:52 host sshd[28050]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:29:54 host sshd[28050]: Failed password for invalid user root from 45.129.56.207 port 36630 ssh2 Dec 31 17:30:26 host sshd[28175]: User root from 162.247.74.7 not allowed because not listed in AllowUsers Dec 31 17:30:26 host sshd[28175]: input_userauth_request: invalid user root [preauth] Dec 31 17:30:26 host unix_chkpwd[28178]: password check failed for user (root) Dec 31 17:30:26 host sshd[28175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.7 user=root Dec 31 17:30:26 host sshd[28175]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:30:28 host sshd[28175]: Failed password for invalid user root from 162.247.74.7 port 50540 ssh2 Dec 31 17:30:28 host unix_chkpwd[28181]: password check failed for user (root) Dec 31 17:30:28 host sshd[28175]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:30:30 host sshd[28175]: Failed password for invalid user root from 162.247.74.7 port 50540 ssh2 Dec 31 17:30:31 host unix_chkpwd[28189]: password check failed for user (root) Dec 31 17:30:31 host sshd[28175]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:30:33 host sshd[28175]: Failed password for invalid user root from 162.247.74.7 port 50540 ssh2 Dec 31 17:30:34 host unix_chkpwd[28198]: password check failed for user (root) Dec 31 17:30:34 host sshd[28175]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:30:35 host sshd[28175]: Failed password for invalid user root from 162.247.74.7 port 50540 ssh2 Dec 31 17:32:21 host sshd[28503]: Did not receive identification string from 103.215.127.5 port 52972 Dec 31 17:32:21 host sshd[28506]: User root from 103.215.127.5 not allowed because not listed in AllowUsers Dec 31 17:32:21 host sshd[28506]: input_userauth_request: invalid user root [preauth] Dec 31 17:32:21 host unix_chkpwd[28509]: password check failed for user (root) Dec 31 17:32:21 host sshd[28506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.215.127.5 user=root Dec 31 17:32:21 host sshd[28506]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:32:22 host sshd[28504]: User root from 185.220.103.8 not allowed because not listed in AllowUsers Dec 31 17:32:22 host sshd[28504]: input_userauth_request: invalid user root [preauth] Dec 31 17:32:22 host unix_chkpwd[28511]: password check failed for user (root) Dec 31 17:32:22 host sshd[28504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.103.8 user=root Dec 31 17:32:22 host sshd[28504]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:32:23 host sshd[28506]: Failed password for invalid user root from 103.215.127.5 port 52978 ssh2 Dec 31 17:32:23 host sshd[28506]: Connection closed by 103.215.127.5 port 52978 [preauth] Dec 31 17:32:24 host sshd[28504]: Failed password for invalid user root from 185.220.103.8 port 48892 ssh2 Dec 31 17:32:25 host unix_chkpwd[28537]: password check failed for user (root) Dec 31 17:32:25 host sshd[28504]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:32:27 host sshd[28504]: Failed password for invalid user root from 185.220.103.8 port 48892 ssh2 Dec 31 17:32:28 host unix_chkpwd[28540]: password check failed for user (root) Dec 31 17:32:28 host sshd[28504]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:32:30 host sshd[28504]: Failed password for invalid user root from 185.220.103.8 port 48892 ssh2 Dec 31 17:32:30 host unix_chkpwd[28544]: password check failed for user (root) Dec 31 17:32:30 host sshd[28504]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:32:32 host sshd[28504]: Failed password for invalid user root from 185.220.103.8 port 48892 ssh2 Dec 31 17:32:33 host unix_chkpwd[28547]: password check failed for user (root) Dec 31 17:32:33 host sshd[28504]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:32:35 host sshd[28504]: Failed password for invalid user root from 185.220.103.8 port 48892 ssh2 Dec 31 17:33:07 host sshd[28629]: User root from 185.129.62.63 not allowed because not listed in AllowUsers Dec 31 17:33:07 host sshd[28629]: input_userauth_request: invalid user root [preauth] Dec 31 17:33:07 host unix_chkpwd[28633]: password check failed for user (root) Dec 31 17:33:07 host sshd[28629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.129.62.63 user=root Dec 31 17:33:07 host sshd[28629]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:33:09 host sshd[28629]: Failed password for invalid user root from 185.129.62.63 port 46610 ssh2 Dec 31 17:33:09 host unix_chkpwd[28637]: password check failed for user (root) Dec 31 17:33:09 host sshd[28629]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:33:11 host sshd[28629]: Failed password for invalid user root from 185.129.62.63 port 46610 ssh2 Dec 31 17:33:12 host unix_chkpwd[28641]: password check failed for user (root) Dec 31 17:33:12 host sshd[28629]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:33:14 host sshd[28629]: Failed password for invalid user root from 185.129.62.63 port 46610 ssh2 Dec 31 17:33:14 host unix_chkpwd[28645]: password check failed for user (root) Dec 31 17:33:14 host sshd[28629]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:33:16 host sshd[28629]: Failed password for invalid user root from 185.129.62.63 port 46610 ssh2 Dec 31 17:33:17 host unix_chkpwd[28648]: password check failed for user (root) Dec 31 17:33:17 host sshd[28629]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:33:19 host sshd[28629]: Failed password for invalid user root from 185.129.62.63 port 46610 ssh2 Dec 31 17:33:25 host sshd[28343]: Connection closed by 171.25.193.234 port 5991 [preauth] Dec 31 17:33:52 host sshd[28733]: User root from 179.43.159.200 not allowed because not listed in AllowUsers Dec 31 17:33:52 host sshd[28733]: input_userauth_request: invalid user root [preauth] Dec 31 17:33:52 host unix_chkpwd[28736]: password check failed for user (root) Dec 31 17:33:52 host sshd[28733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.43.159.200 user=root Dec 31 17:33:52 host sshd[28733]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:33:54 host sshd[28733]: Failed password for invalid user root from 179.43.159.200 port 14204 ssh2 Dec 31 17:33:54 host unix_chkpwd[28739]: password check failed for user (root) Dec 31 17:33:54 host sshd[28733]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:33:56 host sshd[28733]: Failed password for invalid user root from 179.43.159.200 port 14204 ssh2 Dec 31 17:33:57 host unix_chkpwd[28743]: password check failed for user (root) Dec 31 17:33:57 host sshd[28733]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:33:59 host sshd[28733]: Failed password for invalid user root from 179.43.159.200 port 14204 ssh2 Dec 31 17:33:59 host unix_chkpwd[28746]: password check failed for user (root) Dec 31 17:33:59 host sshd[28733]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:34:01 host sshd[28733]: Failed password for invalid user root from 179.43.159.200 port 14204 ssh2 Dec 31 17:34:01 host unix_chkpwd[28759]: password check failed for user (root) Dec 31 17:34:01 host sshd[28733]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:34:04 host sshd[28733]: Failed password for invalid user root from 179.43.159.200 port 14204 ssh2 Dec 31 17:34:04 host unix_chkpwd[28767]: password check failed for user (root) Dec 31 17:34:04 host sshd[28733]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:34:05 host sshd[28733]: Failed password for invalid user root from 179.43.159.200 port 14204 ssh2 Dec 31 17:34:05 host sshd[28733]: error: maximum authentication attempts exceeded for invalid user root from 179.43.159.200 port 14204 ssh2 [preauth] Dec 31 17:34:05 host sshd[28733]: Disconnecting: Too many authentication failures [preauth] Dec 31 17:34:05 host sshd[28733]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.43.159.200 user=root Dec 31 17:34:05 host sshd[28733]: PAM service(sshd) ignoring max retries; 6 > 3 Dec 31 17:34:47 host sshd[28878]: User root from 139.99.193.7 not allowed because not listed in AllowUsers Dec 31 17:34:47 host sshd[28878]: input_userauth_request: invalid user root [preauth] Dec 31 17:34:47 host unix_chkpwd[28882]: password check failed for user (root) Dec 31 17:34:47 host sshd[28878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.193.7 user=root Dec 31 17:34:47 host sshd[28878]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:34:49 host sshd[28878]: Failed password for invalid user root from 139.99.193.7 port 39916 ssh2 Dec 31 17:34:49 host unix_chkpwd[28885]: password check failed for user (root) Dec 31 17:34:49 host sshd[28878]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:34:51 host sshd[28878]: Failed password for invalid user root from 139.99.193.7 port 39916 ssh2 Dec 31 17:34:52 host unix_chkpwd[28888]: password check failed for user (root) Dec 31 17:34:52 host sshd[28878]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:34:54 host sshd[28878]: Failed password for invalid user root from 139.99.193.7 port 39916 ssh2 Dec 31 17:34:55 host unix_chkpwd[28892]: password check failed for user (root) Dec 31 17:34:55 host sshd[28878]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:34:57 host sshd[28878]: Failed password for invalid user root from 139.99.193.7 port 39916 ssh2 Dec 31 17:34:58 host unix_chkpwd[28895]: password check failed for user (root) Dec 31 17:34:58 host sshd[28878]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:34:59 host sshd[28878]: Failed password for invalid user root from 139.99.193.7 port 39916 ssh2 Dec 31 17:35:33 host sshd[29023]: User root from 162.247.74.204 not allowed because not listed in AllowUsers Dec 31 17:35:33 host sshd[29023]: input_userauth_request: invalid user root [preauth] Dec 31 17:35:33 host unix_chkpwd[29027]: password check failed for user (root) Dec 31 17:35:33 host sshd[29023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.204 user=root Dec 31 17:35:33 host sshd[29023]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:35:34 host sshd[29023]: Failed password for invalid user root from 162.247.74.204 port 40246 ssh2 Dec 31 17:35:35 host unix_chkpwd[29030]: password check failed for user (root) Dec 31 17:35:35 host sshd[29023]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:35:37 host sshd[29023]: Failed password for invalid user root from 162.247.74.204 port 40246 ssh2 Dec 31 17:35:37 host unix_chkpwd[29034]: password check failed for user (root) Dec 31 17:35:37 host sshd[29023]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:35:39 host sshd[29023]: Failed password for invalid user root from 162.247.74.204 port 40246 ssh2 Dec 31 17:35:40 host unix_chkpwd[29053]: password check failed for user (root) Dec 31 17:35:40 host sshd[29023]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:35:42 host sshd[29023]: Failed password for invalid user root from 162.247.74.204 port 40246 ssh2 Dec 31 17:35:43 host unix_chkpwd[29058]: password check failed for user (root) Dec 31 17:35:43 host sshd[29023]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:35:45 host sshd[29023]: Failed password for invalid user root from 162.247.74.204 port 40246 ssh2 Dec 31 17:35:45 host unix_chkpwd[29079]: password check failed for user (root) Dec 31 17:35:45 host sshd[29023]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:35:47 host sshd[29023]: Failed password for invalid user root from 162.247.74.204 port 40246 ssh2 Dec 31 17:35:47 host sshd[29023]: error: maximum authentication attempts exceeded for invalid user root from 162.247.74.204 port 40246 ssh2 [preauth] Dec 31 17:35:47 host sshd[29023]: Disconnecting: Too many authentication failures [preauth] Dec 31 17:35:47 host sshd[29023]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.204 user=root Dec 31 17:35:47 host sshd[29023]: PAM service(sshd) ignoring max retries; 6 > 3 Dec 31 17:36:17 host sshd[29147]: User root from 185.220.103.5 not allowed because not listed in AllowUsers Dec 31 17:36:17 host sshd[29147]: input_userauth_request: invalid user root [preauth] Dec 31 17:36:17 host unix_chkpwd[29150]: password check failed for user (root) Dec 31 17:36:17 host sshd[29147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.103.5 user=root Dec 31 17:36:17 host sshd[29147]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:36:19 host sshd[29147]: Failed password for invalid user root from 185.220.103.5 port 39264 ssh2 Dec 31 17:36:20 host unix_chkpwd[29154]: password check failed for user (root) Dec 31 17:36:20 host sshd[29147]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:36:21 host sshd[29147]: Failed password for invalid user root from 185.220.103.5 port 39264 ssh2 Dec 31 17:36:22 host unix_chkpwd[29157]: password check failed for user (root) Dec 31 17:36:22 host sshd[29147]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:36:24 host sshd[29147]: Failed password for invalid user root from 185.220.103.5 port 39264 ssh2 Dec 31 17:36:24 host sshd[29147]: Connection closed by 185.220.103.5 port 39264 [preauth] Dec 31 17:36:24 host sshd[29147]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.103.5 user=root Dec 31 17:42:05 host sshd[29947]: Invalid user xwang from 41.197.31.178 port 37320 Dec 31 17:42:05 host sshd[29947]: input_userauth_request: invalid user xwang [preauth] Dec 31 17:42:05 host sshd[29947]: pam_unix(sshd:auth): check pass; user unknown Dec 31 17:42:05 host sshd[29947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 31 17:42:08 host sshd[29947]: Failed password for invalid user xwang from 41.197.31.178 port 37320 ssh2 Dec 31 17:42:08 host sshd[29947]: Connection closed by 41.197.31.178 port 37320 [preauth] Dec 31 17:47:40 host sshd[30678]: Did not receive identification string from 36.136.57.130 port 60536 Dec 31 17:57:31 host sshd[31999]: User root from 106.10.122.53 not allowed because not listed in AllowUsers Dec 31 17:57:31 host sshd[31999]: input_userauth_request: invalid user root [preauth] Dec 31 17:57:31 host unix_chkpwd[32002]: password check failed for user (root) Dec 31 17:57:31 host sshd[31999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 user=root Dec 31 17:57:31 host sshd[31999]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 17:57:32 host sshd[31999]: Failed password for invalid user root from 106.10.122.53 port 46618 ssh2 Dec 31 17:57:33 host sshd[31999]: Connection closed by 106.10.122.53 port 46618 [preauth] Dec 31 17:59:21 host sshd[32186]: Invalid user frank from 107.189.30.59 port 55916 Dec 31 17:59:21 host sshd[32186]: input_userauth_request: invalid user frank [preauth] Dec 31 17:59:21 host sshd[32186]: pam_unix(sshd:auth): check pass; user unknown Dec 31 17:59:21 host sshd[32186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Dec 31 17:59:22 host sshd[32186]: Failed password for invalid user frank from 107.189.30.59 port 55916 ssh2 Dec 31 17:59:23 host sshd[32186]: Connection closed by 107.189.30.59 port 55916 [preauth] Dec 31 18:07:36 host sshd[953]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Dec 31 18:07:36 host sshd[953]: input_userauth_request: invalid user root [preauth] Dec 31 18:07:36 host unix_chkpwd[956]: password check failed for user (root) Dec 31 18:07:36 host sshd[953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Dec 31 18:07:36 host sshd[953]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 18:07:38 host sshd[953]: Failed password for invalid user root from 162.218.126.136 port 51456 ssh2 Dec 31 18:07:38 host sshd[953]: Connection closed by 162.218.126.136 port 51456 [preauth] Dec 31 18:09:29 host sshd[1170]: Connection closed by 172.104.11.34 port 4054 [preauth] Dec 31 18:09:31 host sshd[1173]: Connection closed by 172.104.11.34 port 4066 [preauth] Dec 31 18:09:33 host sshd[1176]: Connection closed by 172.104.11.34 port 4082 [preauth] Dec 31 18:16:25 host sshd[2231]: Invalid user Admin from 45.93.201.90 port 45866 Dec 31 18:16:25 host sshd[2231]: input_userauth_request: invalid user Admin [preauth] Dec 31 18:16:25 host sshd[2231]: pam_unix(sshd:auth): check pass; user unknown Dec 31 18:16:25 host sshd[2231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 31 18:16:27 host sshd[2231]: Failed password for invalid user Admin from 45.93.201.90 port 45866 ssh2 Dec 31 18:16:30 host sshd[2231]: pam_unix(sshd:auth): check pass; user unknown Dec 31 18:16:33 host sshd[2231]: Failed password for invalid user Admin from 45.93.201.90 port 45866 ssh2 Dec 31 18:16:36 host sshd[2231]: pam_unix(sshd:auth): check pass; user unknown Dec 31 18:16:38 host sshd[2231]: Failed password for invalid user Admin from 45.93.201.90 port 45866 ssh2 Dec 31 18:16:41 host sshd[2231]: Connection closed by 45.93.201.90 port 45866 [preauth] Dec 31 18:16:41 host sshd[2231]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 31 18:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 18:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 18:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 18:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 18:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 18:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 18:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 18:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 18:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 18:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 31 18:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 18:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 18:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 31 18:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 18:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 18:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 31 18:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 18:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 18:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 31 18:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 18:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 18:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 31 18:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 18:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 18:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 31 18:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 18:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 18:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 31 18:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 18:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 18:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 31 18:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 18:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 31 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=vfmassets user-3=shalinijames user-4=wwwtestugo user-5=wwwkapin user-6=woodpeck user-7=disposeat user-8=remysagr user-9=wwwkmaorg user-10=wwwnexidigital user-11=mrsclean user-12=palco123 user-13=gifterman user-14=kottayamcalldriv user-15=phmetals user-16=straightcurve user-17=wwwletsstalkfood user-18=bonifacegroup user-19=wwwevmhonda user-20=laundryboniface user-21=a2zgroup user-22=dartsimp user-23=wwwkaretakers user-24=cochintaxi user-25=wwwresourcehunte user-26=keralaholi user-27=wwwrmswll user-28=ugotscom user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 31 18:21:50 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 31 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-RySDSHVrukgEUALA.~ Dec 31 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-RySDSHVrukgEUALA.~' Dec 31 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-RySDSHVrukgEUALA.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 18:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 31 18:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 18:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 18:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 31 18:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 18:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 18:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 18:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 18:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 18:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 18:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 18:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 18:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 18:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 18:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 18:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 31 18:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 18:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 18:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 18:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 18:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 18:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 31 18:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 31 18:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 31 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 31 18:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 18:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 31 18:21:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 18:21:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 18:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 31 18:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 18:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 31 18:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 18:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 18:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 31 18:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 18:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 18:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 31 18:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 18:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 18:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 31 18:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 18:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 18:23:53 host sshd[3380]: Invalid user user1 from 92.46.108.20 port 46974 Dec 31 18:23:53 host sshd[3380]: input_userauth_request: invalid user user1 [preauth] Dec 31 18:23:54 host sshd[3380]: pam_unix(sshd:auth): check pass; user unknown Dec 31 18:23:54 host sshd[3380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 31 18:23:56 host sshd[3380]: Failed password for invalid user user1 from 92.46.108.20 port 46974 ssh2 Dec 31 18:23:57 host sshd[3380]: Connection closed by 92.46.108.20 port 46974 [preauth] Dec 31 18:30:16 host sshd[4207]: Invalid user rsync from 103.13.40.2 port 35870 Dec 31 18:30:16 host sshd[4207]: input_userauth_request: invalid user rsync [preauth] Dec 31 18:30:16 host sshd[4207]: pam_unix(sshd:auth): check pass; user unknown Dec 31 18:30:16 host sshd[4207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 31 18:30:19 host sshd[4207]: Failed password for invalid user rsync from 103.13.40.2 port 35870 ssh2 Dec 31 18:30:19 host sshd[4207]: Connection closed by 103.13.40.2 port 35870 [preauth] Dec 31 18:42:37 host sshd[5845]: Did not receive identification string from 205.210.31.31 port 56930 Dec 31 19:12:46 host sshd[10191]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Dec 31 19:12:46 host sshd[10191]: input_userauth_request: invalid user root [preauth] Dec 31 19:12:46 host unix_chkpwd[10196]: password check failed for user (root) Dec 31 19:12:46 host sshd[10191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Dec 31 19:12:46 host sshd[10191]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 19:12:48 host sshd[10191]: Failed password for invalid user root from 162.218.126.136 port 51776 ssh2 Dec 31 19:12:48 host sshd[10191]: Connection closed by 162.218.126.136 port 51776 [preauth] Dec 31 19:19:21 host sshd[11058]: User root from 222.168.30.19 not allowed because not listed in AllowUsers Dec 31 19:19:21 host sshd[11058]: input_userauth_request: invalid user root [preauth] Dec 31 19:19:21 host unix_chkpwd[11061]: password check failed for user (root) Dec 31 19:19:21 host sshd[11058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.168.30.19 user=root Dec 31 19:19:21 host sshd[11058]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 19:19:23 host sshd[11058]: Failed password for invalid user root from 222.168.30.19 port 32049 ssh2 Dec 31 19:19:23 host unix_chkpwd[11064]: password check failed for user (root) Dec 31 19:19:23 host sshd[11058]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 19:19:26 host sshd[11058]: Failed password for invalid user root from 222.168.30.19 port 32049 ssh2 Dec 31 19:19:26 host unix_chkpwd[11088]: password check failed for user (root) Dec 31 19:19:26 host sshd[11058]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 19:19:28 host sshd[11058]: Failed password for invalid user root from 222.168.30.19 port 32049 ssh2 Dec 31 19:19:28 host unix_chkpwd[11092]: password check failed for user (root) Dec 31 19:19:28 host sshd[11058]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 19:19:30 host sshd[11058]: Failed password for invalid user root from 222.168.30.19 port 32049 ssh2 Dec 31 19:19:30 host unix_chkpwd[11095]: password check failed for user (root) Dec 31 19:19:30 host sshd[11058]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 19:19:33 host sshd[11058]: Failed password for invalid user root from 222.168.30.19 port 32049 ssh2 Dec 31 19:19:33 host unix_chkpwd[11104]: password check failed for user (root) Dec 31 19:19:33 host sshd[11058]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 19:19:35 host sshd[11058]: Failed password for invalid user root from 222.168.30.19 port 32049 ssh2 Dec 31 19:19:35 host sshd[11058]: error: maximum authentication attempts exceeded for invalid user root from 222.168.30.19 port 32049 ssh2 [preauth] Dec 31 19:19:35 host sshd[11058]: Disconnecting: Too many authentication failures [preauth] Dec 31 19:19:35 host sshd[11058]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.168.30.19 user=root Dec 31 19:19:35 host sshd[11058]: PAM service(sshd) ignoring max retries; 6 > 3 Dec 31 19:20:50 host sshd[11277]: Invalid user team2 from 106.10.122.53 port 48054 Dec 31 19:20:50 host sshd[11277]: input_userauth_request: invalid user team2 [preauth] Dec 31 19:20:50 host sshd[11277]: pam_unix(sshd:auth): check pass; user unknown Dec 31 19:20:50 host sshd[11277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 31 19:20:52 host sshd[11277]: Failed password for invalid user team2 from 106.10.122.53 port 48054 ssh2 Dec 31 19:20:52 host sshd[11277]: Connection closed by 106.10.122.53 port 48054 [preauth] Dec 31 19:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 19:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 19:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 19:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 19:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 19:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 19:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 19:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 19:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 19:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 31 19:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 19:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 19:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 31 19:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 19:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 19:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 31 19:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 19:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 19:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 31 19:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 19:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 19:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 31 19:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 19:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 19:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 31 19:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 19:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 19:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 31 19:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 19:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 19:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 31 19:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 19:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 19:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 19:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 31 19:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=a2zgroup user-3=dartsimp user-4=cochintaxi user-5=wwwkaretakers user-6=wwwresourcehunte user-7=keralaholi user-8=wwwrmswll user-9=ugotscom user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=vfmassets user-14=shalinijames user-15=wwwtestugo user-16=woodpeck user-17=wwwkapin user-18=remysagr user-19=disposeat user-20=wwwkmaorg user-21=wwwnexidigital user-22=mrsclean user-23=palco123 user-24=gifterman user-25=phmetals user-26=kottayamcalldriv user-27=straightcurve user-28=wwwletsstalkfood user-29=bonifacegroup user-30=wwwevmhonda feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 31 19:21:50 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 31 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Q2W65VZXTkdldlHo.~ Dec 31 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Q2W65VZXTkdldlHo.~' Dec 31 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Q2W65VZXTkdldlHo.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 31 19:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 19:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 19:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 31 19:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 19:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 19:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 19:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 19:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 19:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 19:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 19:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 19:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 19:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 19:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 19:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 31 19:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 19:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 19:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 19:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 19:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 31 19:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 31 19:21:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 31 19:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 31 19:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 19:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 19:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 31 19:21:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 19:21:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 31 19:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 19:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 19:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 31 19:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 19:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 31 19:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 19:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 19:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 31 19:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 19:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 19:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 31 19:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 19:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 19:22:58 host sshd[11843]: Invalid user rh from 182.70.116.181 port 39740 Dec 31 19:22:58 host sshd[11843]: input_userauth_request: invalid user rh [preauth] Dec 31 19:22:58 host sshd[11843]: pam_unix(sshd:auth): check pass; user unknown Dec 31 19:22:58 host sshd[11843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.70.116.181 Dec 31 19:23:00 host sshd[11843]: Failed password for invalid user rh from 182.70.116.181 port 39740 ssh2 Dec 31 19:23:00 host sshd[11843]: Received disconnect from 182.70.116.181 port 39740:11: Bye Bye [preauth] Dec 31 19:23:00 host sshd[11843]: Disconnected from 182.70.116.181 port 39740 [preauth] Dec 31 19:23:09 host sshd[11864]: Invalid user deploy from 103.151.241.48 port 52100 Dec 31 19:23:09 host sshd[11864]: input_userauth_request: invalid user deploy [preauth] Dec 31 19:23:09 host sshd[11864]: pam_unix(sshd:auth): check pass; user unknown Dec 31 19:23:09 host sshd[11864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.151.241.48 Dec 31 19:23:12 host sshd[11864]: Failed password for invalid user deploy from 103.151.241.48 port 52100 ssh2 Dec 31 19:23:12 host sshd[11864]: Received disconnect from 103.151.241.48 port 52100:11: Bye Bye [preauth] Dec 31 19:23:12 host sshd[11864]: Disconnected from 103.151.241.48 port 52100 [preauth] Dec 31 19:23:53 host sshd[11940]: Invalid user pivpn from 34.71.71.142 port 35340 Dec 31 19:23:53 host sshd[11940]: input_userauth_request: invalid user pivpn [preauth] Dec 31 19:23:53 host sshd[11940]: pam_unix(sshd:auth): check pass; user unknown Dec 31 19:23:53 host sshd[11940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.71.71.142 Dec 31 19:23:56 host sshd[11940]: Failed password for invalid user pivpn from 34.71.71.142 port 35340 ssh2 Dec 31 19:23:56 host sshd[11940]: Received disconnect from 34.71.71.142 port 35340:11: Bye Bye [preauth] Dec 31 19:23:56 host sshd[11940]: Disconnected from 34.71.71.142 port 35340 [preauth] Dec 31 19:24:55 host sshd[12044]: User root from 41.197.31.178 not allowed because not listed in AllowUsers Dec 31 19:24:55 host sshd[12044]: input_userauth_request: invalid user root [preauth] Dec 31 19:24:55 host unix_chkpwd[12047]: password check failed for user (root) Dec 31 19:24:55 host sshd[12044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 user=root Dec 31 19:24:55 host sshd[12044]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 19:24:57 host sshd[12044]: Failed password for invalid user root from 41.197.31.178 port 53188 ssh2 Dec 31 19:24:57 host sshd[12044]: Connection closed by 41.197.31.178 port 53188 [preauth] Dec 31 19:26:05 host sshd[12194]: Invalid user msp from 159.203.177.51 port 51644 Dec 31 19:26:05 host sshd[12194]: input_userauth_request: invalid user msp [preauth] Dec 31 19:26:05 host sshd[12194]: pam_unix(sshd:auth): check pass; user unknown Dec 31 19:26:05 host sshd[12194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.177.51 Dec 31 19:26:07 host sshd[12194]: Failed password for invalid user msp from 159.203.177.51 port 51644 ssh2 Dec 31 19:26:08 host sshd[12194]: Received disconnect from 159.203.177.51 port 51644:11: Bye Bye [preauth] Dec 31 19:26:08 host sshd[12194]: Disconnected from 159.203.177.51 port 51644 [preauth] Dec 31 19:27:29 host sshd[12335]: User root from 34.71.71.142 not allowed because not listed in AllowUsers Dec 31 19:27:29 host sshd[12335]: input_userauth_request: invalid user root [preauth] Dec 31 19:27:30 host unix_chkpwd[12338]: password check failed for user (root) Dec 31 19:27:30 host sshd[12335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.71.71.142 user=root Dec 31 19:27:30 host sshd[12335]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 19:27:32 host sshd[12335]: Failed password for invalid user root from 34.71.71.142 port 52420 ssh2 Dec 31 19:27:32 host sshd[12335]: Received disconnect from 34.71.71.142 port 52420:11: Bye Bye [preauth] Dec 31 19:27:32 host sshd[12335]: Disconnected from 34.71.71.142 port 52420 [preauth] Dec 31 19:27:58 host sshd[12521]: User root from 103.151.241.48 not allowed because not listed in AllowUsers Dec 31 19:27:58 host sshd[12521]: input_userauth_request: invalid user root [preauth] Dec 31 19:27:58 host unix_chkpwd[12525]: password check failed for user (root) Dec 31 19:27:58 host sshd[12521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.151.241.48 user=root Dec 31 19:27:58 host sshd[12521]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 19:28:00 host sshd[12521]: Failed password for invalid user root from 103.151.241.48 port 60932 ssh2 Dec 31 19:28:00 host sshd[12521]: Received disconnect from 103.151.241.48 port 60932:11: Bye Bye [preauth] Dec 31 19:28:00 host sshd[12521]: Disconnected from 103.151.241.48 port 60932 [preauth] Dec 31 19:28:04 host sshd[12554]: Invalid user test from 159.203.177.51 port 54704 Dec 31 19:28:04 host sshd[12554]: input_userauth_request: invalid user test [preauth] Dec 31 19:28:04 host sshd[12554]: pam_unix(sshd:auth): check pass; user unknown Dec 31 19:28:04 host sshd[12554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.177.51 Dec 31 19:28:06 host sshd[12554]: Failed password for invalid user test from 159.203.177.51 port 54704 ssh2 Dec 31 19:28:06 host sshd[12554]: Received disconnect from 159.203.177.51 port 54704:11: Bye Bye [preauth] Dec 31 19:28:06 host sshd[12554]: Disconnected from 159.203.177.51 port 54704 [preauth] Dec 31 19:28:13 host sshd[12590]: Invalid user ec from 182.70.116.181 port 38194 Dec 31 19:28:13 host sshd[12590]: input_userauth_request: invalid user ec [preauth] Dec 31 19:28:13 host sshd[12590]: pam_unix(sshd:auth): check pass; user unknown Dec 31 19:28:13 host sshd[12590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.70.116.181 Dec 31 19:28:16 host sshd[12590]: Failed password for invalid user ec from 182.70.116.181 port 38194 ssh2 Dec 31 19:28:16 host sshd[12590]: Received disconnect from 182.70.116.181 port 38194:11: Bye Bye [preauth] Dec 31 19:28:16 host sshd[12590]: Disconnected from 182.70.116.181 port 38194 [preauth] Dec 31 19:28:36 host sshd[12632]: Invalid user student3 from 205.185.119.114 port 53134 Dec 31 19:28:36 host sshd[12632]: input_userauth_request: invalid user student3 [preauth] Dec 31 19:28:36 host sshd[12632]: pam_unix(sshd:auth): check pass; user unknown Dec 31 19:28:36 host sshd[12632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.119.114 Dec 31 19:28:39 host sshd[12632]: Failed password for invalid user student3 from 205.185.119.114 port 53134 ssh2 Dec 31 19:28:39 host sshd[12632]: Received disconnect from 205.185.119.114 port 53134:11: Bye Bye [preauth] Dec 31 19:28:39 host sshd[12632]: Disconnected from 205.185.119.114 port 53134 [preauth] Dec 31 19:29:13 host sshd[12688]: User root from 159.203.177.51 not allowed because not listed in AllowUsers Dec 31 19:29:13 host sshd[12688]: input_userauth_request: invalid user root [preauth] Dec 31 19:29:13 host unix_chkpwd[12692]: password check failed for user (root) Dec 31 19:29:13 host sshd[12688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.177.51 user=root Dec 31 19:29:13 host sshd[12688]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 19:29:15 host sshd[12688]: Failed password for invalid user root from 159.203.177.51 port 47332 ssh2 Dec 31 19:29:15 host sshd[12688]: Received disconnect from 159.203.177.51 port 47332:11: Bye Bye [preauth] Dec 31 19:29:15 host sshd[12688]: Disconnected from 159.203.177.51 port 47332 [preauth] Dec 31 19:29:41 host sshd[12770]: User root from 182.70.116.181 not allowed because not listed in AllowUsers Dec 31 19:29:41 host sshd[12770]: input_userauth_request: invalid user root [preauth] Dec 31 19:29:41 host unix_chkpwd[12773]: password check failed for user (root) Dec 31 19:29:41 host sshd[12770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.70.116.181 user=root Dec 31 19:29:41 host sshd[12770]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 19:29:43 host sshd[12770]: Failed password for invalid user root from 182.70.116.181 port 38624 ssh2 Dec 31 19:29:43 host sshd[12770]: Received disconnect from 182.70.116.181 port 38624:11: Bye Bye [preauth] Dec 31 19:29:43 host sshd[12770]: Disconnected from 182.70.116.181 port 38624 [preauth] Dec 31 19:32:19 host sshd[13129]: Invalid user yn from 205.185.119.114 port 57966 Dec 31 19:32:19 host sshd[13129]: input_userauth_request: invalid user yn [preauth] Dec 31 19:32:19 host sshd[13129]: pam_unix(sshd:auth): check pass; user unknown Dec 31 19:32:19 host sshd[13129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.119.114 Dec 31 19:32:21 host sshd[13129]: Failed password for invalid user yn from 205.185.119.114 port 57966 ssh2 Dec 31 19:32:22 host sshd[13129]: Received disconnect from 205.185.119.114 port 57966:11: Bye Bye [preauth] Dec 31 19:32:22 host sshd[13129]: Disconnected from 205.185.119.114 port 57966 [preauth] Dec 31 19:33:04 host sshd[13317]: User root from 82.111.224.128 not allowed because not listed in AllowUsers Dec 31 19:33:04 host sshd[13317]: input_userauth_request: invalid user root [preauth] Dec 31 19:33:04 host unix_chkpwd[13320]: password check failed for user (root) Dec 31 19:33:04 host sshd[13317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.111.224.128 user=root Dec 31 19:33:04 host sshd[13317]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 19:33:06 host sshd[13317]: Failed password for invalid user root from 82.111.224.128 port 37318 ssh2 Dec 31 19:33:06 host sshd[13317]: Received disconnect from 82.111.224.128 port 37318:11: Bye Bye [preauth] Dec 31 19:33:06 host sshd[13317]: Disconnected from 82.111.224.128 port 37318 [preauth] Dec 31 19:34:09 host sshd[13438]: Invalid user tmp from 205.185.119.114 port 54270 Dec 31 19:34:09 host sshd[13438]: input_userauth_request: invalid user tmp [preauth] Dec 31 19:34:09 host sshd[13438]: pam_unix(sshd:auth): check pass; user unknown Dec 31 19:34:09 host sshd[13438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.119.114 Dec 31 19:34:11 host sshd[13438]: Failed password for invalid user tmp from 205.185.119.114 port 54270 ssh2 Dec 31 19:34:11 host sshd[13438]: Received disconnect from 205.185.119.114 port 54270:11: Bye Bye [preauth] Dec 31 19:34:11 host sshd[13438]: Disconnected from 205.185.119.114 port 54270 [preauth] Dec 31 19:39:41 host sshd[14215]: Invalid user ty from 82.111.224.128 port 38597 Dec 31 19:39:41 host sshd[14215]: input_userauth_request: invalid user ty [preauth] Dec 31 19:39:41 host sshd[14215]: pam_unix(sshd:auth): check pass; user unknown Dec 31 19:39:41 host sshd[14215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.111.224.128 Dec 31 19:39:43 host sshd[14215]: Failed password for invalid user ty from 82.111.224.128 port 38597 ssh2 Dec 31 19:39:43 host sshd[14215]: Received disconnect from 82.111.224.128 port 38597:11: Bye Bye [preauth] Dec 31 19:39:43 host sshd[14215]: Disconnected from 82.111.224.128 port 38597 [preauth] Dec 31 19:50:48 host sshd[15667]: Did not receive identification string from 57.128.11.38 port 22274 Dec 31 19:50:48 host sshd[15668]: Invalid user guest from 57.128.11.38 port 23518 Dec 31 19:50:48 host sshd[15668]: input_userauth_request: invalid user guest [preauth] Dec 31 19:50:49 host sshd[15668]: pam_unix(sshd:auth): check pass; user unknown Dec 31 19:50:49 host sshd[15668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.38 Dec 31 19:50:51 host sshd[15668]: Failed password for invalid user guest from 57.128.11.38 port 23518 ssh2 Dec 31 19:50:51 host sshd[15668]: Connection closed by 57.128.11.38 port 23518 [preauth] Dec 31 19:52:16 host sshd[15811]: Invalid user centor from 103.13.40.2 port 39290 Dec 31 19:52:16 host sshd[15811]: input_userauth_request: invalid user centor [preauth] Dec 31 19:52:16 host sshd[15811]: pam_unix(sshd:auth): check pass; user unknown Dec 31 19:52:16 host sshd[15811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 31 19:52:18 host sshd[15811]: Failed password for invalid user centor from 103.13.40.2 port 39290 ssh2 Dec 31 19:52:18 host sshd[15811]: Connection closed by 103.13.40.2 port 39290 [preauth] Dec 31 19:58:00 host sshd[16578]: Bad protocol version identification 'GET / HTTP/1.1' from 45.134.144.198 port 45812 Dec 31 20:03:57 host sshd[17372]: Invalid user deploy from 36.93.32.191 port 59258 Dec 31 20:03:57 host sshd[17372]: input_userauth_request: invalid user deploy [preauth] Dec 31 20:03:57 host sshd[17372]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:03:57 host sshd[17372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.93.32.191 Dec 31 20:03:58 host sshd[17372]: Failed password for invalid user deploy from 36.93.32.191 port 59258 ssh2 Dec 31 20:03:58 host sshd[17372]: Received disconnect from 36.93.32.191 port 59258:11: Bye Bye [preauth] Dec 31 20:03:58 host sshd[17372]: Disconnected from 36.93.32.191 port 59258 [preauth] Dec 31 20:05:44 host sshd[17687]: User root from 61.48.23.122 not allowed because not listed in AllowUsers Dec 31 20:05:44 host sshd[17687]: input_userauth_request: invalid user root [preauth] Dec 31 20:05:44 host unix_chkpwd[17702]: password check failed for user (root) Dec 31 20:05:44 host sshd[17687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.48.23.122 user=root Dec 31 20:05:44 host sshd[17687]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 20:05:46 host sshd[17687]: Failed password for invalid user root from 61.48.23.122 port 12591 ssh2 Dec 31 20:05:46 host unix_chkpwd[17705]: password check failed for user (root) Dec 31 20:05:46 host sshd[17687]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 20:05:48 host sshd[17687]: Failed password for invalid user root from 61.48.23.122 port 12591 ssh2 Dec 31 20:05:49 host unix_chkpwd[17708]: password check failed for user (root) Dec 31 20:05:49 host sshd[17687]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 20:05:51 host sshd[17687]: Failed password for invalid user root from 61.48.23.122 port 12591 ssh2 Dec 31 20:05:52 host unix_chkpwd[17714]: password check failed for user (root) Dec 31 20:05:52 host sshd[17687]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 20:05:54 host sshd[17687]: Failed password for invalid user root from 61.48.23.122 port 12591 ssh2 Dec 31 20:05:54 host unix_chkpwd[17719]: password check failed for user (root) Dec 31 20:05:54 host sshd[17687]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 20:05:56 host sshd[17687]: Failed password for invalid user root from 61.48.23.122 port 12591 ssh2 Dec 31 20:09:59 host sshd[18229]: User root from 36.93.32.191 not allowed because not listed in AllowUsers Dec 31 20:09:59 host sshd[18229]: input_userauth_request: invalid user root [preauth] Dec 31 20:09:59 host unix_chkpwd[18232]: password check failed for user (root) Dec 31 20:09:59 host sshd[18229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.93.32.191 user=root Dec 31 20:09:59 host sshd[18229]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 20:10:02 host sshd[18229]: Failed password for invalid user root from 36.93.32.191 port 45672 ssh2 Dec 31 20:10:02 host sshd[18229]: Received disconnect from 36.93.32.191 port 45672:11: Bye Bye [preauth] Dec 31 20:10:02 host sshd[18229]: Disconnected from 36.93.32.191 port 45672 [preauth] Dec 31 20:17:53 host sshd[19457]: Invalid user user from 162.218.126.136 port 47930 Dec 31 20:17:53 host sshd[19457]: input_userauth_request: invalid user user [preauth] Dec 31 20:17:53 host sshd[19457]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:17:53 host sshd[19457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 31 20:17:55 host sshd[19457]: Failed password for invalid user user from 162.218.126.136 port 47930 ssh2 Dec 31 20:17:55 host sshd[19457]: Connection closed by 162.218.126.136 port 47930 [preauth] Dec 31 20:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 20:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 20:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 20:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 20:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 20:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 20:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 20:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 20:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 20:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 31 20:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 20:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 20:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 31 20:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 20:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 20:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 31 20:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 20:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 20:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 31 20:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 20:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 20:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 31 20:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 20:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 20:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 31 20:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 20:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 20:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 31 20:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 20:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 20:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 31 20:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 20:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 20:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 20:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 31 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=travelboniface user-2=wwwrmswll user-3=keralaholi user-4=wwwresourcehunte user-5=ugotscom user-6=wwwpmcresource user-7=dartsimp user-8=a2zgroup user-9=laundryboniface user-10=wwwkaretakers user-11=cochintaxi user-12=gifterman user-13=palco123 user-14=kottayamcalldriv user-15=phmetals user-16=mrsclean user-17=wwwnexidigital user-18=bonifacegroup user-19=wwwevmhonda user-20=wwwletsstalkfood user-21=straightcurve user-22=vfmassets user-23=wwwtestugo user-24=shalinijames user-25=pmcresources user-26=remysagr user-27=disposeat user-28=wwwkmaorg user-29=woodpeck user-30=wwwkapin feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 31 20:21:50 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 31 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-X073eH0f9YVkObfl.~ Dec 31 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-X073eH0f9YVkObfl.~' Dec 31 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-X073eH0f9YVkObfl.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 31 20:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 20:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 20:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 31 20:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 20:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 20:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 20:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 20:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 20:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 20:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 20:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 20:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 31 20:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 20:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 20:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 20:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 20:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 31 20:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 31 20:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 31 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 31 20:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 20:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 20:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 31 20:22:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 20:22:05 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 20:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 31 20:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 20:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 20:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 31 20:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 20:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 20:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 31 20:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 20:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 20:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 31 20:22:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 20:22:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 20:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 31 20:22:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 20:22:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 20:23:52 host sshd[20516]: Did not receive identification string from 57.128.11.39 port 36712 Dec 31 20:23:53 host sshd[20517]: Invalid user ftpuser from 57.128.11.39 port 37830 Dec 31 20:23:53 host sshd[20517]: input_userauth_request: invalid user ftpuser [preauth] Dec 31 20:23:53 host sshd[20521]: Invalid user devops from 57.128.11.39 port 37838 Dec 31 20:23:53 host sshd[20522]: Invalid user ftpuser from 57.128.11.39 port 37886 Dec 31 20:23:53 host sshd[20519]: Invalid user guest from 57.128.11.39 port 37882 Dec 31 20:23:53 host sshd[20520]: Invalid user test from 57.128.11.39 port 37826 Dec 31 20:23:53 host sshd[20522]: input_userauth_request: invalid user ftpuser [preauth] Dec 31 20:23:53 host sshd[20518]: Invalid user admin from 57.128.11.39 port 37890 Dec 31 20:23:53 host sshd[20519]: input_userauth_request: invalid user guest [preauth] Dec 31 20:23:53 host sshd[20520]: input_userauth_request: invalid user test [preauth] Dec 31 20:23:53 host sshd[20521]: input_userauth_request: invalid user devops [preauth] Dec 31 20:23:53 host sshd[20518]: input_userauth_request: invalid user admin [preauth] Dec 31 20:23:53 host sshd[20524]: Invalid user ts3server from 57.128.11.39 port 37820 Dec 31 20:23:53 host sshd[20524]: input_userauth_request: invalid user ts3server [preauth] Dec 31 20:23:53 host sshd[20525]: User centos from 57.128.11.39 not allowed because not listed in AllowUsers Dec 31 20:23:53 host sshd[20525]: input_userauth_request: invalid user centos [preauth] Dec 31 20:23:53 host sshd[20534]: Invalid user guest from 57.128.11.39 port 37856 Dec 31 20:23:53 host sshd[20534]: input_userauth_request: invalid user guest [preauth] Dec 31 20:23:53 host sshd[20528]: Invalid user guest from 57.128.11.39 port 37888 Dec 31 20:23:53 host sshd[20526]: Invalid user elastic from 57.128.11.39 port 37836 Dec 31 20:23:53 host sshd[20526]: input_userauth_request: invalid user elastic [preauth] Dec 31 20:23:53 host sshd[20528]: input_userauth_request: invalid user guest [preauth] Dec 31 20:23:53 host sshd[20536]: Invalid user ansible from 57.128.11.39 port 37854 Dec 31 20:23:53 host sshd[20536]: input_userauth_request: invalid user ansible [preauth] Dec 31 20:23:53 host sshd[20531]: User centos from 57.128.11.39 not allowed because not listed in AllowUsers Dec 31 20:23:53 host sshd[20531]: input_userauth_request: invalid user centos [preauth] Dec 31 20:23:53 host sshd[20530]: Invalid user teamspeak3 from 57.128.11.39 port 37874 Dec 31 20:23:53 host sshd[20530]: input_userauth_request: invalid user teamspeak3 [preauth] Dec 31 20:23:53 host sshd[20532]: Invalid user oracle from 57.128.11.39 port 37840 Dec 31 20:23:53 host sshd[20529]: Invalid user user from 57.128.11.39 port 37860 Dec 31 20:23:53 host sshd[20532]: input_userauth_request: invalid user oracle [preauth] Dec 31 20:23:53 host sshd[20529]: input_userauth_request: invalid user user [preauth] Dec 31 20:23:53 host sshd[20540]: Invalid user ec2-user from 57.128.11.39 port 37898 Dec 31 20:23:53 host sshd[20540]: input_userauth_request: invalid user ec2-user [preauth] Dec 31 20:23:53 host sshd[20537]: Invalid user esuser from 57.128.11.39 port 37828 Dec 31 20:23:53 host sshd[20537]: input_userauth_request: invalid user esuser [preauth] Dec 31 20:23:53 host sshd[20533]: Invalid user www from 57.128.11.39 port 37902 Dec 31 20:23:53 host sshd[20523]: Invalid user 1 from 57.128.11.39 port 37834 Dec 31 20:23:53 host sshd[20523]: input_userauth_request: invalid user 1 [preauth] Dec 31 20:23:53 host sshd[20533]: input_userauth_request: invalid user www [preauth] Dec 31 20:23:53 host sshd[20541]: User mysql from 57.128.11.39 not allowed because not listed in AllowUsers Dec 31 20:23:53 host sshd[20541]: input_userauth_request: invalid user mysql [preauth] Dec 31 20:23:53 host sshd[20538]: Invalid user postgres from 57.128.11.39 port 37844 Dec 31 20:23:53 host sshd[20538]: input_userauth_request: invalid user postgres [preauth] Dec 31 20:23:53 host sshd[20543]: Invalid user linux from 57.128.11.39 port 37872 Dec 31 20:23:53 host sshd[20543]: input_userauth_request: invalid user linux [preauth] Dec 31 20:23:53 host sshd[20527]: Invalid user ansadmin from 57.128.11.39 port 37868 Dec 31 20:23:53 host sshd[20527]: input_userauth_request: invalid user ansadmin [preauth] Dec 31 20:23:53 host sshd[20535]: Invalid user bitrix from 57.128.11.39 port 37824 Dec 31 20:23:53 host sshd[20535]: input_userauth_request: invalid user bitrix [preauth] Dec 31 20:23:53 host sshd[20539]: Invalid user elastic from 57.128.11.39 port 37846 Dec 31 20:23:53 host sshd[20539]: input_userauth_request: invalid user elastic [preauth] Dec 31 20:23:53 host sshd[20544]: Invalid user oracle from 57.128.11.39 port 37880 Dec 31 20:23:53 host sshd[20544]: input_userauth_request: invalid user oracle [preauth] Dec 31 20:23:53 host sshd[20542]: Invalid user q from 57.128.11.39 port 37818 Dec 31 20:23:53 host sshd[20542]: input_userauth_request: invalid user q [preauth] Dec 31 20:23:53 host sshd[20548]: Invalid user dmdba from 57.128.11.39 port 37864 Dec 31 20:23:53 host sshd[20548]: input_userauth_request: invalid user dmdba [preauth] Dec 31 20:23:53 host sshd[20547]: Invalid user discord from 57.128.11.39 port 37866 Dec 31 20:23:53 host sshd[20547]: input_userauth_request: invalid user discord [preauth] Dec 31 20:23:53 host sshd[20549]: Invalid user q from 57.128.11.39 port 37884 Dec 31 20:23:53 host sshd[20549]: input_userauth_request: invalid user q [preauth] Dec 31 20:23:53 host sshd[20517]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:23:53 host sshd[20524]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:23:53 host sshd[20524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39 Dec 31 20:23:53 host sshd[20517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39 Dec 31 20:23:53 host sshd[20519]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:23:53 host sshd[20519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39 Dec 31 20:23:53 host sshd[20522]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:23:53 host sshd[20520]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:23:53 host sshd[20521]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:23:53 host sshd[20522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39 Dec 31 20:23:53 host sshd[20520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39 Dec 31 20:23:53 host sshd[20521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39 Dec 31 20:23:53 host sshd[20518]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:23:53 host sshd[20518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39 Dec 31 20:23:53 host unix_chkpwd[20580]: password check failed for user (centos) Dec 31 20:23:53 host sshd[20525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39 user=centos Dec 31 20:23:53 host sshd[20534]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:23:53 host sshd[20534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39 Dec 31 20:23:53 host sshd[20528]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:23:53 host sshd[20528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39 Dec 31 20:23:53 host sshd[20526]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:23:53 host sshd[20526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39 Dec 31 20:23:53 host sshd[20523]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:23:53 host sshd[20523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39 Dec 31 20:23:53 host sshd[20530]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:23:53 host sshd[20530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39 Dec 31 20:23:53 host sshd[20536]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:23:53 host sshd[20536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39 Dec 31 20:23:53 host sshd[20529]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:23:53 host sshd[20529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39 Dec 31 20:23:53 host sshd[20527]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:23:53 host sshd[20527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39 Dec 31 20:23:53 host sshd[20535]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:23:53 host sshd[20535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39 Dec 31 20:23:53 host sshd[20532]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:23:53 host sshd[20532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39 Dec 31 20:23:53 host sshd[20533]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:23:53 host sshd[20533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39 Dec 31 20:23:53 host sshd[20540]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:23:53 host sshd[20540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39 Dec 31 20:23:53 host sshd[20537]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:23:53 host sshd[20537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39 Dec 31 20:23:53 host sshd[20538]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:23:53 host sshd[20538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39 Dec 31 20:23:53 host unix_chkpwd[20581]: password check failed for user (centos) Dec 31 20:23:53 host sshd[20531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39 user=centos Dec 31 20:23:53 host sshd[20543]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:23:53 host sshd[20543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39 Dec 31 20:23:53 host unix_chkpwd[20582]: password check failed for user (mysql) Dec 31 20:23:53 host sshd[20541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39 user=mysql Dec 31 20:23:53 host sshd[20541]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql" Dec 31 20:23:53 host sshd[20539]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:23:53 host sshd[20539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39 Dec 31 20:23:53 host sshd[20544]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:23:53 host sshd[20544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39 Dec 31 20:23:53 host sshd[20542]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:23:53 host sshd[20542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39 Dec 31 20:23:53 host sshd[20548]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:23:53 host sshd[20548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39 Dec 31 20:23:53 host sshd[20549]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:23:53 host sshd[20549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39 Dec 31 20:23:53 host sshd[20547]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:23:53 host sshd[20547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.128.11.39 Dec 31 20:23:55 host sshd[20519]: Failed password for invalid user guest from 57.128.11.39 port 37882 ssh2 Dec 31 20:23:55 host sshd[20517]: Failed password for invalid user ftpuser from 57.128.11.39 port 37830 ssh2 Dec 31 20:23:55 host sshd[20522]: Failed password for invalid user ftpuser from 57.128.11.39 port 37886 ssh2 Dec 31 20:23:55 host sshd[20520]: Failed password for invalid user test from 57.128.11.39 port 37826 ssh2 Dec 31 20:23:55 host sshd[20518]: Failed password for invalid user admin from 57.128.11.39 port 37890 ssh2 Dec 31 20:23:55 host sshd[20521]: Failed password for invalid user devops from 57.128.11.39 port 37838 ssh2 Dec 31 20:23:55 host sshd[20524]: Failed password for invalid user ts3server from 57.128.11.39 port 37820 ssh2 Dec 31 20:23:55 host sshd[20525]: Failed password for invalid user centos from 57.128.11.39 port 37852 ssh2 Dec 31 20:23:55 host sshd[20534]: Failed password for invalid user guest from 57.128.11.39 port 37856 ssh2 Dec 31 20:23:55 host sshd[20528]: Failed password for invalid user guest from 57.128.11.39 port 37888 ssh2 Dec 31 20:23:55 host sshd[20526]: Failed password for invalid user elastic from 57.128.11.39 port 37836 ssh2 Dec 31 20:23:55 host sshd[20523]: Failed password for invalid user 1 from 57.128.11.39 port 37834 ssh2 Dec 31 20:23:55 host sshd[20530]: Failed password for invalid user teamspeak3 from 57.128.11.39 port 37874 ssh2 Dec 31 20:23:55 host sshd[20529]: Failed password for invalid user user from 57.128.11.39 port 37860 ssh2 Dec 31 20:23:55 host sshd[20536]: Failed password for invalid user ansible from 57.128.11.39 port 37854 ssh2 Dec 31 20:23:55 host sshd[20527]: Failed password for invalid user ansadmin from 57.128.11.39 port 37868 ssh2 Dec 31 20:23:55 host sshd[20532]: Failed password for invalid user oracle from 57.128.11.39 port 37840 ssh2 Dec 31 20:23:55 host sshd[20535]: Failed password for invalid user bitrix from 57.128.11.39 port 37824 ssh2 Dec 31 20:23:55 host sshd[20540]: Failed password for invalid user ec2-user from 57.128.11.39 port 37898 ssh2 Dec 31 20:23:55 host sshd[20533]: Failed password for invalid user www from 57.128.11.39 port 37902 ssh2 Dec 31 20:23:55 host sshd[20537]: Failed password for invalid user esuser from 57.128.11.39 port 37828 ssh2 Dec 31 20:23:55 host sshd[20531]: Failed password for invalid user centos from 57.128.11.39 port 37842 ssh2 Dec 31 20:23:55 host sshd[20538]: Failed password for invalid user postgres from 57.128.11.39 port 37844 ssh2 Dec 31 20:23:55 host sshd[20543]: Failed password for invalid user linux from 57.128.11.39 port 37872 ssh2 Dec 31 20:23:55 host sshd[20541]: Failed password for invalid user mysql from 57.128.11.39 port 37900 ssh2 Dec 31 20:23:55 host sshd[20539]: Failed password for invalid user elastic from 57.128.11.39 port 37846 ssh2 Dec 31 20:23:55 host sshd[20544]: Failed password for invalid user oracle from 57.128.11.39 port 37880 ssh2 Dec 31 20:23:55 host sshd[20542]: Failed password for invalid user q from 57.128.11.39 port 37818 ssh2 Dec 31 20:23:55 host sshd[20548]: Failed password for invalid user dmdba from 57.128.11.39 port 37864 ssh2 Dec 31 20:23:55 host sshd[20520]: Connection closed by 57.128.11.39 port 37826 [preauth] Dec 31 20:23:55 host sshd[20522]: Connection closed by 57.128.11.39 port 37886 [preauth] Dec 31 20:23:55 host sshd[20517]: Connection closed by 57.128.11.39 port 37830 [preauth] Dec 31 20:23:55 host sshd[20519]: Connection closed by 57.128.11.39 port 37882 [preauth] Dec 31 20:23:55 host sshd[20549]: Failed password for invalid user q from 57.128.11.39 port 37884 ssh2 Dec 31 20:23:55 host sshd[20518]: Connection closed by 57.128.11.39 port 37890 [preauth] Dec 31 20:23:55 host sshd[20547]: Failed password for invalid user discord from 57.128.11.39 port 37866 ssh2 Dec 31 20:23:55 host sshd[20521]: Connection closed by 57.128.11.39 port 37838 [preauth] Dec 31 20:23:55 host sshd[20524]: Connection closed by 57.128.11.39 port 37820 [preauth] Dec 31 20:23:55 host sshd[20525]: Connection closed by 57.128.11.39 port 37852 [preauth] Dec 31 20:23:55 host sshd[20534]: Connection closed by 57.128.11.39 port 37856 [preauth] Dec 31 20:23:55 host sshd[20528]: Connection closed by 57.128.11.39 port 37888 [preauth] Dec 31 20:23:55 host sshd[20526]: Connection closed by 57.128.11.39 port 37836 [preauth] Dec 31 20:23:55 host sshd[20523]: Connection closed by 57.128.11.39 port 37834 [preauth] Dec 31 20:23:55 host sshd[20536]: Connection closed by 57.128.11.39 port 37854 [preauth] Dec 31 20:23:55 host sshd[20532]: Connection closed by 57.128.11.39 port 37840 [preauth] Dec 31 20:23:55 host sshd[20530]: Connection closed by 57.128.11.39 port 37874 [preauth] Dec 31 20:23:55 host sshd[20529]: Connection closed by 57.128.11.39 port 37860 [preauth] Dec 31 20:23:55 host sshd[20527]: Connection closed by 57.128.11.39 port 37868 [preauth] Dec 31 20:23:55 host sshd[20535]: Connection closed by 57.128.11.39 port 37824 [preauth] Dec 31 20:23:55 host sshd[20533]: Connection closed by 57.128.11.39 port 37902 [preauth] Dec 31 20:23:55 host sshd[20537]: Connection closed by 57.128.11.39 port 37828 [preauth] Dec 31 20:23:55 host sshd[20540]: Connection closed by 57.128.11.39 port 37898 [preauth] Dec 31 20:23:55 host sshd[20531]: Connection closed by 57.128.11.39 port 37842 [preauth] Dec 31 20:23:55 host sshd[20538]: Connection closed by 57.128.11.39 port 37844 [preauth] Dec 31 20:23:55 host sshd[20541]: Connection closed by 57.128.11.39 port 37900 [preauth] Dec 31 20:23:55 host sshd[20543]: Connection closed by 57.128.11.39 port 37872 [preauth] Dec 31 20:23:55 host sshd[20539]: Connection closed by 57.128.11.39 port 37846 [preauth] Dec 31 20:23:55 host sshd[20544]: Connection closed by 57.128.11.39 port 37880 [preauth] Dec 31 20:23:55 host sshd[20542]: Connection closed by 57.128.11.39 port 37818 [preauth] Dec 31 20:26:35 host sshd[21046]: Invalid user pi from 89.159.174.123 port 51764 Dec 31 20:26:35 host sshd[21046]: input_userauth_request: invalid user pi [preauth] Dec 31 20:26:35 host sshd[21047]: Invalid user pi from 89.159.174.123 port 51766 Dec 31 20:26:35 host sshd[21047]: input_userauth_request: invalid user pi [preauth] Dec 31 20:26:35 host sshd[21046]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:26:35 host sshd[21046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.159.174.123 Dec 31 20:26:35 host sshd[21047]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:26:35 host sshd[21047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.159.174.123 Dec 31 20:26:37 host sshd[21046]: Failed password for invalid user pi from 89.159.174.123 port 51764 ssh2 Dec 31 20:26:37 host sshd[21047]: Failed password for invalid user pi from 89.159.174.123 port 51766 ssh2 Dec 31 20:26:37 host sshd[21046]: Connection closed by 89.159.174.123 port 51764 [preauth] Dec 31 20:26:37 host sshd[21047]: Connection closed by 89.159.174.123 port 51766 [preauth] Dec 31 20:27:16 host sshd[21149]: User root from 116.130.215.81 not allowed because not listed in AllowUsers Dec 31 20:27:16 host sshd[21149]: input_userauth_request: invalid user root [preauth] Dec 31 20:27:16 host unix_chkpwd[21157]: password check failed for user (root) Dec 31 20:27:16 host sshd[21149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.130.215.81 user=root Dec 31 20:27:16 host sshd[21149]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 20:27:18 host sshd[21149]: Failed password for invalid user root from 116.130.215.81 port 56415 ssh2 Dec 31 20:27:19 host unix_chkpwd[21163]: password check failed for user (root) Dec 31 20:27:19 host sshd[21149]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 20:27:21 host sshd[21149]: Failed password for invalid user root from 116.130.215.81 port 56415 ssh2 Dec 31 20:27:21 host unix_chkpwd[21172]: password check failed for user (root) Dec 31 20:27:21 host sshd[21149]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 20:27:23 host sshd[21149]: Failed password for invalid user root from 116.130.215.81 port 56415 ssh2 Dec 31 20:27:23 host unix_chkpwd[21178]: password check failed for user (root) Dec 31 20:27:23 host sshd[21149]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 20:27:25 host sshd[21149]: Failed password for invalid user root from 116.130.215.81 port 56415 ssh2 Dec 31 20:27:25 host unix_chkpwd[21212]: password check failed for user (root) Dec 31 20:27:25 host sshd[21149]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 20:27:27 host sshd[21149]: Failed password for invalid user root from 116.130.215.81 port 56415 ssh2 Dec 31 20:29:53 host sshd[21671]: Did not receive identification string from 92.255.85.115 port 52817 Dec 31 20:44:04 host sshd[23950]: Invalid user system from 106.10.122.53 port 37324 Dec 31 20:44:04 host sshd[23950]: input_userauth_request: invalid user system [preauth] Dec 31 20:44:04 host sshd[23950]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:44:04 host sshd[23950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 31 20:44:06 host sshd[23950]: Failed password for invalid user system from 106.10.122.53 port 37324 ssh2 Dec 31 20:44:07 host sshd[23950]: Connection closed by 106.10.122.53 port 37324 [preauth] Dec 31 20:53:07 host sshd[25139]: User root from 159.65.136.44 not allowed because not listed in AllowUsers Dec 31 20:53:07 host sshd[25139]: input_userauth_request: invalid user root [preauth] Dec 31 20:53:07 host unix_chkpwd[25141]: password check failed for user (root) Dec 31 20:53:07 host sshd[25139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.136.44 user=root Dec 31 20:53:07 host sshd[25139]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 20:53:09 host sshd[25139]: Failed password for invalid user root from 159.65.136.44 port 45018 ssh2 Dec 31 20:53:09 host sshd[25139]: Received disconnect from 159.65.136.44 port 45018:11: Bye Bye [preauth] Dec 31 20:53:09 host sshd[25139]: Disconnected from 159.65.136.44 port 45018 [preauth] Dec 31 20:53:18 host sshd[25151]: Invalid user zhanglin from 34.69.39.31 port 40438 Dec 31 20:53:18 host sshd[25151]: input_userauth_request: invalid user zhanglin [preauth] Dec 31 20:53:18 host sshd[25151]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:53:18 host sshd[25151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.69.39.31 Dec 31 20:53:20 host sshd[25151]: Failed password for invalid user zhanglin from 34.69.39.31 port 40438 ssh2 Dec 31 20:53:20 host sshd[25151]: Received disconnect from 34.69.39.31 port 40438:11: Bye Bye [preauth] Dec 31 20:53:20 host sshd[25151]: Disconnected from 34.69.39.31 port 40438 [preauth] Dec 31 20:53:36 host sshd[25194]: Invalid user morpheus from 107.182.181.15 port 35812 Dec 31 20:53:36 host sshd[25194]: input_userauth_request: invalid user morpheus [preauth] Dec 31 20:53:36 host sshd[25194]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:53:36 host sshd[25194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.182.181.15 Dec 31 20:53:38 host sshd[25194]: Failed password for invalid user morpheus from 107.182.181.15 port 35812 ssh2 Dec 31 20:53:38 host sshd[25194]: Received disconnect from 107.182.181.15 port 35812:11: Bye Bye [preauth] Dec 31 20:53:38 host sshd[25194]: Disconnected from 107.182.181.15 port 35812 [preauth] Dec 31 20:55:41 host sshd[25434]: Invalid user cert from 159.65.136.44 port 53316 Dec 31 20:55:41 host sshd[25434]: input_userauth_request: invalid user cert [preauth] Dec 31 20:55:41 host sshd[25434]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:55:41 host sshd[25434]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.136.44 Dec 31 20:55:43 host sshd[25434]: Failed password for invalid user cert from 159.65.136.44 port 53316 ssh2 Dec 31 20:55:43 host sshd[25434]: Received disconnect from 159.65.136.44 port 53316:11: Bye Bye [preauth] Dec 31 20:55:43 host sshd[25434]: Disconnected from 159.65.136.44 port 53316 [preauth] Dec 31 20:55:46 host sshd[25445]: User root from 34.69.39.31 not allowed because not listed in AllowUsers Dec 31 20:55:46 host sshd[25445]: input_userauth_request: invalid user root [preauth] Dec 31 20:55:46 host unix_chkpwd[25517]: password check failed for user (root) Dec 31 20:55:46 host sshd[25445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.69.39.31 user=root Dec 31 20:55:46 host sshd[25445]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 20:55:48 host sshd[25445]: Failed password for invalid user root from 34.69.39.31 port 44936 ssh2 Dec 31 20:55:48 host sshd[25445]: Received disconnect from 34.69.39.31 port 44936:11: Bye Bye [preauth] Dec 31 20:55:48 host sshd[25445]: Disconnected from 34.69.39.31 port 44936 [preauth] Dec 31 20:57:27 host sshd[25782]: User root from 107.182.181.15 not allowed because not listed in AllowUsers Dec 31 20:57:27 host sshd[25782]: input_userauth_request: invalid user root [preauth] Dec 31 20:57:27 host unix_chkpwd[25786]: password check failed for user (root) Dec 31 20:57:27 host sshd[25782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.182.181.15 user=root Dec 31 20:57:27 host sshd[25782]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 20:57:29 host sshd[25782]: Failed password for invalid user root from 107.182.181.15 port 52774 ssh2 Dec 31 20:57:29 host sshd[25782]: Received disconnect from 107.182.181.15 port 52774:11: Bye Bye [preauth] Dec 31 20:57:29 host sshd[25782]: Disconnected from 107.182.181.15 port 52774 [preauth] Dec 31 20:59:05 host sshd[25975]: Invalid user huawei from 92.46.108.20 port 33882 Dec 31 20:59:05 host sshd[25975]: input_userauth_request: invalid user huawei [preauth] Dec 31 20:59:06 host sshd[25975]: pam_unix(sshd:auth): check pass; user unknown Dec 31 20:59:06 host sshd[25975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 31 20:59:08 host sshd[25975]: Failed password for invalid user huawei from 92.46.108.20 port 33882 ssh2 Dec 31 20:59:09 host sshd[25975]: Connection closed by 92.46.108.20 port 33882 [preauth] Dec 31 21:07:20 host sshd[27023]: Invalid user manager from 41.197.31.178 port 58180 Dec 31 21:07:20 host sshd[27023]: input_userauth_request: invalid user manager [preauth] Dec 31 21:07:21 host sshd[27023]: pam_unix(sshd:auth): check pass; user unknown Dec 31 21:07:21 host sshd[27023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 31 21:07:22 host sshd[27023]: Failed password for invalid user manager from 41.197.31.178 port 58180 ssh2 Dec 31 21:07:22 host sshd[27023]: Connection closed by 41.197.31.178 port 58180 [preauth] Dec 31 21:13:58 host sshd[27895]: User mysql from 103.13.40.2 not allowed because not listed in AllowUsers Dec 31 21:13:58 host sshd[27895]: input_userauth_request: invalid user mysql [preauth] Dec 31 21:13:58 host unix_chkpwd[27897]: password check failed for user (mysql) Dec 31 21:13:58 host sshd[27895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 user=mysql Dec 31 21:13:58 host sshd[27895]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql" Dec 31 21:13:59 host sshd[27895]: Failed password for invalid user mysql from 103.13.40.2 port 54042 ssh2 Dec 31 21:13:59 host sshd[27895]: Connection closed by 103.13.40.2 port 54042 [preauth] Dec 31 21:17:14 host sshd[28429]: Invalid user admin from 45.93.201.90 port 47838 Dec 31 21:17:14 host sshd[28429]: input_userauth_request: invalid user admin [preauth] Dec 31 21:17:14 host sshd[28429]: Failed none for invalid user admin from 45.93.201.90 port 47838 ssh2 Dec 31 21:17:17 host sshd[28429]: pam_unix(sshd:auth): check pass; user unknown Dec 31 21:17:17 host sshd[28429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 31 21:17:19 host sshd[28429]: Failed password for invalid user admin from 45.93.201.90 port 47838 ssh2 Dec 31 21:17:22 host sshd[28429]: pam_unix(sshd:auth): check pass; user unknown Dec 31 21:17:24 host sshd[28429]: Failed password for invalid user admin from 45.93.201.90 port 47838 ssh2 Dec 31 21:17:27 host sshd[28429]: Connection closed by 45.93.201.90 port 47838 [preauth] Dec 31 21:17:27 host sshd[28429]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Dec 31 21:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 21:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 21:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 21:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 21:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 21:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 21:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 21:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 21:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 21:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 31 21:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 21:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 21:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 31 21:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 21:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 21:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 31 21:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 21:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 21:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 31 21:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 21:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 21:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 31 21:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 21:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 21:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 31 21:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 21:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 21:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 31 21:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 21:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 21:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 31 21:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 21:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 21:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 21:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 21:21:49 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 31 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=a2zgroup user-3=dartsimp user-4=wwwkaretakers user-5=cochintaxi user-6=ugotscom user-7=keralaholi user-8=wwwresourcehunte user-9=wwwrmswll user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=shalinijames user-14=wwwtestugo user-15=vfmassets user-16=woodpeck user-17=wwwkapin user-18=disposeat user-19=wwwkmaorg user-20=remysagr user-21=mrsclean user-22=wwwnexidigital user-23=phmetals user-24=kottayamcalldriv user-25=palco123 user-26=gifterman user-27=wwwletsstalkfood user-28=straightcurve user-29=wwwevmhonda user-30=bonifacegroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 31 21:21:50 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 31 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PG4YuH1WRFMmkCR8.~ Dec 31 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PG4YuH1WRFMmkCR8.~' Dec 31 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PG4YuH1WRFMmkCR8.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 31 21:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 21:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 21:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 31 21:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 21:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 21:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 31 21:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 21:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 21:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 21:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 21:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 21:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 31 21:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 31 21:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 31 21:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 31 21:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 21:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 31 21:21:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 21:22:00 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 21:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 31 21:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 21:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 21:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 31 21:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 21:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 21:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 31 21:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 21:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 21:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 31 21:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 21:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 21:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 31 21:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 21:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 21:22:45 host sshd[29542]: Invalid user huawei from 162.218.126.136 port 40454 Dec 31 21:22:45 host sshd[29542]: input_userauth_request: invalid user huawei [preauth] Dec 31 21:22:45 host sshd[29542]: pam_unix(sshd:auth): check pass; user unknown Dec 31 21:22:45 host sshd[29542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Dec 31 21:22:47 host sshd[29542]: Failed password for invalid user huawei from 162.218.126.136 port 40454 ssh2 Dec 31 21:22:47 host sshd[29542]: Connection closed by 162.218.126.136 port 40454 [preauth] Dec 31 22:02:38 host sshd[2428]: Invalid user du from 162.241.114.75 port 49048 Dec 31 22:02:38 host sshd[2428]: input_userauth_request: invalid user du [preauth] Dec 31 22:02:38 host sshd[2428]: pam_unix(sshd:auth): check pass; user unknown Dec 31 22:02:38 host sshd[2428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.114.75 Dec 31 22:02:40 host sshd[2431]: Invalid user xf from 46.101.121.35 port 39128 Dec 31 22:02:40 host sshd[2431]: input_userauth_request: invalid user xf [preauth] Dec 31 22:02:40 host sshd[2431]: pam_unix(sshd:auth): check pass; user unknown Dec 31 22:02:40 host sshd[2431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.121.35 Dec 31 22:02:40 host sshd[2428]: Failed password for invalid user du from 162.241.114.75 port 49048 ssh2 Dec 31 22:02:41 host sshd[2428]: Received disconnect from 162.241.114.75 port 49048:11: Bye Bye [preauth] Dec 31 22:02:41 host sshd[2428]: Disconnected from 162.241.114.75 port 49048 [preauth] Dec 31 22:02:42 host sshd[2431]: Failed password for invalid user xf from 46.101.121.35 port 39128 ssh2 Dec 31 22:02:42 host sshd[2431]: Received disconnect from 46.101.121.35 port 39128:11: Bye Bye [preauth] Dec 31 22:02:42 host sshd[2431]: Disconnected from 46.101.121.35 port 39128 [preauth] Dec 31 22:03:37 host sshd[2523]: User root from 179.184.199.23 not allowed because not listed in AllowUsers Dec 31 22:03:37 host sshd[2523]: input_userauth_request: invalid user root [preauth] Dec 31 22:03:37 host unix_chkpwd[2586]: password check failed for user (root) Dec 31 22:03:37 host sshd[2523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.184.199.23 user=root Dec 31 22:03:37 host sshd[2523]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 22:03:39 host sshd[2523]: Failed password for invalid user root from 179.184.199.23 port 52886 ssh2 Dec 31 22:03:39 host sshd[2523]: Received disconnect from 179.184.199.23 port 52886:11: Bye Bye [preauth] Dec 31 22:03:39 host sshd[2523]: Disconnected from 179.184.199.23 port 52886 [preauth] Dec 31 22:03:50 host sshd[2650]: User root from 197.165.163.95 not allowed because not listed in AllowUsers Dec 31 22:03:50 host sshd[2650]: input_userauth_request: invalid user root [preauth] Dec 31 22:03:50 host unix_chkpwd[2653]: password check failed for user (root) Dec 31 22:03:50 host sshd[2650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.165.163.95 user=root Dec 31 22:03:50 host sshd[2650]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 22:03:52 host sshd[2650]: Failed password for invalid user root from 197.165.163.95 port 59194 ssh2 Dec 31 22:03:52 host sshd[2650]: Received disconnect from 197.165.163.95 port 59194:11: Bye Bye [preauth] Dec 31 22:03:52 host sshd[2650]: Disconnected from 197.165.163.95 port 59194 [preauth] Dec 31 22:04:51 host sshd[2753]: Invalid user jd from 162.55.167.138 port 42476 Dec 31 22:04:51 host sshd[2753]: input_userauth_request: invalid user jd [preauth] Dec 31 22:04:51 host sshd[2753]: pam_unix(sshd:auth): check pass; user unknown Dec 31 22:04:51 host sshd[2753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.55.167.138 Dec 31 22:04:53 host sshd[2753]: Failed password for invalid user jd from 162.55.167.138 port 42476 ssh2 Dec 31 22:04:53 host sshd[2753]: Received disconnect from 162.55.167.138 port 42476:11: Bye Bye [preauth] Dec 31 22:04:53 host sshd[2753]: Disconnected from 162.55.167.138 port 42476 [preauth] Dec 31 22:07:17 host sshd[3014]: Invalid user oracle from 106.10.122.53 port 41032 Dec 31 22:07:17 host sshd[3014]: input_userauth_request: invalid user oracle [preauth] Dec 31 22:07:17 host sshd[3014]: pam_unix(sshd:auth): check pass; user unknown Dec 31 22:07:17 host sshd[3014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Dec 31 22:07:19 host sshd[3014]: Failed password for invalid user oracle from 106.10.122.53 port 41032 ssh2 Dec 31 22:07:20 host sshd[3014]: Connection closed by 106.10.122.53 port 41032 [preauth] Dec 31 22:07:39 host sshd[3056]: User root from 147.182.145.89 not allowed because not listed in AllowUsers Dec 31 22:07:39 host sshd[3056]: input_userauth_request: invalid user root [preauth] Dec 31 22:07:39 host unix_chkpwd[3060]: password check failed for user (root) Dec 31 22:07:39 host sshd[3056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.145.89 user=root Dec 31 22:07:39 host sshd[3056]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 22:07:41 host sshd[3056]: Failed password for invalid user root from 147.182.145.89 port 55940 ssh2 Dec 31 22:07:41 host sshd[3056]: Received disconnect from 147.182.145.89 port 55940:11: Bye Bye [preauth] Dec 31 22:07:41 host sshd[3056]: Disconnected from 147.182.145.89 port 55940 [preauth] Dec 31 22:07:56 host sshd[3079]: Invalid user ep from 158.160.23.54 port 43786 Dec 31 22:07:56 host sshd[3079]: input_userauth_request: invalid user ep [preauth] Dec 31 22:07:56 host sshd[3079]: pam_unix(sshd:auth): check pass; user unknown Dec 31 22:07:56 host sshd[3079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.160.23.54 Dec 31 22:07:58 host sshd[3079]: Failed password for invalid user ep from 158.160.23.54 port 43786 ssh2 Dec 31 22:07:58 host sshd[3079]: Received disconnect from 158.160.23.54 port 43786:11: Bye Bye [preauth] Dec 31 22:07:58 host sshd[3079]: Disconnected from 158.160.23.54 port 43786 [preauth] Dec 31 22:08:16 host sshd[3112]: User root from 162.241.114.75 not allowed because not listed in AllowUsers Dec 31 22:08:16 host sshd[3112]: input_userauth_request: invalid user root [preauth] Dec 31 22:08:16 host unix_chkpwd[3117]: password check failed for user (root) Dec 31 22:08:16 host sshd[3112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.114.75 user=root Dec 31 22:08:16 host sshd[3112]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 22:08:16 host sshd[3115]: Invalid user api from 46.101.121.35 port 57188 Dec 31 22:08:16 host sshd[3115]: input_userauth_request: invalid user api [preauth] Dec 31 22:08:16 host sshd[3115]: pam_unix(sshd:auth): check pass; user unknown Dec 31 22:08:16 host sshd[3115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.121.35 Dec 31 22:08:18 host sshd[3112]: Failed password for invalid user root from 162.241.114.75 port 57062 ssh2 Dec 31 22:08:18 host sshd[3112]: Received disconnect from 162.241.114.75 port 57062:11: Bye Bye [preauth] Dec 31 22:08:18 host sshd[3112]: Disconnected from 162.241.114.75 port 57062 [preauth] Dec 31 22:08:19 host sshd[3115]: Failed password for invalid user api from 46.101.121.35 port 57188 ssh2 Dec 31 22:08:19 host sshd[3115]: Received disconnect from 46.101.121.35 port 57188:11: Bye Bye [preauth] Dec 31 22:08:19 host sshd[3115]: Disconnected from 46.101.121.35 port 57188 [preauth] Dec 31 22:08:21 host sshd[3123]: User root from 162.55.167.138 not allowed because not listed in AllowUsers Dec 31 22:08:21 host sshd[3123]: input_userauth_request: invalid user root [preauth] Dec 31 22:08:21 host unix_chkpwd[3126]: password check failed for user (root) Dec 31 22:08:21 host sshd[3123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.55.167.138 user=root Dec 31 22:08:21 host sshd[3123]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 22:08:23 host sshd[3123]: Failed password for invalid user root from 162.55.167.138 port 57030 ssh2 Dec 31 22:08:23 host sshd[3123]: Received disconnect from 162.55.167.138 port 57030:11: Bye Bye [preauth] Dec 31 22:08:23 host sshd[3123]: Disconnected from 162.55.167.138 port 57030 [preauth] Dec 31 22:08:27 host sshd[3212]: Invalid user du from 94.70.166.88 port 41446 Dec 31 22:08:27 host sshd[3212]: input_userauth_request: invalid user du [preauth] Dec 31 22:08:27 host sshd[3212]: pam_unix(sshd:auth): check pass; user unknown Dec 31 22:08:27 host sshd[3212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.70.166.88 Dec 31 22:08:28 host sshd[3212]: Failed password for invalid user du from 94.70.166.88 port 41446 ssh2 Dec 31 22:08:28 host sshd[3212]: Received disconnect from 94.70.166.88 port 41446:11: Bye Bye [preauth] Dec 31 22:08:28 host sshd[3212]: Disconnected from 94.70.166.88 port 41446 [preauth] Dec 31 22:09:16 host sshd[3285]: User root from 179.184.199.23 not allowed because not listed in AllowUsers Dec 31 22:09:16 host sshd[3285]: input_userauth_request: invalid user root [preauth] Dec 31 22:09:16 host unix_chkpwd[3288]: password check failed for user (root) Dec 31 22:09:16 host sshd[3285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.184.199.23 user=root Dec 31 22:09:16 host sshd[3285]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 22:09:18 host sshd[3285]: Failed password for invalid user root from 179.184.199.23 port 46912 ssh2 Dec 31 22:09:19 host sshd[3285]: Received disconnect from 179.184.199.23 port 46912:11: Bye Bye [preauth] Dec 31 22:09:19 host sshd[3285]: Disconnected from 179.184.199.23 port 46912 [preauth] Dec 31 22:09:27 host sshd[3452]: Invalid user mongod from 197.165.163.95 port 57280 Dec 31 22:09:27 host sshd[3452]: input_userauth_request: invalid user mongod [preauth] Dec 31 22:09:27 host sshd[3452]: pam_unix(sshd:auth): check pass; user unknown Dec 31 22:09:27 host sshd[3452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.165.163.95 Dec 31 22:09:29 host sshd[3452]: Failed password for invalid user mongod from 197.165.163.95 port 57280 ssh2 Dec 31 22:09:29 host sshd[3452]: Received disconnect from 197.165.163.95 port 57280:11: Bye Bye [preauth] Dec 31 22:09:29 host sshd[3452]: Disconnected from 197.165.163.95 port 57280 [preauth] Dec 31 22:09:30 host sshd[3458]: Invalid user user from 176.102.36.147 port 45352 Dec 31 22:09:30 host sshd[3458]: input_userauth_request: invalid user user [preauth] Dec 31 22:09:30 host sshd[3458]: pam_unix(sshd:auth): check pass; user unknown Dec 31 22:09:30 host sshd[3458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.102.36.147 Dec 31 22:09:30 host sshd[3456]: Invalid user cis from 46.101.121.35 port 33104 Dec 31 22:09:30 host sshd[3456]: input_userauth_request: invalid user cis [preauth] Dec 31 22:09:30 host sshd[3456]: pam_unix(sshd:auth): check pass; user unknown Dec 31 22:09:30 host sshd[3456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.121.35 Dec 31 22:09:32 host sshd[3458]: Failed password for invalid user user from 176.102.36.147 port 45352 ssh2 Dec 31 22:09:32 host sshd[3456]: Failed password for invalid user cis from 46.101.121.35 port 33104 ssh2 Dec 31 22:09:32 host sshd[3458]: Received disconnect from 176.102.36.147 port 45352:11: Bye Bye [preauth] Dec 31 22:09:32 host sshd[3458]: Disconnected from 176.102.36.147 port 45352 [preauth] Dec 31 22:09:32 host sshd[3456]: Received disconnect from 46.101.121.35 port 33104:11: Bye Bye [preauth] Dec 31 22:09:32 host sshd[3456]: Disconnected from 46.101.121.35 port 33104 [preauth] Dec 31 22:09:50 host sshd[3542]: User root from 147.182.145.89 not allowed because not listed in AllowUsers Dec 31 22:09:50 host sshd[3542]: input_userauth_request: invalid user root [preauth] Dec 31 22:09:51 host unix_chkpwd[3545]: password check failed for user (root) Dec 31 22:09:51 host sshd[3542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.145.89 user=root Dec 31 22:09:51 host sshd[3542]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 22:09:52 host sshd[3542]: Failed password for invalid user root from 147.182.145.89 port 58578 ssh2 Dec 31 22:09:53 host sshd[3542]: Received disconnect from 147.182.145.89 port 58578:11: Bye Bye [preauth] Dec 31 22:09:53 host sshd[3542]: Disconnected from 147.182.145.89 port 58578 [preauth] Dec 31 22:10:16 host sshd[3624]: User root from 94.70.166.88 not allowed because not listed in AllowUsers Dec 31 22:10:16 host sshd[3624]: input_userauth_request: invalid user root [preauth] Dec 31 22:10:16 host unix_chkpwd[3627]: password check failed for user (root) Dec 31 22:10:16 host sshd[3624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.70.166.88 user=root Dec 31 22:10:16 host sshd[3624]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 22:10:18 host sshd[3624]: Failed password for invalid user root from 94.70.166.88 port 55907 ssh2 Dec 31 22:10:18 host sshd[3624]: Received disconnect from 94.70.166.88 port 55907:11: Bye Bye [preauth] Dec 31 22:10:18 host sshd[3624]: Disconnected from 94.70.166.88 port 55907 [preauth] Dec 31 22:10:25 host sshd[3666]: Invalid user sdiaz from 158.160.23.54 port 38350 Dec 31 22:10:25 host sshd[3666]: input_userauth_request: invalid user sdiaz [preauth] Dec 31 22:10:25 host sshd[3666]: pam_unix(sshd:auth): check pass; user unknown Dec 31 22:10:25 host sshd[3666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.160.23.54 Dec 31 22:10:27 host sshd[3666]: Failed password for invalid user sdiaz from 158.160.23.54 port 38350 ssh2 Dec 31 22:10:28 host sshd[3666]: Received disconnect from 158.160.23.54 port 38350:11: Bye Bye [preauth] Dec 31 22:10:28 host sshd[3666]: Disconnected from 158.160.23.54 port 38350 [preauth] Dec 31 22:11:22 host sshd[3777]: Invalid user test from 176.102.36.147 port 45436 Dec 31 22:11:22 host sshd[3777]: input_userauth_request: invalid user test [preauth] Dec 31 22:11:22 host sshd[3777]: pam_unix(sshd:auth): check pass; user unknown Dec 31 22:11:22 host sshd[3777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.102.36.147 Dec 31 22:11:24 host sshd[3777]: Failed password for invalid user test from 176.102.36.147 port 45436 ssh2 Dec 31 22:11:24 host sshd[3777]: Received disconnect from 176.102.36.147 port 45436:11: Bye Bye [preauth] Dec 31 22:11:24 host sshd[3777]: Disconnected from 176.102.36.147 port 45436 [preauth] Dec 31 22:12:25 host sshd[3922]: User root from 158.160.23.54 not allowed because not listed in AllowUsers Dec 31 22:12:25 host sshd[3922]: input_userauth_request: invalid user root [preauth] Dec 31 22:12:26 host unix_chkpwd[3927]: password check failed for user (root) Dec 31 22:12:26 host sshd[3922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.160.23.54 user=root Dec 31 22:12:26 host sshd[3922]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 22:12:28 host sshd[3922]: Failed password for invalid user root from 158.160.23.54 port 52064 ssh2 Dec 31 22:12:28 host sshd[3922]: Received disconnect from 158.160.23.54 port 52064:11: Bye Bye [preauth] Dec 31 22:12:28 host sshd[3922]: Disconnected from 158.160.23.54 port 52064 [preauth] Dec 31 22:12:49 host sshd[3988]: Invalid user riyan from 176.102.36.147 port 45508 Dec 31 22:12:49 host sshd[3988]: input_userauth_request: invalid user riyan [preauth] Dec 31 22:12:49 host sshd[3988]: pam_unix(sshd:auth): check pass; user unknown Dec 31 22:12:49 host sshd[3988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.102.36.147 Dec 31 22:12:52 host sshd[3988]: Failed password for invalid user riyan from 176.102.36.147 port 45508 ssh2 Dec 31 22:12:52 host sshd[3988]: Received disconnect from 176.102.36.147 port 45508:11: Bye Bye [preauth] Dec 31 22:12:52 host sshd[3988]: Disconnected from 176.102.36.147 port 45508 [preauth] Dec 31 22:15:10 host sshd[4308]: Did not receive identification string from 205.185.123.43 port 53670 Dec 31 22:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 22:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 22:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 22:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 22:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 22:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 22:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 22:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 22:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 22:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 31 22:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 22:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 22:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 31 22:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 22:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 22:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 31 22:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 22:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 22:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 31 22:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 22:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 22:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 31 22:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 22:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 22:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 31 22:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 22:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 22:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 31 22:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 22:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 22:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 31 22:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 22:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 22:21:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 22:21:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 31 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=a2zgroup user-4=dartsimp user-5=laundryboniface user-6=wwwpmcresource user-7=travelboniface user-8=keralaholi user-9=wwwresourcehunte user-10=wwwrmswll user-11=ugotscom user-12=wwwkmaorg user-13=disposeat user-14=remysagr user-15=wwwkapin user-16=woodpeck user-17=vfmassets user-18=shalinijames user-19=wwwtestugo user-20=pmcresources user-21=bonifacegroup user-22=wwwevmhonda user-23=straightcurve user-24=wwwletsstalkfood user-25=palco123 user-26=gifterman user-27=phmetals user-28=kottayamcalldriv user-29=mrsclean user-30=wwwnexidigital feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 31 22:21:50 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 31 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-gOGZl7QvJRohnlTb.~ Dec 31 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-gOGZl7QvJRohnlTb.~' Dec 31 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-gOGZl7QvJRohnlTb.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 31 22:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 22:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 22:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 31 22:21:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 22:21:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 22:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 22:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 22:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 22:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 22:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 22:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 22:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 22:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 22:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 22:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 31 22:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 22:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 22:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 22:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 22:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 22:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 31 22:21:52 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 31 22:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 31 22:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 31 22:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 22:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 31 22:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 22:21:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 22:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 31 22:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 22:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 22:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 31 22:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 22:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 22:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 31 22:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 22:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 22:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 31 22:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 22:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 22:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 31 22:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 22:22:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 22:25:49 host sshd[5899]: User root from 62.84.116.54 not allowed because not listed in AllowUsers Dec 31 22:25:49 host sshd[5899]: input_userauth_request: invalid user root [preauth] Dec 31 22:25:49 host unix_chkpwd[5913]: password check failed for user (root) Dec 31 22:25:49 host sshd[5899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.84.116.54 user=root Dec 31 22:25:49 host sshd[5899]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 22:25:51 host sshd[5899]: Failed password for invalid user root from 62.84.116.54 port 40930 ssh2 Dec 31 22:25:51 host sshd[5899]: Received disconnect from 62.84.116.54 port 40930:11: Bye Bye [preauth] Dec 31 22:25:51 host sshd[5899]: Disconnected from 62.84.116.54 port 40930 [preauth] Dec 31 22:27:14 host sshd[6069]: User root from 143.198.200.155 not allowed because not listed in AllowUsers Dec 31 22:27:14 host sshd[6069]: input_userauth_request: invalid user root [preauth] Dec 31 22:27:14 host unix_chkpwd[6073]: password check failed for user (root) Dec 31 22:27:14 host sshd[6069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.200.155 user=root Dec 31 22:27:14 host sshd[6069]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 22:27:16 host sshd[6069]: Failed password for invalid user root from 143.198.200.155 port 40384 ssh2 Dec 31 22:27:16 host sshd[6069]: Received disconnect from 143.198.200.155 port 40384:11: Bye Bye [preauth] Dec 31 22:27:16 host sshd[6069]: Disconnected from 143.198.200.155 port 40384 [preauth] Dec 31 22:27:43 host sshd[6235]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Dec 31 22:27:43 host sshd[6235]: input_userauth_request: invalid user root [preauth] Dec 31 22:27:43 host unix_chkpwd[6238]: password check failed for user (root) Dec 31 22:27:43 host sshd[6235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Dec 31 22:27:43 host sshd[6235]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 22:27:44 host sshd[6235]: Failed password for invalid user root from 162.218.126.136 port 33346 ssh2 Dec 31 22:27:45 host sshd[6235]: Connection closed by 162.218.126.136 port 33346 [preauth] Dec 31 22:27:59 host sshd[6262]: Invalid user postgres from 103.191.92.4 port 38848 Dec 31 22:27:59 host sshd[6262]: input_userauth_request: invalid user postgres [preauth] Dec 31 22:27:59 host sshd[6262]: pam_unix(sshd:auth): check pass; user unknown Dec 31 22:27:59 host sshd[6262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.191.92.4 Dec 31 22:28:01 host sshd[6262]: Failed password for invalid user postgres from 103.191.92.4 port 38848 ssh2 Dec 31 22:28:01 host sshd[6262]: Received disconnect from 103.191.92.4 port 38848:11: Bye Bye [preauth] Dec 31 22:28:01 host sshd[6262]: Disconnected from 103.191.92.4 port 38848 [preauth] Dec 31 22:28:49 host sshd[6365]: User root from 143.198.197.129 not allowed because not listed in AllowUsers Dec 31 22:28:49 host sshd[6365]: input_userauth_request: invalid user root [preauth] Dec 31 22:28:49 host unix_chkpwd[6367]: password check failed for user (root) Dec 31 22:28:49 host sshd[6365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.197.129 user=root Dec 31 22:28:49 host sshd[6365]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 22:28:51 host sshd[6365]: Failed password for invalid user root from 143.198.197.129 port 18250 ssh2 Dec 31 22:28:51 host sshd[6365]: Received disconnect from 143.198.197.129 port 18250:11: Bye Bye [preauth] Dec 31 22:28:51 host sshd[6365]: Disconnected from 143.198.197.129 port 18250 [preauth] Dec 31 22:29:43 host sshd[6451]: Invalid user ipc from 13.71.46.226 port 1024 Dec 31 22:29:43 host sshd[6451]: input_userauth_request: invalid user ipc [preauth] Dec 31 22:29:43 host sshd[6451]: pam_unix(sshd:auth): check pass; user unknown Dec 31 22:29:43 host sshd[6451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.71.46.226 Dec 31 22:29:45 host sshd[6451]: Failed password for invalid user ipc from 13.71.46.226 port 1024 ssh2 Dec 31 22:29:45 host sshd[6451]: Received disconnect from 13.71.46.226 port 1024:11: Bye Bye [preauth] Dec 31 22:29:45 host sshd[6451]: Disconnected from 13.71.46.226 port 1024 [preauth] Dec 31 22:30:06 host sshd[6503]: User root from 62.84.116.54 not allowed because not listed in AllowUsers Dec 31 22:30:06 host sshd[6503]: input_userauth_request: invalid user root [preauth] Dec 31 22:30:06 host unix_chkpwd[6509]: password check failed for user (root) Dec 31 22:30:06 host sshd[6503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.84.116.54 user=root Dec 31 22:30:06 host sshd[6503]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 22:30:08 host sshd[6503]: Failed password for invalid user root from 62.84.116.54 port 34192 ssh2 Dec 31 22:30:08 host sshd[6503]: Received disconnect from 62.84.116.54 port 34192:11: Bye Bye [preauth] Dec 31 22:30:08 host sshd[6503]: Disconnected from 62.84.116.54 port 34192 [preauth] Dec 31 22:30:39 host sshd[6592]: Invalid user bbb from 143.198.200.155 port 54504 Dec 31 22:30:39 host sshd[6592]: input_userauth_request: invalid user bbb [preauth] Dec 31 22:30:39 host sshd[6592]: pam_unix(sshd:auth): check pass; user unknown Dec 31 22:30:39 host sshd[6592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.200.155 Dec 31 22:30:41 host sshd[6592]: Failed password for invalid user bbb from 143.198.200.155 port 54504 ssh2 Dec 31 22:30:41 host sshd[6592]: Received disconnect from 143.198.200.155 port 54504:11: Bye Bye [preauth] Dec 31 22:30:41 host sshd[6592]: Disconnected from 143.198.200.155 port 54504 [preauth] Dec 31 22:31:02 host sshd[6670]: User root from 103.191.92.4 not allowed because not listed in AllowUsers Dec 31 22:31:02 host sshd[6670]: input_userauth_request: invalid user root [preauth] Dec 31 22:31:02 host unix_chkpwd[6672]: password check failed for user (root) Dec 31 22:31:02 host sshd[6670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.191.92.4 user=root Dec 31 22:31:02 host sshd[6670]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 22:31:04 host sshd[6670]: Failed password for invalid user root from 103.191.92.4 port 49000 ssh2 Dec 31 22:31:04 host sshd[6670]: Received disconnect from 103.191.92.4 port 49000:11: Bye Bye [preauth] Dec 31 22:31:04 host sshd[6670]: Disconnected from 103.191.92.4 port 49000 [preauth] Dec 31 22:31:40 host sshd[6757]: User root from 143.198.197.129 not allowed because not listed in AllowUsers Dec 31 22:31:40 host sshd[6757]: input_userauth_request: invalid user root [preauth] Dec 31 22:31:40 host unix_chkpwd[6760]: password check failed for user (root) Dec 31 22:31:40 host sshd[6757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.197.129 user=root Dec 31 22:31:40 host sshd[6757]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 22:31:41 host sshd[6757]: Failed password for invalid user root from 143.198.197.129 port 31608 ssh2 Dec 31 22:31:41 host sshd[6757]: Received disconnect from 143.198.197.129 port 31608:11: Bye Bye [preauth] Dec 31 22:31:41 host sshd[6757]: Disconnected from 143.198.197.129 port 31608 [preauth] Dec 31 22:32:01 host sshd[6818]: User root from 13.71.46.226 not allowed because not listed in AllowUsers Dec 31 22:32:01 host sshd[6818]: input_userauth_request: invalid user root [preauth] Dec 31 22:32:01 host unix_chkpwd[6820]: password check failed for user (root) Dec 31 22:32:01 host sshd[6818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.71.46.226 user=root Dec 31 22:32:01 host sshd[6818]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 22:32:03 host sshd[6818]: Failed password for invalid user root from 13.71.46.226 port 1024 ssh2 Dec 31 22:32:03 host sshd[6818]: Received disconnect from 13.71.46.226 port 1024:11: Bye Bye [preauth] Dec 31 22:32:03 host sshd[6818]: Disconnected from 13.71.46.226 port 1024 [preauth] Dec 31 22:35:28 host sshd[7342]: Invalid user xiejz from 103.13.40.2 port 39516 Dec 31 22:35:28 host sshd[7342]: input_userauth_request: invalid user xiejz [preauth] Dec 31 22:35:28 host sshd[7342]: pam_unix(sshd:auth): check pass; user unknown Dec 31 22:35:28 host sshd[7342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Dec 31 22:35:29 host sshd[7342]: Failed password for invalid user xiejz from 103.13.40.2 port 39516 ssh2 Dec 31 22:35:29 host sshd[7342]: Connection closed by 103.13.40.2 port 39516 [preauth] Dec 31 22:49:30 host sshd[9282]: Invalid user user from 41.197.31.178 port 37964 Dec 31 22:49:30 host sshd[9282]: input_userauth_request: invalid user user [preauth] Dec 31 22:49:31 host sshd[9282]: pam_unix(sshd:auth): check pass; user unknown Dec 31 22:49:31 host sshd[9282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Dec 31 22:49:33 host sshd[9282]: Failed password for invalid user user from 41.197.31.178 port 37964 ssh2 Dec 31 22:49:33 host sshd[9282]: Connection closed by 41.197.31.178 port 37964 [preauth] Dec 31 22:53:17 host sshd[10062]: Invalid user scott from 107.189.30.59 port 42376 Dec 31 22:53:17 host sshd[10062]: input_userauth_request: invalid user scott [preauth] Dec 31 22:53:17 host sshd[10062]: pam_unix(sshd:auth): check pass; user unknown Dec 31 22:53:17 host sshd[10062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Dec 31 22:53:19 host sshd[10062]: Failed password for invalid user scott from 107.189.30.59 port 42376 ssh2 Dec 31 22:53:19 host sshd[10062]: Connection closed by 107.189.30.59 port 42376 [preauth] Dec 31 22:54:44 host sshd[10339]: Bad protocol version identification 'MGLNDD_167.71.234.10_22' from 192.241.239.25 port 48194 Dec 31 23:18:50 host sshd[13864]: Invalid user system from 31.41.244.124 port 38192 Dec 31 23:18:50 host sshd[13864]: input_userauth_request: invalid user system [preauth] Dec 31 23:18:51 host sshd[13864]: pam_unix(sshd:auth): check pass; user unknown Dec 31 23:18:51 host sshd[13864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Dec 31 23:18:53 host sshd[13864]: Failed password for invalid user system from 31.41.244.124 port 38192 ssh2 Dec 31 23:18:53 host sshd[13864]: Received disconnect from 31.41.244.124 port 38192:11: Client disconnecting normally [preauth] Dec 31 23:18:53 host sshd[13864]: Disconnected from 31.41.244.124 port 38192 [preauth] Dec 31 23:18:54 host sshd[13877]: Invalid user admin from 31.41.244.124 port 42783 Dec 31 23:18:54 host sshd[13877]: input_userauth_request: invalid user admin [preauth] Dec 31 23:18:54 host sshd[13877]: pam_unix(sshd:auth): check pass; user unknown Dec 31 23:18:54 host sshd[13877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Dec 31 23:18:56 host sshd[13877]: Failed password for invalid user admin from 31.41.244.124 port 42783 ssh2 Dec 31 23:18:56 host sshd[13877]: Received disconnect from 31.41.244.124 port 42783:11: Client disconnecting normally [preauth] Dec 31 23:18:56 host sshd[13877]: Disconnected from 31.41.244.124 port 42783 [preauth] Dec 31 23:18:57 host sshd[13886]: Invalid user admin from 31.41.244.124 port 46923 Dec 31 23:18:57 host sshd[13886]: input_userauth_request: invalid user admin [preauth] Dec 31 23:18:58 host sshd[13886]: pam_unix(sshd:auth): check pass; user unknown Dec 31 23:18:58 host sshd[13886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Dec 31 23:18:59 host sshd[13886]: Failed password for invalid user admin from 31.41.244.124 port 46923 ssh2 Dec 31 23:19:00 host sshd[13886]: Received disconnect from 31.41.244.124 port 46923:11: Client disconnecting normally [preauth] Dec 31 23:19:00 host sshd[13886]: Disconnected from 31.41.244.124 port 46923 [preauth] Dec 31 23:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 23:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 23:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 23:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 23:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 23:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 23:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 23:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 23:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 23:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Dec 31 23:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 23:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 23:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Dec 31 23:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 23:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 23:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Dec 31 23:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 23:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 23:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Dec 31 23:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 23:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 23:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Dec 31 23:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 23:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 23:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Dec 31 23:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 23:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 23:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Dec 31 23:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 23:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 23:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Dec 31 23:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 23:21:48 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Dec 31 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=ugotscom user-2=keralaholi user-3=wwwresourcehunte user-4=wwwrmswll user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=a2zgroup user-9=dartsimp user-10=wwwkaretakers user-11=cochintaxi user-12=wwwnexidigital user-13=mrsclean user-14=phmetals user-15=kottayamcalldriv user-16=palco123 user-17=gifterman user-18=wwwletsstalkfood user-19=straightcurve user-20=wwwevmhonda user-21=bonifacegroup user-22=pmcresources user-23=shalinijames user-24=wwwtestugo user-25=vfmassets user-26=wwwkapin user-27=woodpeck user-28=disposeat user-29=remysagr user-30=wwwkmaorg feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Dec 31 23:21:50 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Dec 31 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cqAsnyjYqLsEnp5m.~ Dec 31 23:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 23:21:50 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 23:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cqAsnyjYqLsEnp5m.~' Dec 31 23:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 23:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 23:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cqAsnyjYqLsEnp5m.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Dec 31 23:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 23:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 23:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Dec 31 23:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 23:21:51 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 23:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Dec 31 23:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 23:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Dec 31 23:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 23:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Dec 31 23:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 23:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Dec 31 23:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 23:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 23:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Dec 31 23:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 23:21:52 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Dec 31 23:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Dec 31 23:21:53 host sudo: pam_unix(sudo:session): session closed for user root Dec 31 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Dec 31 23:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Dec 31 23:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Dec 31 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Dec 31 23:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Dec 31 23:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Dec 31 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Dec 31 23:21:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Dec 31 23:21:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames Dec 31 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Dec 31 23:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 23:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Dec 31 23:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 23:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 23:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Dec 31 23:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Dec 31 23:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Dec 31 23:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Dec 31 23:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 23:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 23:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Dec 31 23:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Dec 31 23:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Dec 31 23:30:25 host sshd[15588]: User root from 106.10.122.53 not allowed because not listed in AllowUsers Dec 31 23:30:25 host sshd[15588]: input_userauth_request: invalid user root [preauth] Dec 31 23:30:25 host unix_chkpwd[15591]: password check failed for user (root) Dec 31 23:30:25 host sshd[15588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 user=root Dec 31 23:30:25 host sshd[15588]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 23:30:26 host sshd[15587]: Invalid user user from 92.46.108.20 port 38950 Dec 31 23:30:26 host sshd[15587]: input_userauth_request: invalid user user [preauth] Dec 31 23:30:27 host sshd[15587]: pam_unix(sshd:auth): check pass; user unknown Dec 31 23:30:27 host sshd[15587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Dec 31 23:30:27 host sshd[15588]: Failed password for invalid user root from 106.10.122.53 port 52116 ssh2 Dec 31 23:30:28 host sshd[15588]: Connection closed by 106.10.122.53 port 52116 [preauth] Dec 31 23:30:29 host sshd[15587]: Failed password for invalid user user from 92.46.108.20 port 38950 ssh2 Dec 31 23:30:30 host sshd[15587]: Connection closed by 92.46.108.20 port 38950 [preauth] Dec 31 23:32:29 host sshd[15823]: Invalid user db2fenc1 from 79.104.0.82 port 45442 Dec 31 23:32:29 host sshd[15823]: input_userauth_request: invalid user db2fenc1 [preauth] Dec 31 23:32:29 host sshd[15823]: pam_unix(sshd:auth): check pass; user unknown Dec 31 23:32:29 host sshd[15823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.104.0.82 Dec 31 23:32:30 host sshd[15823]: Failed password for invalid user db2fenc1 from 79.104.0.82 port 45442 ssh2 Dec 31 23:32:31 host sshd[15823]: Received disconnect from 79.104.0.82 port 45442:11: Bye Bye [preauth] Dec 31 23:32:31 host sshd[15823]: Disconnected from 79.104.0.82 port 45442 [preauth] Dec 31 23:32:39 host sshd[15835]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Dec 31 23:32:39 host sshd[15835]: input_userauth_request: invalid user root [preauth] Dec 31 23:32:39 host unix_chkpwd[15838]: password check failed for user (root) Dec 31 23:32:39 host sshd[15835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Dec 31 23:32:39 host sshd[15835]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 23:32:41 host sshd[15835]: Failed password for invalid user root from 162.218.126.136 port 59446 ssh2 Dec 31 23:32:41 host sshd[15835]: Connection closed by 162.218.126.136 port 59446 [preauth] Dec 31 23:32:51 host sshd[15848]: Invalid user user from 143.198.8.62 port 40120 Dec 31 23:32:51 host sshd[15848]: input_userauth_request: invalid user user [preauth] Dec 31 23:32:51 host sshd[15848]: pam_unix(sshd:auth): check pass; user unknown Dec 31 23:32:51 host sshd[15848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.8.62 Dec 31 23:32:52 host sshd[15856]: Invalid user test4 from 149.89.161.134 port 57822 Dec 31 23:32:52 host sshd[15856]: input_userauth_request: invalid user test4 [preauth] Dec 31 23:32:52 host sshd[15856]: pam_unix(sshd:auth): check pass; user unknown Dec 31 23:32:52 host sshd[15856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.89.161.134 Dec 31 23:32:53 host sshd[15848]: Failed password for invalid user user from 143.198.8.62 port 40120 ssh2 Dec 31 23:32:53 host sshd[15848]: Received disconnect from 143.198.8.62 port 40120:11: Bye Bye [preauth] Dec 31 23:32:53 host sshd[15848]: Disconnected from 143.198.8.62 port 40120 [preauth] Dec 31 23:32:53 host sshd[15856]: Failed password for invalid user test4 from 149.89.161.134 port 57822 ssh2 Dec 31 23:32:54 host sshd[15856]: Received disconnect from 149.89.161.134 port 57822:11: Bye Bye [preauth] Dec 31 23:32:54 host sshd[15856]: Disconnected from 149.89.161.134 port 57822 [preauth] Dec 31 23:34:10 host sshd[15986]: Invalid user afriasge from 79.104.0.82 port 48118 Dec 31 23:34:10 host sshd[15986]: input_userauth_request: invalid user afriasge [preauth] Dec 31 23:34:10 host sshd[15986]: pam_unix(sshd:auth): check pass; user unknown Dec 31 23:34:10 host sshd[15986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.104.0.82 Dec 31 23:34:12 host sshd[15986]: Failed password for invalid user afriasge from 79.104.0.82 port 48118 ssh2 Dec 31 23:34:12 host sshd[15986]: Received disconnect from 79.104.0.82 port 48118:11: Bye Bye [preauth] Dec 31 23:34:12 host sshd[15986]: Disconnected from 79.104.0.82 port 48118 [preauth] Dec 31 23:35:27 host sshd[16138]: Invalid user user from 79.104.0.82 port 48084 Dec 31 23:35:27 host sshd[16138]: input_userauth_request: invalid user user [preauth] Dec 31 23:35:27 host sshd[16138]: pam_unix(sshd:auth): check pass; user unknown Dec 31 23:35:27 host sshd[16138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.104.0.82 Dec 31 23:35:29 host sshd[16138]: Failed password for invalid user user from 79.104.0.82 port 48084 ssh2 Dec 31 23:35:29 host sshd[16138]: Received disconnect from 79.104.0.82 port 48084:11: Bye Bye [preauth] Dec 31 23:35:29 host sshd[16138]: Disconnected from 79.104.0.82 port 48084 [preauth] Dec 31 23:37:07 host sshd[16458]: Invalid user ftpuser from 89.17.63.85 port 43939 Dec 31 23:37:07 host sshd[16458]: input_userauth_request: invalid user ftpuser [preauth] Dec 31 23:37:07 host sshd[16458]: pam_unix(sshd:auth): check pass; user unknown Dec 31 23:37:07 host sshd[16458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.17.63.85 Dec 31 23:37:10 host sshd[16458]: Failed password for invalid user ftpuser from 89.17.63.85 port 43939 ssh2 Dec 31 23:37:10 host sshd[16458]: Received disconnect from 89.17.63.85 port 43939:11: Bye Bye [preauth] Dec 31 23:37:10 host sshd[16458]: Disconnected from 89.17.63.85 port 43939 [preauth] Dec 31 23:38:20 host sshd[16571]: Invalid user lei from 143.198.8.62 port 42184 Dec 31 23:38:20 host sshd[16571]: input_userauth_request: invalid user lei [preauth] Dec 31 23:38:20 host sshd[16571]: pam_unix(sshd:auth): check pass; user unknown Dec 31 23:38:20 host sshd[16571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.8.62 Dec 31 23:38:22 host sshd[16571]: Failed password for invalid user lei from 143.198.8.62 port 42184 ssh2 Dec 31 23:38:22 host sshd[16571]: Received disconnect from 143.198.8.62 port 42184:11: Bye Bye [preauth] Dec 31 23:38:22 host sshd[16571]: Disconnected from 143.198.8.62 port 42184 [preauth] Dec 31 23:38:39 host sshd[16615]: Invalid user jw from 149.89.161.134 port 44944 Dec 31 23:38:39 host sshd[16615]: input_userauth_request: invalid user jw [preauth] Dec 31 23:38:39 host sshd[16615]: pam_unix(sshd:auth): check pass; user unknown Dec 31 23:38:39 host sshd[16615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.89.161.134 Dec 31 23:38:41 host sshd[16615]: Failed password for invalid user jw from 149.89.161.134 port 44944 ssh2 Dec 31 23:38:41 host sshd[16615]: Received disconnect from 149.89.161.134 port 44944:11: Bye Bye [preauth] Dec 31 23:38:41 host sshd[16615]: Disconnected from 149.89.161.134 port 44944 [preauth] Dec 31 23:39:28 host sshd[16704]: Invalid user shastry from 143.198.8.62 port 42210 Dec 31 23:39:28 host sshd[16704]: input_userauth_request: invalid user shastry [preauth] Dec 31 23:39:28 host sshd[16704]: pam_unix(sshd:auth): check pass; user unknown Dec 31 23:39:28 host sshd[16704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.8.62 Dec 31 23:39:29 host sshd[16704]: Failed password for invalid user shastry from 143.198.8.62 port 42210 ssh2 Dec 31 23:39:29 host sshd[16704]: Received disconnect from 143.198.8.62 port 42210:11: Bye Bye [preauth] Dec 31 23:39:29 host sshd[16704]: Disconnected from 143.198.8.62 port 42210 [preauth] Dec 31 23:39:41 host sshd[16749]: Invalid user progress from 89.17.63.85 port 41176 Dec 31 23:39:41 host sshd[16749]: input_userauth_request: invalid user progress [preauth] Dec 31 23:39:41 host sshd[16749]: pam_unix(sshd:auth): check pass; user unknown Dec 31 23:39:41 host sshd[16749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.17.63.85 Dec 31 23:39:43 host sshd[16749]: Failed password for invalid user progress from 89.17.63.85 port 41176 ssh2 Dec 31 23:39:43 host sshd[16749]: Received disconnect from 89.17.63.85 port 41176:11: Bye Bye [preauth] Dec 31 23:39:43 host sshd[16749]: Disconnected from 89.17.63.85 port 41176 [preauth] Dec 31 23:39:54 host sshd[16768]: User root from 149.89.161.134 not allowed because not listed in AllowUsers Dec 31 23:39:54 host sshd[16768]: input_userauth_request: invalid user root [preauth] Dec 31 23:39:54 host unix_chkpwd[16771]: password check failed for user (root) Dec 31 23:39:54 host sshd[16768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.89.161.134 user=root Dec 31 23:39:54 host sshd[16768]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 23:39:56 host sshd[16768]: Failed password for invalid user root from 149.89.161.134 port 53296 ssh2 Dec 31 23:39:56 host sshd[16768]: Received disconnect from 149.89.161.134 port 53296:11: Bye Bye [preauth] Dec 31 23:39:56 host sshd[16768]: Disconnected from 149.89.161.134 port 53296 [preauth] Dec 31 23:40:50 host sshd[16902]: Invalid user prueba1 from 89.17.63.85 port 42619 Dec 31 23:40:50 host sshd[16902]: input_userauth_request: invalid user prueba1 [preauth] Dec 31 23:40:50 host sshd[16902]: pam_unix(sshd:auth): check pass; user unknown Dec 31 23:40:50 host sshd[16902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.17.63.85 Dec 31 23:40:53 host sshd[16902]: Failed password for invalid user prueba1 from 89.17.63.85 port 42619 ssh2 Dec 31 23:56:45 host sshd[18966]: User root from 103.13.40.2 not allowed because not listed in AllowUsers Dec 31 23:56:45 host sshd[18966]: input_userauth_request: invalid user root [preauth] Dec 31 23:56:45 host unix_chkpwd[18969]: password check failed for user (root) Dec 31 23:56:45 host sshd[18966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 user=root Dec 31 23:56:45 host sshd[18966]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Dec 31 23:56:48 host sshd[18966]: Failed password for invalid user root from 103.13.40.2 port 34430 ssh2 Dec 31 23:56:48 host sshd[18966]: Connection closed by 103.13.40.2 port 34430 [preauth] Jan 1 00:12:11 host sshd[21015]: Connection closed by 45.79.181.94 port 48394 [preauth] Jan 1 00:12:12 host sshd[21062]: Connection closed by 45.79.181.94 port 48402 [preauth] Jan 1 00:12:14 host sshd[21066]: Connection closed by 45.79.181.94 port 48414 [preauth] Jan 1 00:13:58 host sshd[21304]: User ftp from 45.93.201.90 not allowed because not listed in AllowUsers Jan 1 00:13:58 host sshd[21304]: input_userauth_request: invalid user ftp [preauth] Jan 1 00:13:58 host sshd[21304]: Failed none for invalid user ftp from 45.93.201.90 port 54234 ssh2 Jan 1 00:14:01 host unix_chkpwd[21335]: password check failed for user (ftp) Jan 1 00:14:01 host sshd[21304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 user=ftp Jan 1 00:14:01 host sshd[21304]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 1 00:14:04 host sshd[21304]: Failed password for invalid user ftp from 45.93.201.90 port 54234 ssh2 Jan 1 00:14:07 host unix_chkpwd[21378]: password check failed for user (ftp) Jan 1 00:14:07 host sshd[21304]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 1 00:14:09 host sshd[21304]: Failed password for invalid user ftp from 45.93.201.90 port 54234 ssh2 Jan 1 00:14:12 host sshd[21304]: Connection closed by 45.93.201.90 port 54234 [preauth] Jan 1 00:14:12 host sshd[21304]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 user=ftp Jan 1 00:20:05 host sshd[22943]: Invalid user pe from 45.13.58.103 port 49424 Jan 1 00:20:05 host sshd[22943]: input_userauth_request: invalid user pe [preauth] Jan 1 00:20:05 host sshd[22943]: pam_unix(sshd:auth): check pass; user unknown Jan 1 00:20:05 host sshd[22943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.13.58.103 Jan 1 00:20:07 host sshd[22943]: Failed password for invalid user pe from 45.13.58.103 port 49424 ssh2 Jan 1 00:20:07 host sshd[22943]: Received disconnect from 45.13.58.103 port 49424:11: Bye Bye [preauth] Jan 1 00:20:07 host sshd[22943]: Disconnected from 45.13.58.103 port 49424 [preauth] Jan 1 00:21:31 host sshd[23230]: Invalid user admin from 167.99.5.226 port 45894 Jan 1 00:21:31 host sshd[23230]: input_userauth_request: invalid user admin [preauth] Jan 1 00:21:31 host sshd[23230]: pam_unix(sshd:auth): check pass; user unknown Jan 1 00:21:31 host sshd[23230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.5.226 Jan 1 00:21:33 host sshd[23230]: Failed password for invalid user admin from 167.99.5.226 port 45894 ssh2 Jan 1 00:21:33 host sshd[23230]: Received disconnect from 167.99.5.226 port 45894:11: Bye Bye [preauth] Jan 1 00:21:33 host sshd[23230]: Disconnected from 167.99.5.226 port 45894 [preauth] Jan 1 00:21:34 host sshd[23236]: User root from 176.214.78.72 not allowed because not listed in AllowUsers Jan 1 00:21:34 host sshd[23236]: input_userauth_request: invalid user root [preauth] Jan 1 00:21:34 host unix_chkpwd[23241]: password check failed for user (root) Jan 1 00:21:34 host sshd[23236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.214.78.72 user=root Jan 1 00:21:34 host sshd[23236]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 1 00:21:36 host sshd[23236]: Failed password for invalid user root from 176.214.78.72 port 38036 ssh2 Jan 1 00:21:37 host sshd[23236]: Received disconnect from 176.214.78.72 port 38036:11: Bye Bye [preauth] Jan 1 00:21:37 host sshd[23236]: Disconnected from 176.214.78.72 port 38036 [preauth] Jan 1 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 1 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 1 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 1 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 1 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 1 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 1 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 1 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 1 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 1 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 1 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 00:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 1 00:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 00:21:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 00:22:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 1 00:22:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 00:22:20 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 00:22:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 1 00:22:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 00:22:20 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 00:22:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=phmetals user-2=kottayamcalldriv user-3=gifterman user-4=palco123 user-5=wwwnexidigital user-6=mrsclean user-7=wwwevmhonda user-8=bonifacegroup user-9=wwwletsstalkfood user-10=straightcurve user-11=wwwtestugo user-12=shalinijames user-13=vfmassets user-14=pmcresources user-15=remysagr user-16=disposeat user-17=wwwkmaorg user-18=woodpeck user-19=wwwkapin user-20=travelboniface user-21=ugotscom user-22=wwwrmswll user-23=keralaholi user-24=wwwresourcehunte user-25=wwwpmcresource user-26=dartsimp user-27=a2zgroup user-28=laundryboniface user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 1 00:22:20 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 1 00:22:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 00:22:20 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 00:22:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 1 00:22:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 00:22:21 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 00:22:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zOH3gxmX23yEXzxx.~ Jan 1 00:22:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 00:22:21 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 00:22:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zOH3gxmX23yEXzxx.~' Jan 1 00:22:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 00:22:21 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 00:22:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zOH3gxmX23yEXzxx.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 1 00:22:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 00:22:21 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 00:22:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 1 00:22:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 00:22:21 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 00:22:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 1 00:22:21 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 00:22:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 00:22:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 1 00:22:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 00:22:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 00:22:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 1 00:22:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 00:22:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 00:22:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 1 00:22:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 00:22:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 00:22:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 1 00:22:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 00:22:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 00:22:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 1 00:22:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 00:22:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 00:22:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 1 00:22:23 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 1 00:22:25 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 1 00:22:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 1 00:22:25 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 1 00:22:26 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 1 00:22:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 1 00:22:26 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 1 00:22:31 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 1 00:22:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 1 00:22:31 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 00:22:32 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 00:22:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 1 00:22:32 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 00:22:33 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 00:22:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 1 00:22:33 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 00:22:35 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 00:22:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 1 00:22:35 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 00:22:37 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 00:22:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 1 00:22:37 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 00:22:38 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 00:23:45 host sshd[23701]: Invalid user myshake from 64.113.127.230 port 55682 Jan 1 00:23:45 host sshd[23701]: input_userauth_request: invalid user myshake [preauth] Jan 1 00:23:46 host sshd[23701]: pam_unix(sshd:auth): check pass; user unknown Jan 1 00:23:46 host sshd[23701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.113.127.230 Jan 1 00:23:47 host sshd[23701]: Failed password for invalid user myshake from 64.113.127.230 port 55682 ssh2 Jan 1 00:23:48 host sshd[23701]: Received disconnect from 64.113.127.230 port 55682:11: Bye Bye [preauth] Jan 1 00:23:48 host sshd[23701]: Disconnected from 64.113.127.230 port 55682 [preauth] Jan 1 00:23:49 host sshd[23707]: User root from 64.113.127.230 not allowed because not listed in AllowUsers Jan 1 00:23:49 host sshd[23707]: input_userauth_request: invalid user root [preauth] Jan 1 00:23:50 host unix_chkpwd[23712]: password check failed for user (root) Jan 1 00:23:50 host sshd[23707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.113.127.230 user=root Jan 1 00:23:50 host sshd[23707]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 1 00:23:52 host sshd[23707]: Failed password for invalid user root from 64.113.127.230 port 55713 ssh2 Jan 1 00:23:52 host sshd[23707]: Received disconnect from 64.113.127.230 port 55713:11: Bye Bye [preauth] Jan 1 00:23:52 host sshd[23707]: Disconnected from 64.113.127.230 port 55713 [preauth] Jan 1 00:23:54 host sshd[23715]: User ftp from 64.113.127.230 not allowed because not listed in AllowUsers Jan 1 00:23:54 host sshd[23715]: input_userauth_request: invalid user ftp [preauth] Jan 1 00:23:54 host unix_chkpwd[23725]: password check failed for user (ftp) Jan 1 00:23:54 host sshd[23715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.113.127.230 user=ftp Jan 1 00:23:54 host sshd[23715]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 1 00:23:56 host sshd[23715]: Failed password for invalid user ftp from 64.113.127.230 port 55875 ssh2 Jan 1 00:26:16 host sshd[24078]: Invalid user many from 176.214.78.72 port 50448 Jan 1 00:26:16 host sshd[24078]: input_userauth_request: invalid user many [preauth] Jan 1 00:26:16 host sshd[24078]: pam_unix(sshd:auth): check pass; user unknown Jan 1 00:26:16 host sshd[24078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.214.78.72 Jan 1 00:26:18 host sshd[24078]: Failed password for invalid user many from 176.214.78.72 port 50448 ssh2 Jan 1 00:26:18 host sshd[24078]: Received disconnect from 176.214.78.72 port 50448:11: Bye Bye [preauth] Jan 1 00:26:18 host sshd[24078]: Disconnected from 176.214.78.72 port 50448 [preauth] Jan 1 00:26:23 host sshd[24131]: Invalid user sftp from 45.13.58.103 port 46886 Jan 1 00:26:23 host sshd[24131]: input_userauth_request: invalid user sftp [preauth] Jan 1 00:26:23 host sshd[24131]: pam_unix(sshd:auth): check pass; user unknown Jan 1 00:26:23 host sshd[24131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.13.58.103 Jan 1 00:26:25 host sshd[24131]: Failed password for invalid user sftp from 45.13.58.103 port 46886 ssh2 Jan 1 00:26:25 host sshd[24131]: Received disconnect from 45.13.58.103 port 46886:11: Bye Bye [preauth] Jan 1 00:26:25 host sshd[24131]: Disconnected from 45.13.58.103 port 46886 [preauth] Jan 1 00:26:55 host sshd[24273]: User root from 167.99.5.226 not allowed because not listed in AllowUsers Jan 1 00:26:55 host sshd[24273]: input_userauth_request: invalid user root [preauth] Jan 1 00:26:55 host unix_chkpwd[24276]: password check failed for user (root) Jan 1 00:26:55 host sshd[24273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.5.226 user=root Jan 1 00:26:55 host sshd[24273]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 1 00:26:57 host sshd[24273]: Failed password for invalid user root from 167.99.5.226 port 38442 ssh2 Jan 1 00:26:57 host sshd[24273]: Received disconnect from 167.99.5.226 port 38442:11: Bye Bye [preauth] Jan 1 00:26:57 host sshd[24273]: Disconnected from 167.99.5.226 port 38442 [preauth] Jan 1 00:27:21 host sshd[24348]: Invalid user pi from 94.193.186.71 port 48256 Jan 1 00:27:21 host sshd[24348]: input_userauth_request: invalid user pi [preauth] Jan 1 00:27:21 host sshd[24348]: pam_unix(sshd:auth): check pass; user unknown Jan 1 00:27:21 host sshd[24348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.193.186.71 Jan 1 00:27:21 host sshd[24350]: Invalid user pi from 94.193.186.71 port 48258 Jan 1 00:27:21 host sshd[24350]: input_userauth_request: invalid user pi [preauth] Jan 1 00:27:21 host sshd[24350]: pam_unix(sshd:auth): check pass; user unknown Jan 1 00:27:21 host sshd[24350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.193.186.71 Jan 1 00:27:23 host sshd[24348]: Failed password for invalid user pi from 94.193.186.71 port 48256 ssh2 Jan 1 00:27:24 host sshd[24348]: Connection closed by 94.193.186.71 port 48256 [preauth] Jan 1 00:27:24 host sshd[24350]: Failed password for invalid user pi from 94.193.186.71 port 48258 ssh2 Jan 1 00:27:24 host sshd[24350]: Connection closed by 94.193.186.71 port 48258 [preauth] Jan 1 00:27:30 host sshd[24380]: User root from 45.13.58.103 not allowed because not listed in AllowUsers Jan 1 00:27:30 host sshd[24380]: input_userauth_request: invalid user root [preauth] Jan 1 00:27:30 host unix_chkpwd[24383]: password check failed for user (root) Jan 1 00:27:30 host sshd[24380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.13.58.103 user=root Jan 1 00:27:30 host sshd[24380]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 1 00:27:32 host sshd[24380]: Failed password for invalid user root from 45.13.58.103 port 43634 ssh2 Jan 1 00:27:32 host sshd[24380]: Received disconnect from 45.13.58.103 port 43634:11: Bye Bye [preauth] Jan 1 00:27:32 host sshd[24380]: Disconnected from 45.13.58.103 port 43634 [preauth] Jan 1 00:31:34 host sshd[24833]: Invalid user user from 41.197.31.178 port 43346 Jan 1 00:31:34 host sshd[24833]: input_userauth_request: invalid user user [preauth] Jan 1 00:31:34 host sshd[24833]: pam_unix(sshd:auth): check pass; user unknown Jan 1 00:31:34 host sshd[24833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Jan 1 00:31:36 host sshd[24833]: Failed password for invalid user user from 41.197.31.178 port 43346 ssh2 Jan 1 00:31:36 host sshd[24833]: Connection closed by 41.197.31.178 port 43346 [preauth] Jan 1 00:37:37 host sshd[25658]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Jan 1 00:37:37 host sshd[25658]: input_userauth_request: invalid user root [preauth] Jan 1 00:37:37 host unix_chkpwd[25665]: password check failed for user (root) Jan 1 00:37:37 host sshd[25658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Jan 1 00:37:37 host sshd[25658]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 1 00:37:39 host sshd[25658]: Failed password for invalid user root from 162.218.126.136 port 40748 ssh2 Jan 1 00:37:39 host sshd[25658]: Connection closed by 162.218.126.136 port 40748 [preauth] Jan 1 00:53:31 host sshd[27946]: Invalid user vyatta from 106.10.122.53 port 58093 Jan 1 00:53:31 host sshd[27946]: input_userauth_request: invalid user vyatta [preauth] Jan 1 00:53:31 host sshd[27946]: pam_unix(sshd:auth): check pass; user unknown Jan 1 00:53:31 host sshd[27946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Jan 1 00:53:33 host sshd[27946]: Failed password for invalid user vyatta from 106.10.122.53 port 58093 ssh2 Jan 1 00:53:34 host sshd[27946]: Connection closed by 106.10.122.53 port 58093 [preauth] Jan 1 01:06:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 1 01:06:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 01:06:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 01:16:13 host sshd[31611]: Invalid user jenkins from 209.141.55.27 port 46230 Jan 1 01:16:13 host sshd[31611]: input_userauth_request: invalid user jenkins [preauth] Jan 1 01:16:13 host sshd[31611]: pam_unix(sshd:auth): check pass; user unknown Jan 1 01:16:13 host sshd[31611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.55.27 Jan 1 01:16:16 host sshd[31611]: Failed password for invalid user jenkins from 209.141.55.27 port 46230 ssh2 Jan 1 01:16:16 host sshd[31611]: Received disconnect from 209.141.55.27 port 46230:11: Normal Shutdown, Thank you for playing [preauth] Jan 1 01:16:16 host sshd[31611]: Disconnected from 209.141.55.27 port 46230 [preauth] Jan 1 01:18:08 host sshd[31814]: User root from 103.13.40.2 not allowed because not listed in AllowUsers Jan 1 01:18:08 host sshd[31814]: input_userauth_request: invalid user root [preauth] Jan 1 01:18:08 host unix_chkpwd[31816]: password check failed for user (root) Jan 1 01:18:08 host sshd[31814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 user=root Jan 1 01:18:08 host sshd[31814]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 1 01:18:11 host sshd[31814]: Failed password for invalid user root from 103.13.40.2 port 47696 ssh2 Jan 1 01:18:11 host sshd[31814]: Connection closed by 103.13.40.2 port 47696 [preauth] Jan 1 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 1 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 1 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 1 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 1 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 1 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 1 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 1 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 1 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 1 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 1 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 01:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 1 01:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 01:21:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 01:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 1 01:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 01:21:50 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 01:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 1 01:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 01:21:50 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 01:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=shalinijames user-3=wwwtestugo user-4=vfmassets user-5=woodpeck user-6=wwwkapin user-7=disposeat user-8=remysagr user-9=wwwkmaorg user-10=mrsclean user-11=wwwnexidigital user-12=kottayamcalldriv user-13=phmetals user-14=palco123 user-15=gifterman user-16=straightcurve user-17=wwwletsstalkfood user-18=wwwevmhonda user-19=bonifacegroup user-20=laundryboniface user-21=a2zgroup user-22=dartsimp user-23=cochintaxi user-24=wwwkaretakers user-25=ugotscom user-26=keralaholi user-27=wwwresourcehunte user-28=wwwrmswll user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 1 01:21:50 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 1 01:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 01:21:50 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 01:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 1 01:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 01:21:50 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 01:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-g5aEjAkua9TEId2X.~ Jan 1 01:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 01:21:50 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 01:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-g5aEjAkua9TEId2X.~' Jan 1 01:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 01:21:50 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 01:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-g5aEjAkua9TEId2X.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 1 01:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 01:21:50 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 01:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 1 01:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 01:21:51 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 01:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 1 01:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 01:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 01:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 1 01:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 01:21:51 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 1 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 1 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 01:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 1 01:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 01:21:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 1 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 01:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 1 01:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 1 01:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 1 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 1 01:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 1 01:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 1 01:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 1 01:21:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 1 01:21:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 1 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 1 01:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 01:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 01:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 1 01:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 01:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 01:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 1 01:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 01:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 01:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 1 01:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 01:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 01:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 1 01:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 01:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 01:25:52 host sshd[508]: Did not receive identification string from 89.248.163.210 port 49924 Jan 1 01:42:40 host sshd[2754]: Invalid user user1 from 162.218.126.136 port 43876 Jan 1 01:42:40 host sshd[2754]: input_userauth_request: invalid user user1 [preauth] Jan 1 01:42:41 host sshd[2754]: pam_unix(sshd:auth): check pass; user unknown Jan 1 01:42:41 host sshd[2754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Jan 1 01:42:43 host sshd[2754]: Failed password for invalid user user1 from 162.218.126.136 port 43876 ssh2 Jan 1 01:42:43 host sshd[2754]: Connection closed by 162.218.126.136 port 43876 [preauth] Jan 1 01:55:16 host sshd[4694]: Connection closed by 162.243.146.4 port 36492 [preauth] Jan 1 02:01:46 host sshd[5555]: Invalid user spark from 124.95.156.130 port 37586 Jan 1 02:01:46 host sshd[5555]: input_userauth_request: invalid user spark [preauth] Jan 1 02:01:46 host sshd[5555]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:01:46 host sshd[5555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.95.156.130 Jan 1 02:01:48 host sshd[5555]: Failed password for invalid user spark from 124.95.156.130 port 37586 ssh2 Jan 1 02:01:48 host sshd[5555]: Received disconnect from 124.95.156.130 port 37586:11: Bye Bye [preauth] Jan 1 02:01:48 host sshd[5555]: Disconnected from 124.95.156.130 port 37586 [preauth] Jan 1 02:01:49 host sshd[5559]: Invalid user study from 177.207.207.172 port 44564 Jan 1 02:01:49 host sshd[5559]: input_userauth_request: invalid user study [preauth] Jan 1 02:01:49 host sshd[5559]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:01:49 host sshd[5559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.207.207.172 Jan 1 02:01:51 host sshd[5559]: Failed password for invalid user study from 177.207.207.172 port 44564 ssh2 Jan 1 02:01:51 host sshd[5559]: Received disconnect from 177.207.207.172 port 44564:11: Bye Bye [preauth] Jan 1 02:01:51 host sshd[5559]: Disconnected from 177.207.207.172 port 44564 [preauth] Jan 1 02:02:22 host sshd[5611]: Invalid user guest from 177.207.207.172 port 49620 Jan 1 02:02:22 host sshd[5611]: input_userauth_request: invalid user guest [preauth] Jan 1 02:02:22 host sshd[5611]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:02:22 host sshd[5611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.207.207.172 Jan 1 02:02:24 host sshd[5611]: Failed password for invalid user guest from 177.207.207.172 port 49620 ssh2 Jan 1 02:02:25 host sshd[5611]: Received disconnect from 177.207.207.172 port 49620:11: Bye Bye [preauth] Jan 1 02:02:25 host sshd[5611]: Disconnected from 177.207.207.172 port 49620 [preauth] Jan 1 02:02:44 host sshd[5663]: Invalid user deploy from 177.207.207.172 port 53580 Jan 1 02:02:44 host sshd[5663]: input_userauth_request: invalid user deploy [preauth] Jan 1 02:02:44 host sshd[5663]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:02:44 host sshd[5663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.207.207.172 Jan 1 02:02:46 host sshd[5663]: Failed password for invalid user deploy from 177.207.207.172 port 53580 ssh2 Jan 1 02:02:47 host sshd[5663]: Received disconnect from 177.207.207.172 port 53580:11: Bye Bye [preauth] Jan 1 02:02:47 host sshd[5663]: Disconnected from 177.207.207.172 port 53580 [preauth] Jan 1 02:05:21 host sshd[6087]: User root from 171.244.61.67 not allowed because not listed in AllowUsers Jan 1 02:05:21 host sshd[6087]: input_userauth_request: invalid user root [preauth] Jan 1 02:05:21 host unix_chkpwd[6089]: password check failed for user (root) Jan 1 02:05:21 host sshd[6087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.61.67 user=root Jan 1 02:05:21 host sshd[6087]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 1 02:05:23 host sshd[6087]: Failed password for invalid user root from 171.244.61.67 port 43694 ssh2 Jan 1 02:05:23 host sshd[6087]: Received disconnect from 171.244.61.67 port 43694:11: Bye Bye [preauth] Jan 1 02:05:23 host sshd[6087]: Disconnected from 171.244.61.67 port 43694 [preauth] Jan 1 02:05:58 host sshd[6153]: Invalid user user from 92.46.108.20 port 59782 Jan 1 02:05:58 host sshd[6153]: input_userauth_request: invalid user user [preauth] Jan 1 02:05:59 host sshd[6153]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:05:59 host sshd[6153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Jan 1 02:06:01 host sshd[6153]: Failed password for invalid user user from 92.46.108.20 port 59782 ssh2 Jan 1 02:06:02 host sshd[6153]: Connection closed by 92.46.108.20 port 59782 [preauth] Jan 1 02:08:14 host sshd[6404]: Connection closed by 186.125.169.14 port 52676 [preauth] Jan 1 02:09:11 host sshd[6611]: Invalid user almacen from 171.244.61.67 port 57416 Jan 1 02:09:11 host sshd[6611]: input_userauth_request: invalid user almacen [preauth] Jan 1 02:09:11 host sshd[6611]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:09:11 host sshd[6611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.61.67 Jan 1 02:09:13 host sshd[6611]: Failed password for invalid user almacen from 171.244.61.67 port 57416 ssh2 Jan 1 02:09:13 host sshd[6611]: Received disconnect from 171.244.61.67 port 57416:11: Bye Bye [preauth] Jan 1 02:09:13 host sshd[6611]: Disconnected from 171.244.61.67 port 57416 [preauth] Jan 1 02:11:24 host sshd[6887]: Invalid user ubuntu from 124.95.156.130 port 54533 Jan 1 02:11:24 host sshd[6887]: input_userauth_request: invalid user ubuntu [preauth] Jan 1 02:11:24 host sshd[6887]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:11:24 host sshd[6887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.95.156.130 Jan 1 02:11:25 host sshd[6887]: Failed password for invalid user ubuntu from 124.95.156.130 port 54533 ssh2 Jan 1 02:11:25 host sshd[6887]: Received disconnect from 124.95.156.130 port 54533:11: Bye Bye [preauth] Jan 1 02:11:25 host sshd[6887]: Disconnected from 124.95.156.130 port 54533 [preauth] Jan 1 02:11:51 host sshd[6937]: User root from 124.95.156.130 not allowed because not listed in AllowUsers Jan 1 02:11:51 host sshd[6937]: input_userauth_request: invalid user root [preauth] Jan 1 02:11:51 host unix_chkpwd[6940]: password check failed for user (root) Jan 1 02:11:51 host sshd[6937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.95.156.130 user=root Jan 1 02:11:51 host sshd[6937]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 1 02:11:54 host sshd[6937]: Failed password for invalid user root from 124.95.156.130 port 59355 ssh2 Jan 1 02:13:54 host sshd[7200]: Invalid user docker from 41.197.31.178 port 33706 Jan 1 02:13:54 host sshd[7200]: input_userauth_request: invalid user docker [preauth] Jan 1 02:13:54 host sshd[7200]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:13:54 host sshd[7200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 Jan 1 02:13:56 host sshd[7200]: Failed password for invalid user docker from 41.197.31.178 port 33706 ssh2 Jan 1 02:13:56 host sshd[7200]: Connection closed by 41.197.31.178 port 33706 [preauth] Jan 1 02:14:51 host sshd[7293]: Invalid user user from 149.56.111.41 port 36066 Jan 1 02:14:51 host sshd[7293]: input_userauth_request: invalid user user [preauth] Jan 1 02:14:51 host sshd[7293]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:14:51 host sshd[7293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.111.41 Jan 1 02:14:54 host sshd[7293]: Failed password for invalid user user from 149.56.111.41 port 36066 ssh2 Jan 1 02:14:54 host sshd[7293]: Received disconnect from 149.56.111.41 port 36066:11: Bye Bye [preauth] Jan 1 02:14:54 host sshd[7293]: Disconnected from 149.56.111.41 port 36066 [preauth] Jan 1 02:15:07 host sshd[7333]: Invalid user guest from 14.97.93.66 port 41622 Jan 1 02:15:07 host sshd[7333]: input_userauth_request: invalid user guest [preauth] Jan 1 02:15:07 host sshd[7333]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:15:07 host sshd[7333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.97.93.66 Jan 1 02:15:09 host sshd[7333]: Failed password for invalid user guest from 14.97.93.66 port 41622 ssh2 Jan 1 02:15:09 host sshd[7333]: Received disconnect from 14.97.93.66 port 41622:11: Bye Bye [preauth] Jan 1 02:15:09 host sshd[7333]: Disconnected from 14.97.93.66 port 41622 [preauth] Jan 1 02:15:33 host sshd[7500]: Invalid user ot from 134.255.235.157 port 56872 Jan 1 02:15:33 host sshd[7500]: input_userauth_request: invalid user ot [preauth] Jan 1 02:15:33 host sshd[7500]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:15:33 host sshd[7500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.255.235.157 Jan 1 02:15:35 host sshd[7500]: Failed password for invalid user ot from 134.255.235.157 port 56872 ssh2 Jan 1 02:15:35 host sshd[7500]: Received disconnect from 134.255.235.157 port 56872:11: Bye Bye [preauth] Jan 1 02:15:35 host sshd[7500]: Disconnected from 134.255.235.157 port 56872 [preauth] Jan 1 02:16:10 host sshd[7567]: Invalid user raon from 203.130.255.2 port 46280 Jan 1 02:16:10 host sshd[7567]: input_userauth_request: invalid user raon [preauth] Jan 1 02:16:10 host sshd[7567]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:16:10 host sshd[7567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.130.255.2 Jan 1 02:16:12 host sshd[7567]: Failed password for invalid user raon from 203.130.255.2 port 46280 ssh2 Jan 1 02:16:13 host sshd[7567]: Received disconnect from 203.130.255.2 port 46280:11: Bye Bye [preauth] Jan 1 02:16:13 host sshd[7567]: Disconnected from 203.130.255.2 port 46280 [preauth] Jan 1 02:16:20 host sshd[7581]: Invalid user landi from 135.125.202.29 port 36372 Jan 1 02:16:20 host sshd[7581]: input_userauth_request: invalid user landi [preauth] Jan 1 02:16:20 host sshd[7581]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:16:20 host sshd[7581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=135.125.202.29 Jan 1 02:16:22 host sshd[7581]: Failed password for invalid user landi from 135.125.202.29 port 36372 ssh2 Jan 1 02:16:22 host sshd[7581]: Received disconnect from 135.125.202.29 port 36372:11: Bye Bye [preauth] Jan 1 02:16:22 host sshd[7581]: Disconnected from 135.125.202.29 port 36372 [preauth] Jan 1 02:16:33 host sshd[7620]: Invalid user shaoruizhi from 106.10.122.53 port 49240 Jan 1 02:16:33 host sshd[7620]: input_userauth_request: invalid user shaoruizhi [preauth] Jan 1 02:16:33 host sshd[7620]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:16:33 host sshd[7620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Jan 1 02:16:36 host sshd[7620]: Failed password for invalid user shaoruizhi from 106.10.122.53 port 49240 ssh2 Jan 1 02:16:36 host sshd[7620]: Connection closed by 106.10.122.53 port 49240 [preauth] Jan 1 02:17:42 host sshd[7734]: Invalid user jenkins from 173.254.247.112 port 57582 Jan 1 02:17:42 host sshd[7734]: input_userauth_request: invalid user jenkins [preauth] Jan 1 02:17:42 host sshd[7734]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:17:42 host sshd[7734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.254.247.112 Jan 1 02:17:44 host sshd[7734]: Failed password for invalid user jenkins from 173.254.247.112 port 57582 ssh2 Jan 1 02:17:44 host sshd[7734]: Received disconnect from 173.254.247.112 port 57582:11: Bye Bye [preauth] Jan 1 02:17:44 host sshd[7734]: Disconnected from 173.254.247.112 port 57582 [preauth] Jan 1 02:17:51 host sshd[7750]: Invalid user postgres from 159.203.113.193 port 40098 Jan 1 02:17:51 host sshd[7750]: input_userauth_request: invalid user postgres [preauth] Jan 1 02:17:51 host sshd[7750]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:17:51 host sshd[7750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.113.193 Jan 1 02:17:53 host sshd[7750]: Failed password for invalid user postgres from 159.203.113.193 port 40098 ssh2 Jan 1 02:17:53 host sshd[7750]: Received disconnect from 159.203.113.193 port 40098:11: Bye Bye [preauth] Jan 1 02:17:53 host sshd[7750]: Disconnected from 159.203.113.193 port 40098 [preauth] Jan 1 02:18:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 1 02:18:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:18:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:18:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 1 02:18:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:18:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:18:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 1 02:18:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:18:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:18:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 1 02:18:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:18:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:18:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 1 02:18:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:18:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:18:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 1 02:18:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:18:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:18:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 1 02:18:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:18:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:18:56 host sshd[8005]: Invalid user davids from 14.97.93.66 port 36950 Jan 1 02:18:56 host sshd[8005]: input_userauth_request: invalid user davids [preauth] Jan 1 02:18:56 host sshd[8005]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:18:56 host sshd[8005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.97.93.66 Jan 1 02:18:58 host sshd[8005]: Failed password for invalid user davids from 14.97.93.66 port 36950 ssh2 Jan 1 02:18:58 host sshd[8005]: Received disconnect from 14.97.93.66 port 36950:11: Bye Bye [preauth] Jan 1 02:18:58 host sshd[8005]: Disconnected from 14.97.93.66 port 36950 [preauth] Jan 1 02:19:13 host sshd[8038]: Invalid user albert from 2.38.102.191 port 46170 Jan 1 02:19:13 host sshd[8038]: input_userauth_request: invalid user albert [preauth] Jan 1 02:19:13 host sshd[8038]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:19:13 host sshd[8038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.38.102.191 Jan 1 02:19:15 host sshd[8038]: Failed password for invalid user albert from 2.38.102.191 port 46170 ssh2 Jan 1 02:19:15 host sshd[8038]: Received disconnect from 2.38.102.191 port 46170:11: Bye Bye [preauth] Jan 1 02:19:15 host sshd[8038]: Disconnected from 2.38.102.191 port 46170 [preauth] Jan 1 02:19:27 host sshd[8077]: User root from 128.199.133.168 not allowed because not listed in AllowUsers Jan 1 02:19:27 host sshd[8077]: input_userauth_request: invalid user root [preauth] Jan 1 02:19:27 host unix_chkpwd[8079]: password check failed for user (root) Jan 1 02:19:27 host sshd[8077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.133.168 user=root Jan 1 02:19:27 host sshd[8077]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 1 02:19:29 host sshd[8077]: Failed password for invalid user root from 128.199.133.168 port 59780 ssh2 Jan 1 02:19:29 host sshd[8077]: Received disconnect from 128.199.133.168 port 59780:11: Bye Bye [preauth] Jan 1 02:19:29 host sshd[8077]: Disconnected from 128.199.133.168 port 59780 [preauth] Jan 1 02:19:52 host sshd[8117]: Invalid user superset from 14.97.93.66 port 45546 Jan 1 02:19:52 host sshd[8117]: input_userauth_request: invalid user superset [preauth] Jan 1 02:19:52 host sshd[8117]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:19:52 host sshd[8117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.97.93.66 Jan 1 02:19:54 host sshd[8117]: Failed password for invalid user superset from 14.97.93.66 port 45546 ssh2 Jan 1 02:19:54 host sshd[8117]: Received disconnect from 14.97.93.66 port 45546:11: Bye Bye [preauth] Jan 1 02:19:54 host sshd[8117]: Disconnected from 14.97.93.66 port 45546 [preauth] Jan 1 02:20:22 host sshd[8217]: Invalid user shaman from 149.56.111.41 port 57988 Jan 1 02:20:22 host sshd[8217]: input_userauth_request: invalid user shaman [preauth] Jan 1 02:20:22 host sshd[8217]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:20:22 host sshd[8217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.111.41 Jan 1 02:20:24 host sshd[8217]: Failed password for invalid user shaman from 149.56.111.41 port 57988 ssh2 Jan 1 02:20:24 host sshd[8217]: Received disconnect from 149.56.111.41 port 57988:11: Bye Bye [preauth] Jan 1 02:20:24 host sshd[8217]: Disconnected from 149.56.111.41 port 57988 [preauth] Jan 1 02:20:29 host sshd[8250]: Invalid user xx from 135.125.202.29 port 56964 Jan 1 02:20:29 host sshd[8250]: input_userauth_request: invalid user xx [preauth] Jan 1 02:20:29 host sshd[8250]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:20:30 host sshd[8250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=135.125.202.29 Jan 1 02:20:32 host sshd[8250]: Failed password for invalid user xx from 135.125.202.29 port 56964 ssh2 Jan 1 02:20:32 host sshd[8250]: Received disconnect from 135.125.202.29 port 56964:11: Bye Bye [preauth] Jan 1 02:20:32 host sshd[8250]: Disconnected from 135.125.202.29 port 56964 [preauth] Jan 1 02:20:54 host sshd[8295]: Invalid user mayumi from 134.255.235.157 port 52694 Jan 1 02:20:54 host sshd[8295]: input_userauth_request: invalid user mayumi [preauth] Jan 1 02:20:54 host sshd[8295]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:20:54 host sshd[8295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.255.235.157 Jan 1 02:20:56 host sshd[8295]: Failed password for invalid user mayumi from 134.255.235.157 port 52694 ssh2 Jan 1 02:20:56 host sshd[8295]: Received disconnect from 134.255.235.157 port 52694:11: Bye Bye [preauth] Jan 1 02:20:56 host sshd[8295]: Disconnected from 134.255.235.157 port 52694 [preauth] Jan 1 02:21:02 host sshd[8310]: Invalid user tim from 183.220.110.21 port 25769 Jan 1 02:21:02 host sshd[8310]: input_userauth_request: invalid user tim [preauth] Jan 1 02:21:02 host sshd[8310]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:21:02 host sshd[8310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.220.110.21 Jan 1 02:21:04 host sshd[8310]: Failed password for invalid user tim from 183.220.110.21 port 25769 ssh2 Jan 1 02:21:05 host sshd[8310]: Received disconnect from 183.220.110.21 port 25769:11: Bye Bye [preauth] Jan 1 02:21:05 host sshd[8310]: Disconnected from 183.220.110.21 port 25769 [preauth] Jan 1 02:21:32 host sshd[8380]: Invalid user gosc from 159.203.113.193 port 53654 Jan 1 02:21:32 host sshd[8380]: input_userauth_request: invalid user gosc [preauth] Jan 1 02:21:32 host sshd[8380]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:21:32 host sshd[8380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.113.193 Jan 1 02:21:33 host sshd[8382]: Invalid user usuario from 149.56.111.41 port 41764 Jan 1 02:21:33 host sshd[8382]: input_userauth_request: invalid user usuario [preauth] Jan 1 02:21:33 host sshd[8382]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:21:33 host sshd[8382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.111.41 Jan 1 02:21:34 host sshd[8382]: Failed password for invalid user usuario from 149.56.111.41 port 41764 ssh2 Jan 1 02:21:34 host sshd[8382]: Received disconnect from 149.56.111.41 port 41764:11: Bye Bye [preauth] Jan 1 02:21:34 host sshd[8382]: Disconnected from 149.56.111.41 port 41764 [preauth] Jan 1 02:21:35 host sshd[8380]: Failed password for invalid user gosc from 159.203.113.193 port 53654 ssh2 Jan 1 02:21:35 host sshd[8380]: Received disconnect from 159.203.113.193 port 53654:11: Bye Bye [preauth] Jan 1 02:21:35 host sshd[8380]: Disconnected from 159.203.113.193 port 53654 [preauth] Jan 1 02:21:42 host sshd[8507]: Invalid user jenkins from 2.38.102.191 port 44188 Jan 1 02:21:42 host sshd[8507]: input_userauth_request: invalid user jenkins [preauth] Jan 1 02:21:42 host sshd[8507]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:21:42 host sshd[8507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.38.102.191 Jan 1 02:21:45 host sshd[8507]: Failed password for invalid user jenkins from 2.38.102.191 port 44188 ssh2 Jan 1 02:21:45 host sshd[8507]: Received disconnect from 2.38.102.191 port 44188:11: Bye Bye [preauth] Jan 1 02:21:45 host sshd[8507]: Disconnected from 2.38.102.191 port 44188 [preauth] Jan 1 02:21:47 host sshd[8539]: Invalid user jackson from 135.125.202.29 port 57326 Jan 1 02:21:47 host sshd[8539]: input_userauth_request: invalid user jackson [preauth] Jan 1 02:21:47 host sshd[8539]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:21:47 host sshd[8539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=135.125.202.29 Jan 1 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 1 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 1 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 1 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 1 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 1 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 1 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 1 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 1 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 1 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 1 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:21:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 1 02:21:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:21:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:21:49 host sshd[8539]: Failed password for invalid user jackson from 135.125.202.29 port 57326 ssh2 Jan 1 02:21:49 host sshd[8539]: Received disconnect from 135.125.202.29 port 57326:11: Bye Bye [preauth] Jan 1 02:21:49 host sshd[8539]: Disconnected from 135.125.202.29 port 57326 [preauth] Jan 1 02:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 1 02:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:21:50 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 1 02:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:21:50 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=mrsclean user-2=wwwnexidigital user-3=palco123 user-4=gifterman user-5=kottayamcalldriv user-6=phmetals user-7=straightcurve user-8=wwwletsstalkfood user-9=bonifacegroup user-10=wwwevmhonda user-11=pmcresources user-12=vfmassets user-13=shalinijames user-14=wwwtestugo user-15=woodpeck user-16=wwwkapin user-17=remysagr user-18=disposeat user-19=wwwkmaorg user-20=keralaholi user-21=wwwresourcehunte user-22=wwwrmswll user-23=ugotscom user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=a2zgroup user-28=dartsimp user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 1 02:21:50 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 1 02:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:21:50 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:21:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 1 02:21:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:21:50 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-YsewvhmoA2vfCV6M.~ Jan 1 02:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:21:51 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-YsewvhmoA2vfCV6M.~' Jan 1 02:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:21:51 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-YsewvhmoA2vfCV6M.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 1 02:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:21:51 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 1 02:21:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:21:51 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:21:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 1 02:21:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:21:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 1 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 1 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 1 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:21:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 1 02:21:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:21:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 1 02:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 1 02:21:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 1 02:21:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 1 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 1 02:21:54 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 1 02:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 1 02:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 1 02:21:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 1 02:21:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 1 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 1 02:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 1 02:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 1 02:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:22:01 host sshd[8775]: Invalid user saicoop from 134.255.235.157 port 48578 Jan 1 02:22:01 host sshd[8775]: input_userauth_request: invalid user saicoop [preauth] Jan 1 02:22:01 host sshd[8775]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:22:01 host sshd[8775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.255.235.157 Jan 1 02:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 1 02:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 1 02:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:22:04 host sshd[8775]: Failed password for invalid user saicoop from 134.255.235.157 port 48578 ssh2 Jan 1 02:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:22:30 host sshd[8907]: Invalid user gao from 203.130.255.2 port 42960 Jan 1 02:22:30 host sshd[8907]: input_userauth_request: invalid user gao [preauth] Jan 1 02:22:30 host sshd[8907]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:22:30 host sshd[8907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.130.255.2 Jan 1 02:22:30 host sshd[8910]: User root from 173.254.247.112 not allowed because not listed in AllowUsers Jan 1 02:22:30 host sshd[8910]: input_userauth_request: invalid user root [preauth] Jan 1 02:22:31 host unix_chkpwd[8913]: password check failed for user (root) Jan 1 02:22:31 host sshd[8910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.254.247.112 user=root Jan 1 02:22:31 host sshd[8910]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 1 02:22:32 host sshd[8907]: Failed password for invalid user gao from 203.130.255.2 port 42960 ssh2 Jan 1 02:22:32 host sshd[8907]: Received disconnect from 203.130.255.2 port 42960:11: Bye Bye [preauth] Jan 1 02:22:32 host sshd[8907]: Disconnected from 203.130.255.2 port 42960 [preauth] Jan 1 02:22:32 host sshd[8910]: Failed password for invalid user root from 173.254.247.112 port 37382 ssh2 Jan 1 02:22:33 host sshd[8910]: Received disconnect from 173.254.247.112 port 37382:11: Bye Bye [preauth] Jan 1 02:22:33 host sshd[8910]: Disconnected from 173.254.247.112 port 37382 [preauth] Jan 1 02:22:34 host sshd[8917]: Invalid user gc from 128.199.133.168 port 33052 Jan 1 02:22:34 host sshd[8917]: input_userauth_request: invalid user gc [preauth] Jan 1 02:22:34 host sshd[8917]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:22:34 host sshd[8917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.133.168 Jan 1 02:22:36 host sshd[8917]: Failed password for invalid user gc from 128.199.133.168 port 33052 ssh2 Jan 1 02:22:36 host sshd[8917]: Received disconnect from 128.199.133.168 port 33052:11: Bye Bye [preauth] Jan 1 02:22:36 host sshd[8917]: Disconnected from 128.199.133.168 port 33052 [preauth] Jan 1 02:22:42 host sshd[8985]: Invalid user louie from 159.203.113.193 port 49774 Jan 1 02:22:42 host sshd[8985]: input_userauth_request: invalid user louie [preauth] Jan 1 02:22:42 host sshd[8985]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:22:42 host sshd[8985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.113.193 Jan 1 02:22:44 host sshd[8985]: Failed password for invalid user louie from 159.203.113.193 port 49774 ssh2 Jan 1 02:22:44 host sshd[8985]: Received disconnect from 159.203.113.193 port 49774:11: Bye Bye [preauth] Jan 1 02:22:44 host sshd[8985]: Disconnected from 159.203.113.193 port 49774 [preauth] Jan 1 02:22:56 host sshd[9029]: Invalid user zdw from 2.38.102.191 port 46292 Jan 1 02:22:56 host sshd[9029]: input_userauth_request: invalid user zdw [preauth] Jan 1 02:22:56 host sshd[9029]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:22:56 host sshd[9029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.38.102.191 Jan 1 02:22:58 host sshd[9029]: Failed password for invalid user zdw from 2.38.102.191 port 46292 ssh2 Jan 1 02:22:58 host sshd[9029]: Received disconnect from 2.38.102.191 port 46292:11: Bye Bye [preauth] Jan 1 02:22:58 host sshd[9029]: Disconnected from 2.38.102.191 port 46292 [preauth] Jan 1 02:24:12 host sshd[9234]: User root from 203.130.255.2 not allowed because not listed in AllowUsers Jan 1 02:24:12 host sshd[9234]: input_userauth_request: invalid user root [preauth] Jan 1 02:24:12 host unix_chkpwd[9237]: password check failed for user (root) Jan 1 02:24:12 host sshd[9234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.130.255.2 user=root Jan 1 02:24:12 host sshd[9234]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 1 02:24:14 host sshd[9234]: Failed password for invalid user root from 203.130.255.2 port 38174 ssh2 Jan 1 02:24:14 host sshd[9234]: Received disconnect from 203.130.255.2 port 38174:11: Bye Bye [preauth] Jan 1 02:24:14 host sshd[9234]: Disconnected from 203.130.255.2 port 38174 [preauth] Jan 1 02:29:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 1 02:29:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:29:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:29:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 1 02:29:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:29:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:29:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 1 02:29:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:29:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:29:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 1 02:29:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:29:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:29:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 1 02:29:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:29:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:29:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkapin user-2=woodpeck user-3=disposeat user-4=wwwkmaorg user-5=remysagr user-6=pmcresources user-7=vfmassets user-8=shalinijames user-9=wwwtestugo user-10=straightcurve user-11=wwwletsstalkfood user-12=bonifacegroup user-13=wwwevmhonda user-14=wwwnexidigital user-15=mrsclean user-16=palco123 user-17=gifterman user-18=phmetals user-19=kottayamcalldriv user-20=wwwkaretakers user-21=cochintaxi user-22=laundryboniface user-23=a2zgroup user-24=dartsimp user-25=wwwpmcresource user-26=wwwresourcehunte user-27=keralaholi user-28=wwwrmswll user-29=ugotscom user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 1 02:29:48 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 1 02:29:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:29:49 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:29:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwevmhonda --output=json Jan 1 02:29:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:29:49 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:29:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color instance info --format=json --check-updates=true Jan 1 02:29:49 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 1 02:29:53 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 1 02:29:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 1 02:29:53 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 1 02:29:54 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 1 02:29:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 1 02:29:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 1 02:29:56 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 1 02:29:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 1 02:29:56 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 1 02:29:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 1 02:29:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwevmhonda LangPHP php_get_vhost_versions --output=json Jan 1 02:29:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:29:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:29:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 package_manager_get_package_info package-0=ea-php72 --output=json Jan 1 02:29:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:29:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:29:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color instance login-url --skip-plugins=false --format=json Jan 1 02:29:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 1 02:29:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 1 02:29:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwletsstalkfood --output=json Jan 1 02:29:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:29:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:29:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color instance info --format=json --check-updates=true Jan 1 02:29:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 1 02:30:05 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 1 02:30:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 1 02:30:05 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 1 02:30:06 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 1 02:30:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 1 02:30:06 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 1 02:30:11 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 1 02:30:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 1 02:30:11 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 1 02:30:11 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 1 02:30:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood LangPHP php_get_vhost_versions --output=json Jan 1 02:30:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:30:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:30:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color instance login-url --skip-plugins=false --format=json Jan 1 02:30:11 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 1 02:30:12 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 1 02:30:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DomainInfo single_domain_data domain=letsstalkfood.com return_https_redirect_status=1 --output=json Jan 1 02:30:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:30:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:30:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_vhost_ssl_components --output=json Jan 1 02:30:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:30:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:30:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_ssl_vhosts --output=json Jan 1 02:30:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:30:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:30:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood Mime list_redirects --output=json Jan 1 02:30:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:30:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:30:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 1 02:30:13 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 1 02:30:14 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 1 02:30:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 1 02:30:14 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 1 02:30:15 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 1 02:30:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 1 02:30:15 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 1 02:30:20 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 1 02:30:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 1 02:30:20 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 1 02:30:25 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 1 02:30:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/wp-config.php Jan 1 02:30:26 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 1 02:30:26 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 1 02:30:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:30:26 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 1 02:30:26 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 1 02:30:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/.maintenance Jan 1 02:30:26 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 1 02:30:26 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 1 02:30:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color db-prefix get Jan 1 02:30:26 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 1 02:30:26 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 1 02:30:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DirectoryPrivacy is_directory_protected dir=/home/wwwletsstalkfood/public_html --output=json Jan 1 02:30:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:30:27 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:30:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:30:27 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 1 02:30:27 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 1 02:30:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 1 02:30:27 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 1 02:30:28 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 1 02:30:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 1 02:30:28 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 1 02:30:28 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 1 02:30:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 1 02:30:28 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 1 02:30:29 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 1 02:30:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 1 02:30:29 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 1 02:30:29 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 1 02:30:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color admin-username is-secure Jan 1 02:30:29 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 1 02:30:30 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 1 02:30:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:30:30 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 1 02:30:30 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 1 02:30:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/wp-config.php Jan 1 02:30:30 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 1 02:30:30 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 1 02:30:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/stat -c %a /home/wwwletsstalkfood/public_html/wp-config.php Jan 1 02:30:30 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 1 02:30:30 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 1 02:30:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color pingbacks is_disabled Jan 1 02:30:30 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 1 02:30:31 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 1 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:30:31 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 1 02:30:31 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 1 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color security-keys are_keys_correct Jan 1 02:30:31 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 1 02:30:32 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 1 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=mrsclean --output=json Jan 1 02:30:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:30:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/backup --no-color instance info --format=json --check-updates=true Jan 1 02:30:32 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 1 02:30:32 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 1 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean DomainInfo single_domain_data domain=mrsclean.co.in return_https_redirect_status=1 --output=json Jan 1 02:30:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:30:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean Mime list_redirects --output=json Jan 1 02:30:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:30:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/public_html/backup/wp-includes/version.php Jan 1 02:30:32 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 1 02:30:32 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 1 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/public_html/backup/wp-includes/version.php Jan 1 02:30:32 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 1 02:30:32 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 1 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 1 02:30:32 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 1 02:30:32 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 1 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean LangPHP php_get_vhost_versions --output=json Jan 1 02:30:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:30:33 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:30:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 1 02:30:33 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:30:33 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:30:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/blog --no-color instance info --format=json --check-updates=true Jan 1 02:30:33 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 1 02:30:33 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 1 02:30:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/public_html/blog/wp-includes/version.php Jan 1 02:30:33 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 1 02:30:33 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 1 02:30:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/public_html/blog/wp-includes/version.php Jan 1 02:30:33 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 1 02:30:33 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 1 02:30:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 1 02:30:33 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 1 02:30:33 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 1 02:30:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=shalinijames --output=json Jan 1 02:30:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:30:33 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:30:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color instance info --format=json --check-updates=true Jan 1 02:30:33 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 1 02:30:41 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 1 02:30:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_plugins --format=json Jan 1 02:30:41 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 1 02:30:41 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 1 02:30:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_themes --format=json Jan 1 02:30:41 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 1 02:30:42 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 1 02:30:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 1 02:30:42 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 1 02:30:42 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 1 02:30:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames LangPHP php_get_vhost_versions --output=json Jan 1 02:30:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:30:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:30:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color instance login-url --skip-plugins=false --format=json Jan 1 02:30:42 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 1 02:30:42 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 1 02:30:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DomainInfo single_domain_data domain=shalinijames.com return_https_redirect_status=1 --output=json Jan 1 02:30:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:30:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:30:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames Mime list_redirects --output=json Jan 1 02:30:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:30:43 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:30:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 1 02:30:43 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 1 02:30:44 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 1 02:30:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_plugins --format=json Jan 1 02:30:44 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 1 02:30:45 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 1 02:30:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 1 02:30:45 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 1 02:30:49 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 1 02:30:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_themes --format=json Jan 1 02:30:49 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 1 02:30:50 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 1 02:30:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/wp-config.php Jan 1 02:30:50 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 1 02:30:50 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 1 02:30:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:30:50 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 1 02:30:50 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 1 02:30:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/.maintenance Jan 1 02:30:50 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 1 02:30:50 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 1 02:30:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color db-prefix get Jan 1 02:30:50 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 1 02:30:51 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 1 02:30:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DirectoryPrivacy is_directory_protected dir=/home/shalinijames/public_html --output=json Jan 1 02:30:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:30:51 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:30:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:30:51 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 1 02:30:51 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 1 02:30:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 1 02:30:51 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 1 02:30:52 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 1 02:30:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 1 02:30:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 1 02:30:52 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 1 02:30:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 1 02:30:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 1 02:30:53 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 1 02:30:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 1 02:30:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 1 02:30:53 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 1 02:30:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color admin-username is-secure Jan 1 02:30:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 1 02:30:53 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 1 02:30:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:30:53 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 1 02:30:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 1 02:30:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/wp-config.php Jan 1 02:30:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 1 02:30:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 1 02:30:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/stat -c %a /home/shalinijames/public_html/wp-config.php Jan 1 02:30:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 1 02:30:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 1 02:30:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color pingbacks is_disabled Jan 1 02:30:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 1 02:30:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 1 02:30:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:30:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 1 02:30:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 1 02:30:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color security-keys are_keys_correct Jan 1 02:30:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 1 02:30:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 1 02:30:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwtestugo --output=json Jan 1 02:30:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:30:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:30:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color instance info --format=json --check-updates=true Jan 1 02:30:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_plugins --format=json Jan 1 02:31:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_themes --format=json Jan 1 02:31:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 1 02:31:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo LangPHP php_get_vhost_versions --output=json Jan 1 02:31:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:31:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:31:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color instance login-url --skip-plugins=false --format=json Jan 1 02:31:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DomainInfo single_domain_data domain=testugo.in return_https_redirect_status=1 --output=json Jan 1 02:31:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:31:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:31:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo Mime list_redirects --output=json Jan 1 02:31:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:31:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:31:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 1 02:31:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_plugins --format=json Jan 1 02:31:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 1 02:31:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_themes --format=json Jan 1 02:31:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/wp-config.php Jan 1 02:31:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:31:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/.maintenance Jan 1 02:31:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color db-prefix get Jan 1 02:31:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt1 --output=json Jan 1 02:31:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:31:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:31:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:31:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 1 02:31:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 1 02:31:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 1 02:31:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 1 02:31:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color admin-username is-secure Jan 1 02:31:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:31:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/wp-config.php Jan 1 02:31:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/tt1/wp-config.php Jan 1 02:31:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color pingbacks is_disabled Jan 1 02:31:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:31:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color security-keys are_keys_correct Jan 1 02:31:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color instance info --format=json --check-updates=true Jan 1 02:31:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:18 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_plugins --format=json Jan 1 02:31:18 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:18 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_themes --format=json Jan 1 02:31:18 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:19 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 1 02:31:19 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:19 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color instance login-url --skip-plugins=false --format=json Jan 1 02:31:19 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:20 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 1 02:31:20 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:20 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_plugins --format=json Jan 1 02:31:20 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:21 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 1 02:31:21 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:24 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_themes --format=json Jan 1 02:31:24 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:25 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/wp-config.php Jan 1 02:31:25 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:25 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:31:25 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:25 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/.maintenance Jan 1 02:31:25 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:25 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color db-prefix get Jan 1 02:31:25 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:26 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt --output=json Jan 1 02:31:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:31:26 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:31:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:31:26 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:26 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 1 02:31:26 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 1 02:31:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 1 02:31:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 1 02:31:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:28 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color admin-username is-secure Jan 1 02:31:28 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:28 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:31:28 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:29 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/wp-config.php Jan 1 02:31:29 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:29 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/tt/wp-config.php Jan 1 02:31:29 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:29 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color pingbacks is_disabled Jan 1 02:31:29 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:29 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:31:29 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:30 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color security-keys are_keys_correct Jan 1 02:31:30 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:30 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color instance info --format=json --check-updates=true Jan 1 02:31:30 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:35 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_plugins --format=json Jan 1 02:31:35 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:35 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_themes --format=json Jan 1 02:31:35 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:36 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 1 02:31:36 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:36 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color instance login-url --skip-plugins=false --format=json Jan 1 02:31:36 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:37 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 1 02:31:38 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:38 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_plugins --format=json Jan 1 02:31:38 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:39 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 1 02:31:39 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:42 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_themes --format=json Jan 1 02:31:42 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:43 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/wp-config.php Jan 1 02:31:43 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:43 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:31:43 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:43 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/.maintenance Jan 1 02:31:43 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:43 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color db-prefix get Jan 1 02:31:43 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:44 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/HYPE --output=json Jan 1 02:31:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:31:44 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:31:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:31:44 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:44 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 1 02:31:44 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:45 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 1 02:31:45 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:45 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 1 02:31:45 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 1 02:31:46 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color admin-username is-secure Jan 1 02:31:46 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:31:46 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:47 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/wp-config.php Jan 1 02:31:47 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:47 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/HYPE/wp-config.php Jan 1 02:31:47 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:47 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color pingbacks is_disabled Jan 1 02:31:47 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:47 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:31:47 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:48 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color security-keys are_keys_correct Jan 1 02:31:48 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:31:48 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:31:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=ugotscom --output=json Jan 1 02:31:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:31:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:31:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/boniface/blog --no-color instance info --format=json --check-updates=true Jan 1 02:31:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:31:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:31:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DomainInfo single_domain_data domain=ugotechnologies.com return_https_redirect_status=1 --output=json Jan 1 02:31:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:31:49 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:31:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom Mime list_redirects --output=json Jan 1 02:31:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:31:49 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:31:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/boniface/blog/wp-includes/version.php Jan 1 02:31:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:31:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:31:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/public_html/boniface/blog/wp-includes/version.php Jan 1 02:31:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:31:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:31:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 1 02:31:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:31:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:31:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom LangPHP php_get_vhost_versions --output=json Jan 1 02:31:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:31:49 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:31:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color instance info --format=json --check-updates=true Jan 1 02:31:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:31:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:31:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_plugins --format=json Jan 1 02:31:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:31:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:31:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_themes --format=json Jan 1 02:31:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:31:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:31:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 1 02:31:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:31:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:31:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color instance login-url --skip-plugins=false --format=json Jan 1 02:31:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:31:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:31:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 1 02:31:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:31:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:31:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_plugins --format=json Jan 1 02:31:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:31:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:31:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 1 02:31:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_themes --format=json Jan 1 02:32:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php Jan 1 02:32:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:32:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/.maintenance Jan 1 02:32:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color db-prefix get Jan 1 02:32:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --output=json Jan 1 02:32:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:32:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:32:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:32:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 1 02:32:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 1 02:32:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 1 02:32:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 1 02:32:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color admin-username is-secure Jan 1 02:32:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:32:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php Jan 1 02:32:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/stat -c %a /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php Jan 1 02:32:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color pingbacks is_disabled Jan 1 02:32:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:32:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color security-keys are_keys_correct Jan 1 02:32:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color instance info --format=json --check-updates=true Jan 1 02:32:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_plugins --format=json Jan 1 02:32:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_themes --format=json Jan 1 02:32:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 1 02:32:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color instance login-url --skip-plugins=false --format=json Jan 1 02:32:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 1 02:32:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_plugins --format=json Jan 1 02:32:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 1 02:32:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_themes --format=json Jan 1 02:32:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/wp-config.php Jan 1 02:32:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:32:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/.maintenance Jan 1 02:32:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color db-prefix get Jan 1 02:32:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/site --output=json Jan 1 02:32:18 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:32:18 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:32:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:32:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 1 02:32:19 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:19 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 1 02:32:19 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:19 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 1 02:32:19 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 1 02:32:20 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color admin-username is-secure Jan 1 02:32:20 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:32:21 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/wp-config.php Jan 1 02:32:21 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/stat -c %a /home/ugotscom/public_html/old/site/wp-config.php Jan 1 02:32:21 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color pingbacks is_disabled Jan 1 02:32:21 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:32:21 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color security-keys are_keys_correct Jan 1 02:32:22 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:32:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:32:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=woodpeck --output=json Jan 1 02:32:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:32:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:32:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/woodpeck/public_html/wp --no-color instance info --format=json --check-updates=true Jan 1 02:32:22 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 1 02:32:22 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 1 02:32:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck DomainInfo single_domain_data domain=woodpeckerindia.com return_https_redirect_status=1 --output=json Jan 1 02:32:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:32:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:32:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck Mime list_redirects --output=json Jan 1 02:32:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:32:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:32:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/public_html/wp/wp-includes/version.php Jan 1 02:32:23 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 1 02:32:23 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 1 02:32:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 1 02:32:23 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 1 02:32:23 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 1 02:32:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck LangPHP php_get_vhost_versions --output=json Jan 1 02:32:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:32:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:32:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=palco123 --output=json Jan 1 02:32:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:32:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:32:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color instance info --format=json --check-updates=true Jan 1 02:32:23 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 1 02:32:31 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 1 02:32:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 1 02:32:31 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 1 02:32:31 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 1 02:32:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 1 02:32:31 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 1 02:32:37 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 1 02:32:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 1 02:32:37 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 1 02:32:37 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 1 02:32:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 LangPHP php_get_vhost_versions --output=json Jan 1 02:32:37 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:32:37 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:32:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color instance login-url --skip-plugins=false --format=json Jan 1 02:32:37 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 1 02:32:38 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 1 02:32:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DomainInfo single_domain_data domain=panlys.com return_https_redirect_status=1 --output=json Jan 1 02:32:38 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:32:38 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:32:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 Mime list_redirects --output=json Jan 1 02:32:38 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:32:38 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:32:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 1 02:32:38 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 1 02:32:39 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 1 02:32:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 1 02:32:39 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 1 02:32:39 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 1 02:32:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 1 02:32:40 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 1 02:32:45 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 1 02:32:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 1 02:32:45 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 1 02:32:50 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 1 02:32:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/wp-config.php Jan 1 02:32:50 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 1 02:32:50 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 1 02:32:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:32:50 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 1 02:32:51 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 1 02:32:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/.maintenance Jan 1 02:32:51 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 1 02:32:51 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 1 02:32:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color db-prefix get Jan 1 02:32:51 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 1 02:32:52 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 1 02:32:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DirectoryPrivacy is_directory_protected dir=/home/palco123/public_html --output=json Jan 1 02:32:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:32:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:32:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:32:52 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 1 02:32:52 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 1 02:32:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color option get auto_update_core_major Jan 1 02:32:52 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 1 02:32:53 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 1 02:32:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 1 02:32:53 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 1 02:32:54 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 1 02:32:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 1 02:32:54 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 1 02:32:54 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 1 02:32:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color admin-username is-secure Jan 1 02:32:54 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 1 02:32:55 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 1 02:32:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:32:55 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 1 02:32:55 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 1 02:32:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/wp-config.php Jan 1 02:32:55 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 1 02:32:55 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 1 02:32:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/stat -c %a /home/palco123/public_html/wp-config.php Jan 1 02:32:55 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 1 02:32:55 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 1 02:32:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color pingbacks is_disabled Jan 1 02:32:55 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 1 02:32:56 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 1 02:32:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:32:56 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 1 02:32:56 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 1 02:32:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color security-keys are_keys_correct Jan 1 02:32:56 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 1 02:32:57 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 1 02:32:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwresourcehunte --output=json Jan 1 02:32:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:32:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:32:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color instance info --format=json --check-updates=true Jan 1 02:32:57 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 1 02:32:59 host sshd[12350]: Invalid user ems from 183.220.110.21 port 2223 Jan 1 02:32:59 host sshd[12350]: input_userauth_request: invalid user ems [preauth] Jan 1 02:32:59 host sshd[12350]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:32:59 host sshd[12350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.220.110.21 Jan 1 02:33:01 host sshd[12350]: Failed password for invalid user ems from 183.220.110.21 port 2223 ssh2 Jan 1 02:33:02 host sshd[12350]: Received disconnect from 183.220.110.21 port 2223:11: Bye Bye [preauth] Jan 1 02:33:02 host sshd[12350]: Disconnected from 183.220.110.21 port 2223 [preauth] Jan 1 02:33:03 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 1 02:33:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_plugins --format=json Jan 1 02:33:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 1 02:33:03 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 1 02:33:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_themes --format=json Jan 1 02:33:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 1 02:33:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 1 02:33:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 1 02:33:04 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 1 02:33:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 1 02:33:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte LangPHP php_get_vhost_versions --output=json Jan 1 02:33:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color instance login-url --skip-plugins=false --format=json Jan 1 02:33:04 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 1 02:33:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 1 02:33:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DomainInfo single_domain_data domain=resourcehunters.com return_https_redirect_status=1 --output=json Jan 1 02:33:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte Mime list_redirects --output=json Jan 1 02:33:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 1 02:33:05 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 1 02:33:05 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 1 02:33:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_plugins --format=json Jan 1 02:33:05 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 1 02:33:05 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 1 02:33:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 1 02:33:06 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 1 02:33:10 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 1 02:33:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_themes --format=json Jan 1 02:33:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 1 02:33:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 1 02:33:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/wp-config.php Jan 1 02:33:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 1 02:33:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 1 02:33:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:33:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 1 02:33:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 1 02:33:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/.maintenance Jan 1 02:33:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 1 02:33:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 1 02:33:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color db-prefix get Jan 1 02:33:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 1 02:33:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 1 02:33:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DirectoryPrivacy is_directory_protected dir=/home/wwwresourcehunte/public_html --output=json Jan 1 02:33:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:33:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 1 02:33:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 1 02:33:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 1 02:33:12 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 1 02:33:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 1 02:33:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 1 02:33:12 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 1 02:33:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 1 02:33:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 1 02:33:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 1 02:33:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 1 02:33:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 1 02:33:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 1 02:33:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 1 02:33:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color admin-username is-secure Jan 1 02:33:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 1 02:33:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 1 02:33:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:33:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 1 02:33:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 1 02:33:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/wp-config.php Jan 1 02:33:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 1 02:33:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 1 02:33:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/stat -c %a /home/wwwresourcehunte/public_html/wp-config.php Jan 1 02:33:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 1 02:33:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 1 02:33:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color pingbacks is_disabled Jan 1 02:33:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 1 02:33:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 1 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 1 02:33:15 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 1 02:33:15 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 1 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color security-keys are_keys_correct Jan 1 02:33:15 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 1 02:33:15 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 1 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwkapin WpToolkitNotification send_admin_auto_updates_notification 'available_updates_text=<br/><br/>Updates are available for the following items:<br/><br/>' 'available_updates_list=1. Plugin "Anti-Malware Security and Brute-Force Firewall" on Shalini James Blog (http://www.shalinijames.com). Installed version: 4.18.71. Available version: 4.21.88.<br/><br/>' installed_updates_text= installed_updates_list= 'failure_updates_text=Updates were not installed for the following items:<br/><br/>' 'failure_updates_list=1. Website "EVM Honda Cochin" (http://www.evmhonda.com): Failed to reset cache for the instance #1: Fatal error: Uncaught Error: Call to undefined function cardealer_is_wpml_active() in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php:1041#012Stack trace:#012#0 Jan 1 02:33:15 host sudo: wp-toolkit : (command continued) /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-init.php(22): require_once()#012#1 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/cardealer-helper-library.php(183): require_once('"'"'/home/wwwevmhon...'"'"')#012#2 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(287): cdhl_include_admin_files('"'"''"'"')#012#3 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(311): WP_Hook->apply_filters(NULL, Array)#012#4 /home/wwwevmhonda/public_html/wp-includes/plugin.php(478): WP_Hook->do_action(Array)#012#5 /home/wwwevmhonda/public_html/wp-settings.php(546): do_action('"'"'init'"'"')#012#6 /usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/vendor/wp-cli/wp-cli/php/WP_CLI/Runner.php(1356): require('"'"'/home/wwwevmhon...'"'"')#012#7 /usr/local/cpanel/3rdparty/wp-toolkit/plib/ve in Jan 1 02:33:15 host sudo: wp-toolkit : (command continued) /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php on line 1041#012Error: There has been a critical error on your website.Learn more about debugging in WordPress. There has been a critical error on your website.#012<br/><br/>2. Website "/home/mrsclean/public_html/backup" (http://mrsclean.co.in/backup): Failed to reset cache for the instance #5: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012<br/><br/>3. Website "/home/mrsclean/public_html/blog" (http://mrsclean.co.in/blog): Failed to reset cache for the instance #6: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` Jan 1 02:33:15 host sudo: wp-toolkit : (command continued) file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012<br/><br/>4. Website "/home/ugotscom/public_html/boniface/blog" (http://ugotechnologies.com/boniface/blog): Failed to reset cache for the instance #13: Error: Error establishing a database connection.#012<br/><br/>5. Website "/home/woodpeck/public_html/wp" (http://woodpeckerindia.com/wp): Failed to reset cache for the instance #16: /bin/sh: line 0: cd: /home/woodpeck/public_html/wp: No such file or directory#012<br/><br/>' --output=json Jan 1 02:33:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:15 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color cli cache clear Jan 1 02:33:15 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 1 02:33:15 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 1 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color cli cache clear Jan 1 02:33:15 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 1 02:33:16 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 1 02:33:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/backup --no-color cli cache clear Jan 1 02:33:16 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 1 02:33:16 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 1 02:33:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/blog --no-color cli cache clear Jan 1 02:33:16 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 1 02:33:16 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 1 02:33:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color cli cache clear Jan 1 02:33:16 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 1 02:33:16 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 1 02:33:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color cli cache clear Jan 1 02:33:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:33:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:33:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color cli cache clear Jan 1 02:33:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:33:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color cli cache clear Jan 1 02:33:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:33:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/boniface/blog --no-color cli cache clear Jan 1 02:33:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:33:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color cli cache clear Jan 1 02:33:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:33:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color cli cache clear Jan 1 02:33:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:33:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:33:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/woodpeck/public_html/wp --no-color cli cache clear Jan 1 02:33:18 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 1 02:33:18 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 1 02:33:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color cli cache clear Jan 1 02:33:18 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 1 02:33:18 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 1 02:33:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color cli cache clear Jan 1 02:33:18 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 1 02:33:18 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 1 02:33:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 1 02:33:18 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 1 02:33:18 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 1 02:33:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 1 02:33:18 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 1 02:33:19 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 1 02:33:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 1 02:33:19 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 1 02:33:20 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 1 02:33:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 1 02:33:20 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:33:20 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:33:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 1 02:33:20 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:33:21 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:33:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 1 02:33:21 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 1 02:33:21 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 1 02:33:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 1 02:33:21 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:33:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 1 02:33:22 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 1 02:33:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 1 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 1 02:33:22 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 1 02:33:22 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 1 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 1 02:33:22 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 1 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c httpd -v Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/palco123/panlys.com/wp-toolkit.conf Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/palco123/panlys.com/wp-toolkit.conf Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 1 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 1 02:33:56 host sshd[13032]: Invalid user jiandong from 183.220.110.21 port 7629 Jan 1 02:33:56 host sshd[13032]: input_userauth_request: invalid user jiandong [preauth] Jan 1 02:33:56 host sshd[13032]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:33:56 host sshd[13032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.220.110.21 Jan 1 02:33:59 host sshd[13032]: Failed password for invalid user jiandong from 183.220.110.21 port 7629 ssh2 Jan 1 02:39:44 host sshd[13843]: Invalid user user from 103.13.40.2 port 59716 Jan 1 02:39:44 host sshd[13843]: input_userauth_request: invalid user user [preauth] Jan 1 02:39:44 host sshd[13843]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:39:44 host sshd[13843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.40.2 Jan 1 02:39:46 host sshd[13843]: Failed password for invalid user user from 103.13.40.2 port 59716 ssh2 Jan 1 02:39:46 host sshd[13843]: Connection closed by 103.13.40.2 port 59716 [preauth] Jan 1 02:47:39 host sshd[14777]: Invalid user user1 from 162.218.126.136 port 41872 Jan 1 02:47:39 host sshd[14777]: input_userauth_request: invalid user user1 [preauth] Jan 1 02:47:39 host sshd[14777]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:47:39 host sshd[14777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Jan 1 02:47:41 host sshd[14777]: Failed password for invalid user user1 from 162.218.126.136 port 41872 ssh2 Jan 1 02:47:41 host sshd[14777]: Connection closed by 162.218.126.136 port 41872 [preauth] Jan 1 02:48:13 host sshd[14849]: Did not receive identification string from 149.129.220.222 port 61000 Jan 1 02:57:07 host sshd[16166]: Invalid user user from 43.131.30.179 port 57838 Jan 1 02:57:07 host sshd[16166]: input_userauth_request: invalid user user [preauth] Jan 1 02:57:07 host sshd[16166]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:57:07 host sshd[16166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.30.179 Jan 1 02:57:09 host sshd[16166]: Failed password for invalid user user from 43.131.30.179 port 57838 ssh2 Jan 1 02:57:09 host sshd[16166]: Received disconnect from 43.131.30.179 port 57838:11: Bye Bye [preauth] Jan 1 02:57:09 host sshd[16166]: Disconnected from 43.131.30.179 port 57838 [preauth] Jan 1 02:57:41 host sshd[16252]: Invalid user dhg from 86.105.27.141 port 45546 Jan 1 02:57:41 host sshd[16252]: input_userauth_request: invalid user dhg [preauth] Jan 1 02:57:41 host sshd[16252]: pam_unix(sshd:auth): check pass; user unknown Jan 1 02:57:41 host sshd[16252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.105.27.141 Jan 1 02:57:43 host sshd[16252]: Failed password for invalid user dhg from 86.105.27.141 port 45546 ssh2 Jan 1 02:57:44 host sshd[16252]: Received disconnect from 86.105.27.141 port 45546:11: Bye Bye [preauth] Jan 1 02:57:44 host sshd[16252]: Disconnected from 86.105.27.141 port 45546 [preauth] Jan 1 03:01:22 host sshd[16763]: Invalid user ubuntu from 177.12.2.53 port 36230 Jan 1 03:01:22 host sshd[16763]: input_userauth_request: invalid user ubuntu [preauth] Jan 1 03:01:22 host sshd[16763]: pam_unix(sshd:auth): check pass; user unknown Jan 1 03:01:22 host sshd[16763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.12.2.53 Jan 1 03:01:25 host sshd[16763]: Failed password for invalid user ubuntu from 177.12.2.53 port 36230 ssh2 Jan 1 03:01:25 host sshd[16763]: Received disconnect from 177.12.2.53 port 36230:11: Bye Bye [preauth] Jan 1 03:01:25 host sshd[16763]: Disconnected from 177.12.2.53 port 36230 [preauth] Jan 1 03:01:36 host sshd[16801]: Invalid user pss from 43.131.30.179 port 52666 Jan 1 03:01:36 host sshd[16801]: input_userauth_request: invalid user pss [preauth] Jan 1 03:01:36 host sshd[16801]: pam_unix(sshd:auth): check pass; user unknown Jan 1 03:01:36 host sshd[16801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.30.179 Jan 1 03:01:39 host sshd[16801]: Failed password for invalid user pss from 43.131.30.179 port 52666 ssh2 Jan 1 03:01:39 host sshd[16801]: Received disconnect from 43.131.30.179 port 52666:11: Bye Bye [preauth] Jan 1 03:01:39 host sshd[16801]: Disconnected from 43.131.30.179 port 52666 [preauth] Jan 1 03:02:22 host sshd[16864]: Invalid user syed from 86.105.27.141 port 58086 Jan 1 03:02:22 host sshd[16864]: input_userauth_request: invalid user syed [preauth] Jan 1 03:02:22 host sshd[16864]: pam_unix(sshd:auth): check pass; user unknown Jan 1 03:02:22 host sshd[16864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.105.27.141 Jan 1 03:02:25 host sshd[16864]: Failed password for invalid user syed from 86.105.27.141 port 58086 ssh2 Jan 1 03:02:25 host sshd[16864]: Received disconnect from 86.105.27.141 port 58086:11: Bye Bye [preauth] Jan 1 03:02:25 host sshd[16864]: Disconnected from 86.105.27.141 port 58086 [preauth] Jan 1 03:02:31 host sshd[16898]: Invalid user faro from 74.207.248.92 port 33496 Jan 1 03:02:31 host sshd[16898]: input_userauth_request: invalid user faro [preauth] Jan 1 03:02:31 host sshd[16898]: pam_unix(sshd:auth): check pass; user unknown Jan 1 03:02:31 host sshd[16898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.207.248.92 Jan 1 03:02:33 host sshd[16898]: Failed password for invalid user faro from 74.207.248.92 port 33496 ssh2 Jan 1 03:02:33 host sshd[16898]: Received disconnect from 74.207.248.92 port 33496:11: Bye Bye [preauth] Jan 1 03:02:33 host sshd[16898]: Disconnected from 74.207.248.92 port 33496 [preauth] Jan 1 03:02:51 host sshd[16938]: User root from 43.131.30.179 not allowed because not listed in AllowUsers Jan 1 03:02:51 host sshd[16938]: input_userauth_request: invalid user root [preauth] Jan 1 03:02:51 host unix_chkpwd[16941]: password check failed for user (root) Jan 1 03:02:51 host sshd[16938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.30.179 user=root Jan 1 03:02:51 host sshd[16938]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 1 03:02:53 host sshd[16938]: Failed password for invalid user root from 43.131.30.179 port 52944 ssh2 Jan 1 03:02:53 host sshd[16938]: Received disconnect from 43.131.30.179 port 52944:11: Bye Bye [preauth] Jan 1 03:02:53 host sshd[16938]: Disconnected from 43.131.30.179 port 52944 [preauth] Jan 1 03:03:30 host sshd[17058]: User root from 86.105.27.141 not allowed because not listed in AllowUsers Jan 1 03:03:30 host sshd[17058]: input_userauth_request: invalid user root [preauth] Jan 1 03:03:30 host unix_chkpwd[17060]: password check failed for user (root) Jan 1 03:03:30 host sshd[17058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.105.27.141 user=root Jan 1 03:03:30 host sshd[17058]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 1 03:03:32 host sshd[17058]: Failed password for invalid user root from 86.105.27.141 port 38456 ssh2 Jan 1 03:03:33 host sshd[17058]: Received disconnect from 86.105.27.141 port 38456:11: Bye Bye [preauth] Jan 1 03:03:33 host sshd[17058]: Disconnected from 86.105.27.141 port 38456 [preauth] Jan 1 03:03:43 host sshd[17103]: Invalid user jenkins from 177.12.2.53 port 42908 Jan 1 03:03:43 host sshd[17103]: input_userauth_request: invalid user jenkins [preauth] Jan 1 03:03:43 host sshd[17103]: pam_unix(sshd:auth): check pass; user unknown Jan 1 03:03:43 host sshd[17103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.12.2.53 Jan 1 03:03:44 host sshd[17103]: Failed password for invalid user jenkins from 177.12.2.53 port 42908 ssh2 Jan 1 03:03:45 host sshd[17103]: Received disconnect from 177.12.2.53 port 42908:11: Bye Bye [preauth] Jan 1 03:03:45 host sshd[17103]: Disconnected from 177.12.2.53 port 42908 [preauth] Jan 1 03:04:02 host sshd[17126]: User root from 74.207.248.92 not allowed because not listed in AllowUsers Jan 1 03:04:02 host sshd[17126]: input_userauth_request: invalid user root [preauth] Jan 1 03:04:02 host unix_chkpwd[17140]: password check failed for user (root) Jan 1 03:04:02 host sshd[17126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.207.248.92 user=root Jan 1 03:04:02 host sshd[17126]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 1 03:04:04 host sshd[17126]: Failed password for invalid user root from 74.207.248.92 port 37462 ssh2 Jan 1 03:04:04 host sshd[17126]: Received disconnect from 74.207.248.92 port 37462:11: Bye Bye [preauth] Jan 1 03:04:04 host sshd[17126]: Disconnected from 74.207.248.92 port 37462 [preauth] Jan 1 03:05:10 host sshd[17297]: User root from 177.12.2.53 not allowed because not listed in AllowUsers Jan 1 03:05:10 host sshd[17297]: input_userauth_request: invalid user root [preauth] Jan 1 03:05:10 host unix_chkpwd[17311]: password check failed for user (root) Jan 1 03:05:10 host sshd[17297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.12.2.53 user=root Jan 1 03:05:10 host sshd[17297]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 1 03:05:11 host sshd[17297]: Failed password for invalid user root from 177.12.2.53 port 52362 ssh2 Jan 1 03:05:12 host sshd[17297]: Received disconnect from 177.12.2.53 port 52362:11: Bye Bye [preauth] Jan 1 03:05:12 host sshd[17297]: Disconnected from 177.12.2.53 port 52362 [preauth] Jan 1 03:10:00 host sshd[18096]: Invalid user guest from 45.93.201.90 port 42768 Jan 1 03:10:00 host sshd[18096]: input_userauth_request: invalid user guest [preauth] Jan 1 03:10:00 host sshd[18096]: Failed none for invalid user guest from 45.93.201.90 port 42768 ssh2 Jan 1 03:10:03 host sshd[18096]: pam_unix(sshd:auth): check pass; user unknown Jan 1 03:10:03 host sshd[18096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90 Jan 1 03:10:05 host sshd[18096]: Failed password for invalid user guest from 45.93.201.90 port 42768 ssh2 Jan 1 03:10:08 host sshd[18096]: pam_unix(sshd:auth): check pass; user unknown Jan 1 03:10:11 host sshd[18096]: Failed password for invalid user guest from 45.93.201.90 port 42768 ssh2 Jan 1 03:10:14 host sshd[18096]: Connection closed by 45.93.201.90 port 42768 [preauth] Jan 1 03:10:14 host sshd[18096]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.93.201.90